Discrete Lyapunov Exponent and Resistance to Differential Cryptanalysis José María Amigó, Ljupco Kocarev, and Janusz Szczepanski
|
|
- Beverley Gallagher
- 5 years ago
- Views:
Transcription
1 882 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 54, NO. 10, OCTOBER 2007 Discrete Lyapunov Exponent and Resistance to Dferential Cryptanalysis José María Amigó, Ljupco Kocarev, and Janusz Szczepanski Abstract In a recent paper, Jakimoski and Subbalakshmi provided a nice connection between the so-called discrete Lyapunov exponent of a permutation defined on a finite lattice and its maximal dferential probability, a parameter that measures the complexity of a dferential cryptanalysis attack on the substitution defined by. In this brief, we take a second look at their result to find some practical shortcomings. We also discuss more general aspects. Index Terms Dferential cryptanalysis, discrete Lyapunov exponent (DLE), maximum dferential probability (). I. INTRODUCTION SET endowed with addition modulo and let be a bijection (also called -permutation or -substitution). The discrete Lyapunov exponent (DLE) of is then defined as holds, where Substitutions on sets of integers are important in chaotic cryptography [4] among other potential applications. For this reason, we have scrutinized the constraints (1) in search of further insights. We have found the following. (i) The upper bound in (1) can be optimized for even to render with (2) (3) (4) where for and. was introduced in [1] and further developed in [2] as a main tool of discrete chaos a framework for counterparts of standard dynamical concepts in finite-state systems. In [3], Jakimoski and Subbalakshmi make an interesting connection between and the resistance of (viewed as a substitution of a hypothetical cipher with alphabet ) to dferential cryptanalysis. This resistance or immunity is measured by the maximum dferential probability () Note that (just take ). According to [3, Th. 1], the relation (1) Manuscript received March 2, 2007; revised April 11, This work was supported in part by the Spanish Ministry of Education and Science under Grant MTM2005/049048, and by the European FEDER Funds. The work of L. Kocarev was supported in part by the National Science Foundation. This paper was recommended by Associate Editor Z. Galias. J. M. Amigó is with the Centro de Investigación Operativa, Universidad Miguel Hernández, Elche, Spain ( jm.amigo@umh.es). L. Kocarev is with the Macedonian Academy of Sciences and Arts, 1000 Skopje, Macedonia, New York University Skopje, 1000 Skopje, Macedonia, and Institute for Nonlinear Science, University of Calornia, San Diego, La Jolla, CA USA ( lkocarev@ucsd.edu). J. Szczepanski is with the Institute for Fundamental Technological Research, Polish Academy of Sciences, PL Warsaw, Poland ( jszczepa@ippt.gov.pl). Digital Object Identier /TCSII We will show that the new upper bound,,is reached (hence, it cannot be lowered) and, moreover (5) for all, i.e.,. (ii) Furthermore, one restricts to the optimal value (meaning maximal immunity to dferential cryptanalysis in the context of encryption mappings on ), so as (3) becomes then analytical and numerical calculations show that the constraints (6) are fulfilled by virtually all permutations. We conclude that even the improved interval (6) is too wide to filter in practice the most resistant substitutions to dferential cryptanalysis, thus making necessary a sharper lower constrain for practical cryptographic applications. We also elaborate below (in Section IV) on some more general aspects related to this result. II. UPPER BOUND First of all, we will prove that the permutation, defined as (6) /$ IEEE
2 AMIGÓ et al.: DISCRETE LYAPUNOV EXPONENT AND RESISTANCE TO DIFFERENTIAL CRYPTANALYSIS 883 has the largest possible DLE among all permutations on, namely, From (9) we know that the right-hand side maximizes the second sum on (7) [see (4)]. To prove this claim (Theorem II.2 below), we need the following lemma. Lemma II.1: For any permutation on the set,wehave As for the first sum in (10), set (11) where. Proof: If, then. Suppose now. The sum contains the term once, the terms twice and the term thrice, with altogether an equal number of signs 1 and 1. It is therefore obvious that this sum reaches its maximum when the signs are allotted to the largest entries ( ) and the signs to the smallest entries ( ). Then (8) for, so that and (see, e.g., [5, Lemma 1.4.1]) (12) Now, in the case of permutations on with (hence, maximizing the second term (11) of (10)), it is impossible that (13) thereby maximizing also the first term (12) of (10). The best we can do is to approximate the optimal solution (13) unormly from above and from below. For we have For the permutation ( terms) with (9) i.e., the upper bound in (8) is reached by. Theorem II.2: If is a permutation on the linear set, then holds. In this sense, e may say that is the most chaotic map on (see [2] for the relation between the Lyapunov exponent of a continuous map on a one-dimensional interval and its discrete counterpart). Proof: Let be the permutation,. By definition while ( terms) with (10) So far we have seen that, although -permutations cannot fulfill the optimality condition (13), does comply asymptotically with it in a unorm and centered way. An exhaustive search confirms that for all -permutations with. For higher values of, Monte Carlo simulation was used with the same result (see also Figs. 1 and 2). This completes the proof.
