This work, introduces a method to repair a cryptosystem based on a chaotic dynamical system. Baptista exploited the chaotic property of the logistic equation f(x) = b x (1 - x) to develop a cryptosystem. This cryptosystem has the ability to produce various ciphers responding to the same message input. Alvarez through his one-time pad attack successfully attacked the Baptista cyptosystem. Ariffin attempted to modify the cryptosystem to enhance the security of the original Baptista’s cryptosystem. Rhouma identified a flaw in the method Ariffin put forward, specifically in step 4 of the encryption procedure, where it does not implement a oneto- one operation resulting in failure to decrypt the ciphertext. The method is based on the Fr...
Recently G. Jakimoski and L. Kocarev cryptanalzed two chaotic cryptosystems without using chaotic sy...
[[abstract]]n this thesis, a randomly dynamic cryptosystem is proposed. The processes are composed o...
Recently, low-dimensional chaos-based secure communication systems have attracted a great deal of at...
A new compression algorithm used to ensure a modified Baptista symmetric cryptosystem which is based...
In 1998, M.S. Baptista proposed a chaotic cryptosystem using the ergodicity property of the simple l...
In 1998, M.S. Baptista proposed a chaotic cryptosystem, which has attracted much attention from the ...
Abstract—Over last 3 decades, many cryptography algorithms based on chaos have been proposed that ar...
Ever since Baptista in 1998 introduced his cryptographic scheme utilizing the only in online version...
In 1998, M.S. Baptista proposed a chaotic cryptosystem using the ergodicity property of the simple l...
In this paper we will first discuss cryptography from a historical point of view in order to under...
This paper deals with principles of hiding information by chaotic coders and methods of attacking th...
We propose a plain files cipher by means of a stream cryptosystem scheme with chaotic addition and a...
The keyspace of a cryptography system must be long enough in order to protect it from brute force at...
Abstract A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
This work proposes a new secure chaos-based encryption/decryption system, operating in cipher block ...
Recently G. Jakimoski and L. Kocarev cryptanalzed two chaotic cryptosystems without using chaotic sy...
[[abstract]]n this thesis, a randomly dynamic cryptosystem is proposed. The processes are composed o...
Recently, low-dimensional chaos-based secure communication systems have attracted a great deal of at...
A new compression algorithm used to ensure a modified Baptista symmetric cryptosystem which is based...
In 1998, M.S. Baptista proposed a chaotic cryptosystem using the ergodicity property of the simple l...
In 1998, M.S. Baptista proposed a chaotic cryptosystem, which has attracted much attention from the ...
Abstract—Over last 3 decades, many cryptography algorithms based on chaos have been proposed that ar...
Ever since Baptista in 1998 introduced his cryptographic scheme utilizing the only in online version...
In 1998, M.S. Baptista proposed a chaotic cryptosystem using the ergodicity property of the simple l...
In this paper we will first discuss cryptography from a historical point of view in order to under...
This paper deals with principles of hiding information by chaotic coders and methods of attacking th...
We propose a plain files cipher by means of a stream cryptosystem scheme with chaotic addition and a...
The keyspace of a cryptography system must be long enough in order to protect it from brute force at...
Abstract A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
This work proposes a new secure chaos-based encryption/decryption system, operating in cipher block ...
Recently G. Jakimoski and L. Kocarev cryptanalzed two chaotic cryptosystems without using chaotic sy...
[[abstract]]n this thesis, a randomly dynamic cryptosystem is proposed. The processes are composed o...
Recently, low-dimensional chaos-based secure communication systems have attracted a great deal of at...