International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In order to get the cipher text, the plain text is simply XORed with the key-stream generated by a strong pseudo chaotic number generator (PCNG). Then, all the security of the system is based on the used PCNG. The structure of the proposed PCNG includes two chaotic maps which are weakly coupled by a predefined matrix and integrates a swap function. The PCNG passes all statistical NIST’s randomness tests. Also, analysis and experimental results show that the proposed stream cipher has a large key space, a high key sensitivity, and can resist against chosen-plaintext attack and chosen-ciphertext attack. Indeed, for each new execution of the system...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceFor both chaos-based stream ciphers and chaos-based block ciphers, ke...
International audienceIn this paper, we design and implement two new stream ciphersbased on Pseudo C...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
Chaotic cryptology is widely investigated recently. This paper reviews the progress in this area and...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
International audienceWe propose a novel noise-resisting ciphering method resorting to a chaotic mul...
International audienceWe propose a novel noise-resisting ciphering method resorting to a chaotic mul...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceIn this paper, we propose a novel stream cipher based on a chaotic system. In ...
International audienceFor both chaos-based stream ciphers and chaos-based block ciphers, ke...
International audienceIn this paper, we design and implement two new stream ciphersbased on Pseudo C...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
Chaotic cryptology is widely investigated recently. This paper reviews the progress in this area and...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
International audienceWe propose a novel noise-resisting ciphering method resorting to a chaotic mul...
International audienceWe propose a novel noise-resisting ciphering method resorting to a chaotic mul...
International audienceWe designed and implemented a stream cipher cryptosystem based on anecient cha...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceSecurity and confidentiality of image and video data is an important research ...