3 884 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 54, NO. 10, OCTOBER 2007 TABLE I SOME VALUES OF (M) AND B asymptotically. From (14) and (15),we get Fig. 1. Normalized histograms of the DLE or permutations F on Z and M = 8, 10, 12. This figure was made using exhaustive sampling. (16) for large enough. Explicit calculation of and for low values of confirms that (16) holds true for all. Table I gives and for, (for, the approximations (14),, and (15),, are already closing in on the correct second decimal digit). Lemma II.3: The inequality (17) holds for all possible values of. Proof: Set,, and Fig. 2. Normalized histograms of the DLE for permutations F on Z and M =16, 32, 64, 128, 256. This figure was made using Monte Carlo sampling. where. Then Observe for further reference [see (7)] that (14) Maximal immunity to dferential cryptanalysis is achieved when takes its minimum value, namely, when. For simplicity, we assume henceforth along with Jakimoski and Subbalakshmi that is a multiple of 4 so that. The upper bound (2) becomes then and, for Stirling s formula yields (15)
4 AMIGÓ et al.: DISCRETE LYAPUNOV EXPONENT AND RESISTANCE TO DIFFERENTIAL CRYPTANALYSIS 885 In order to prove that this dference is positive, set so that TABLE II VALUES OF 3(2 ) FOR 3 n 8 The following are also true. (a). (b). (c). Hence, [case (b)] up to corrections is. Note that the length of this interval because the average of the positive numbers,, is strictly greater than the average of the positive numbers. Lastly, [case (c)] i.e., up to terms. Table II lists for some powers of 2. Figs. 1 and 2 show the probability density functions of permutations on for moderate values of and for higher values of, respectively. As said before, the number of permutations for were estimated by means of Monte Carlo sampling. Note that the curves in both figures become more peaked as increases. From Table II and Figs. 1, 2 it is plain that practically all permutations comply with (19) for. for the same reason as before. Equations (16) and (17) substantiate our claim (5) that the upper bound in (1) can be replaced by the upper bound in (3), independently of. III. INTERVAL LENGTH Furthermore, the logarithmic Stirling s formula can be used to simply the lower bound in (3) and, in particular, in (6) (i.e., when ): If, then (18) Plugging now (14) and (18) into (6), it follows that the DLE of an (from the point of view of dferential cryptanalysis) ideally strong encryption mapping lies in the interval (19) IV. FURTHER CONSIDERATIONS Equation (1) is an interesting relation between the DLE of a substitution on elements (or an S-box on,in cryptographic parlance),, and its resistance to dferential cryptanalysis, measured by. Apart from its theoretical appealing, this relation looks also promising with respect to practical applications because has less computational complexity than and, hence, one could in principle disregard weak substitutions, solely on the base of their DLEs. The scope of this paper was precisely to clary this point. As it turns out, the relation (1) (or (6) for that matter) cannot help discriminate weak from strong substitutions, an upshot being the convenience of further improving (1). In accordance with this apparently negative result, it seems likely that most randomly chosen -substitutions (as those whose DLEs are shown in Fig. 2) will have maximum dferential probabilities close to the optimal value,, thus qualying for cryptographic applications after all. Let us mention in passing that there are algebraic methods for designing S-boxes with optimal properties against the standard attacks (which include dferential and linear cryptanalysis). V. CONCLUSION First, we have sharpened the constraints (1) to the (3), by replacing the upper bound by, and, second, we have shown that not even the latter ones, particularized to the optimal (constraints (6)), are sharp enough to
5 886 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 54, NO. 10, OCTOBER 2007 filter in practice the most resistant substitutions to dferential cryptanalysis. Specically, we have shown that the length of the interval defined by (6) increases monotonically to with, while the corresponding distributions of DLEs become more peaked, being almost wholly contained in the interval (6) from on. Since the new upper bound,, is already optimal (in fact, it is reachable and independent of ), we are left with the task of optimizing the lower bound. ACKNOWLEDGMENT The authors are thankful to the referees for their valuable comments. REFERENCES [1] L. Kocarev and J. Szczepanski, Finite-space lyapunov exponents and pseudochaos, Phys. Rev. Lett., vol. 93, p , [2] L. Kocarev, J. Szczepanski, J. M. Amigó, and I. Tomovski, Discrete chaos Part I: Theory, IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 53, no. 6, pp , Jun [3] G. Jakimoski and K. P. Subbalakshmi, Discrete lyapunov exponent and dferential cryptanalysis, IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 54, no. 6, pp , Jun [4] J. M. Amigó, L. Kocarev, and J. Szczepanski, Theory and practice of chaotic cryptography, Phys. Lett. A, vol. 366, pp , [5] R. Ash, Information Theory. New York: Dover, 1990.
Designing Self-Synchronizing Stream Ciphers with Flat Dynamical Systems
Designing Self-Synchronizing Stream Ciphers with Flat Dynamical Systems Gilles Millérioux, Philippe Guillot, Jose Maria Amigo, Jamal Daafouz To cite this version: Gilles Millérioux, Philippe Guillot, Jose
More informationIN THIS PAPER, we consider a class of continuous-time recurrent
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 51, NO. 4, APRIL 2004 161 Global Output Convergence of a Class of Continuous-Time Recurrent Neural Networks With Time-Varying Thresholds
More informationMinimal positive realizations of transfer functions with nonnegative multiple poles
1 Minimal positive realizations of transfer functions with nonnegative multiple poles Béla Nagy Máté Matolcsi Béla Nagy is Professor at the Mathematics Department of Technical University, Budapest, e-mail:
More informationImpulsive Stabilization for Control and Synchronization of Chaotic Systems: Theory and Application to Secure Communication
976 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: FUNDAMENTAL THEORY AND APPLICATIONS, VOL. 44, NO. 10, OCTOBER 1997 Impulsive Stabilization for Control and Synchronization of Chaotic Systems: Theory and
More informationBreaking an encryption scheme based on chaotic Baker map
Breaking an encryption scheme based on chaotic Baker map Gonzalo Alvarez a, and Shujun Li b a Instituto de Física Aplicada, Consejo Superior de Investigaciones Científicas, Serrano 144 28006 Madrid, Spain
More informationOn the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,
More informationCRYPTANALYSIS OF FRIDRICH S CHAOTIC IMAGE ENCRYPTION
International Journal of Bifurcation and Chaos, Vol. 20, No. 5 (2010) 1405 1413 c World Scientific Publishing Company DOI: 10.1142/S0218127410026563 CRYPTANALYSIS OF FRIDRICH S CHAOTIC IMAGE ENCRYPTION
More information-Cryptosystem: A Chaos Based Public Key Cryptosystem
International Journal of Cryptology Research 1(2): 149-163 (2009) -Cryptosystem: A Chaos Based Public Key Cryptosystem 1 M.R.K. Ariffin and 2 N.A. Abu 1 Al-Kindi Cryptography Research Laboratory, Laboratory
More informationarxiv: v1 [cs.cr] 18 Jul 2009
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps Chengqing Li 1, David Arroyo 2, and Kwok-Tung Lo 1 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic University,
More informationAn efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice
PRAMANA c Indian Academy of Sciences Vol. 85, No. 4 journal of October 215 physics pp. 617 627 An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice RENFU
More informationFIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES
FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES Jovan Dj. Golić Security Innovation, Telecom Italia Via Reiss Romoli 274, 10148 Turin, Italy (Submitted August 2004-Final Revision April 200) ABSTRACT
More informationONE of the main applications of wireless sensor networks
2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 Coverage by Romly Deployed Wireless Sensor Networks Peng-Jun Wan, Member, IEEE, Chih-Wei Yi, Member, IEEE Abstract One of the main
More informationComparison of Selected Fast Orthogonal Parametric Transforms in Data Encryption
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 23 No. 2 (2015), pp. 55-68 Comparison of Selected Fast Orthogonal Parametric Transforms in Data Encryption Dariusz Puchala Lodz University of Technology Institute
More informationNONLINEAR TIME SERIES ANALYSIS, WITH APPLICATIONS TO MEDICINE
NONLINEAR TIME SERIES ANALYSIS, WITH APPLICATIONS TO MEDICINE José María Amigó Centro de Investigación Operativa, Universidad Miguel Hernández, Elche (Spain) J.M. Amigó (CIO) Nonlinear time series analysis
More informationCryptanalysis of a computer cryptography scheme based on a filter bank
NOTICE: This is the author s version of a work that was accepted by Chaos, Solitons & Fractals in August 2007. Changes resulting from the publishing process, such as peer review, editing, corrections,
More informationMaiorana-McFarland class: Degree optimization and algebraic properties
Downloaded from orbitdtudk on: Jan 10, 2019 Maiorana-McFarland class: Degree optimization and algebraic properties Pasalic, Enes Published in: I E E E Transactions on Information Theory Link to article,
More informationImplementation of the RSA algorithm and its cryptanalysis. Abstract. Introduction
Implementation of the RSA algorithm and its cryptanalysis Chandra M. Kota and Cherif Aissi 1 University of Louisiana at Lafayette, College of Engineering Lafayette, LA 70504, USA Abstract Session IVB4
More informationPotential Design for Electron Transmission in Semiconductor Devices
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 21, NO. 3, MAY 2013 869 Potential Design for Electron Transmission in Semiconductor Devices Jun Zhang, Senior Member, IEEE, Robert Kosut, Fellow, IEEE
More informationPERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS
PERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS Jörg Keller Hanno Wiese FernUniversität in Hagen LG Parallelität und VLSI 58084 Hagen, Germany joerg.keller@fernuni-hagen.de ABSTRACT Cryptographic
More informationLyapunov Stability of Linear Predictor Feedback for Distributed Input Delays
IEEE TRANSACTIONS ON AUTOMATIC CONTROL VOL. 56 NO. 3 MARCH 2011 655 Lyapunov Stability of Linear Predictor Feedback for Distributed Input Delays Nikolaos Bekiaris-Liberis Miroslav Krstic In this case system
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationResistance to Statistical Attacks of Parastrophic Quasigroup Transformation
Vol. 6, No. 9, 05 Resistance to Statistical Attacks of Parastrophic Quasigroup Transformation Verica Bakeva, Aleksandra Popovska-Mitrovikj and Vesna Dimitrova University Ss Cyril and Methodius - Skopje,
More informationIN this paper, we consider the capacity of sticky channels, a
72 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 1, JANUARY 2008 Capacity Bounds for Sticky Channels Michael Mitzenmacher, Member, IEEE Abstract The capacity of sticky channels, a subclass of insertion
More informationMulti-Map Orbit Hopping Chaotic Stream Cipher
Multi-Map Orbit Hopping Chaotic Stream Cipher Xiaowen Zhang 1, Li Shu 2, Ke Tang 1 Abstract In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum
More informationFast Cryptanalysis of the Matsumoto-Imai Public Key Scheme
Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme P. Delsarte Philips Research Laboratory, Avenue Van Becelaere, 2 B-1170 Brussels, Belgium Y. Desmedt Katholieke Universiteit Leuven, Laboratorium
More informationA Fast Digital Chaotic Generator for Secure Communication
A Fast Digital Chaotic Generator for Secure Communication Shih-Liang Chen TingTing Hwang Shu-Ming Chang Wen-Wei Lin Abstract In this paper, we propose a digitalized chaotic map, Variational Logistic Map
More informationNew Dynamical Key Dependent S-Box based on chaotic maps
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. IV (July Aug. 2015), PP 91-101 www.iosrjournals.org New Dynamical Key Dependent S-Box based
More informationOptimal Mean-Square Noise Benefits in Quantizer-Array Linear Estimation Ashok Patel and Bart Kosko
IEEE SIGNAL PROCESSING LETTERS, VOL. 17, NO. 12, DECEMBER 2010 1005 Optimal Mean-Square Noise Benefits in Quantizer-Array Linear Estimation Ashok Patel and Bart Kosko Abstract A new theorem shows that
More informationStability of interval positive continuous-time linear systems
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES, Vol. 66, No. 1, 2018 DOI: 10.24425/119056 Stability of interval positive continuous-time linear systems T. KACZOREK Białystok University of
More informationAitken and Neville Inverse Interpolation Methods over Finite Fields
Appl. Num. Anal. Comp. Math. 2, No. 1, 100 107 (2005) / DOI 10.1002/anac.200410027 Aitken and Neville Inverse Interpolation Methods over Finite Fields E.C. Laskari 1,3, G.C. Meletiou 2,3, and M.N. Vrahatis
More informationOn bounded redundancy of universal codes
On bounded redundancy of universal codes Łukasz Dębowski Institute of omputer Science, Polish Academy of Sciences ul. Jana Kazimierza 5, 01-248 Warszawa, Poland Abstract onsider stationary ergodic measures
More informationAN ELECTRIC circuit containing a switch controlled by
878 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 46, NO. 7, JULY 1999 Bifurcation of Switched Nonlinear Dynamical Systems Takuji Kousaka, Member, IEEE, Tetsushi
More informationDifferential properties of power functions
Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France
More informationAccelerated Search for Gaussian Generator Based on Triple Prime Integers
Journal of Computer Science 5 (9): 614-618, 2009 ISSN 1549-3636 2009 Science Publications Accelerated Search for Gaussian Generator Based on Triple Prime Integers 1 Boris S. Verkhovsky and 2 Md Shiblee
More informationNetwork Routing Capacity
1 Network Routing Capacity Jillian Cannons (University of California, San Diego) Randy Dougherty (Center for Communications Research, La Jolla) Chris Freiling (California State University, San Bernardino)
More informationAnalysis of Some Quasigroup Transformations as Boolean Functions
M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 08 Shannon s Theory (Contd.)
More informationFurther improving security of Vector Stream Cipher
NOLTA, IEICE Paper Further improving security of Vector Stream Cipher Atsushi Iwasaki 1a) and Ken Umeno 2 1 Fukuoka Institute of Technology Wajiro-higashi, Higashiku, Fukuoka 811-0295, Japan 2 Graduate
More informationHaar Spectrum of Bent Boolean Functions
Malaysian Journal of Mathematical Sciences 1(S) February: 9 21 (216) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 21 (ICMAE 1) MALAYSIAN JOURNAL OF MATHEMATICAL
More informationQuantum algorithms for computing short discrete logarithms and factoring RSA integers
Quantum algorithms for computing short discrete logarithms and factoring RSA integers Martin Ekerå, Johan Håstad February, 07 Abstract In this paper we generalize the quantum algorithm for computing short
More informationChaotic Based Secure Hash Algorithm
Chaotic Based Secure Hash Algorithm Mazen Tawfik Mohammed 1, Alaa Eldin Rohiem 2, Ali El-moghazy 3 and A. Z. Ghalwash 4 1,2 Military technical College, Cairo, Egypt 3 Higher Technological Institute, Cairo,
More informationOn inverting the VMPC one-way function
On inverting the VMPC one-way function KAMIL KULESZA Department of Applied Mathematics and Theoretical Physics, University of Cambridge, Cambridge, UK Institute of Fundamental Technological Research, Polish
More informationConcurrent Error Detection in S-boxes 1
International Journal of Computer Science & Applications Vol. 4, No. 1, pp. 27 32 2007 Technomathematics Research Foundation Concurrent Error Detection in S-boxes 1 Ewa Idzikowska, Krzysztof Bucholc Poznan
More informationarxiv: v1 [cs.cr] 5 Dec 2007
Cryptanalysis of an image encryption scheme based on the Hill cipher Chengqing Li a,, Dan Zhang b, and Guanrong Chen a arxiv:07120693v1 [cscr] 5 Dec 2007 a Department of Electronic Engineering, City University
More informationTHIS paper is aimed at designing efficient decoding algorithms
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used
More informationSmart Hill Climbing Finds Better Boolean Functions
Smart Hill Climbing Finds Better Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane, Queensland,
More informationInformation and Communications Security: Encryption and Information Hiding
Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 9: Encryption using Chaos Contents Chaos and Cryptography Iteration
More informationBinary Convolutional Codes of High Rate Øyvind Ytrehus
Binary Convolutional Codes of High Rate Øyvind Ytrehus Abstract The function N(r; ; d free ), defined as the maximum n such that there exists a binary convolutional code of block length n, dimension n
More informationONE can design optical filters using different filter architectures.
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 28, NO. 23, DECEMBER 1, 2010 3463 Comparison of Cascade, Lattice, and Parallel Filter Architectures Rohit Patnaik, Vivek Vandrasi, Christi K. Madsen, Ali A. Eftekhar,
More informationPerformance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels
Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering
More informationComments and Corrections
1386 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 59, NO 5, MAY 2014 Comments and Corrections Corrections to Stochastic Barbalat s Lemma and Its Applications Xin Yu and Zhaojing Wu Abstract The proof of
More informationDiagonal matrix solutions of a discrete-time Lyapunov inequality
Diagonal matrix solutions of a discrete-time Lyapunov inequality Harald K. Wimmer Mathematisches Institut Universität Würzburg D-97074 Würzburg, Germany February 3, 1997 Abstract Diagonal solutions of
More informationPrevention of Exponential Equivalence in Simple Password Exponential Key Exchange (SPEKE)
Symmetry 2015, 7, 1587-1594; doi:10.3390/sym7031587 OPEN ACCESS symmetry ISSN 2073-8994 www.mdpi.com/journal/symmetry Article Prevention of Exponential Equivalence in Simple Password Exponential Key Exchange
More informationChaos and Cryptography
Chaos and Cryptography Vishaal Kapoor December 4, 2003 In his paper on chaos and cryptography, Baptista says It is possible to encrypt a message (a text composed by some alphabet) using the ergodic property
More informationType 1.x Generalized Feistel Structures
Noname manuscript No. (will be inserted by the editor) Type 1.x Generalized eistel Structures Shingo Yanagihara Tetsu Iwata Received: date / Accepted: date Abstract We formalize the Type 1.x Generalized
More informationSynchronization and control in small networks of chaotic electronic circuits
Synchronization and control in small networks of chaotic electronic circuits A. Iglesias Dept. of Applied Mathematics and Computational Sciences, Universi~ of Cantabria, Spain Abstract In this paper, a
More informationTHE problem of phase noise and its influence on oscillators
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 54, NO. 5, MAY 2007 435 Phase Diffusion Coefficient for Oscillators Perturbed by Colored Noise Fergal O Doherty and James P. Gleeson Abstract
More informationA Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith
A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith Abstract Generating random numbers are mainly used to create secret keys or random
More informationStatistical and Linear Independence of Binary Random Variables
Statistical and Linear Independence of Binary Random Variables Kaisa Nyberg Department of Computer Science, Aalto University School of Science, Finland kaisa.nyberg@aalto.fi October 10, 2017 Abstract.
More informationNew Chaotic Permutation Methods for Image Encryption
IAENG International Journal of Computer Science, 37:4, IJCS_37_4_ New Chaotic Permutation Methods for Image Encryption Abir Awad, Abdelhakim Saadane 2 Abstract Since two decades, and in order to reach
More informationMODULAR ARITHMETIC KEITH CONRAD
MODULAR ARITHMETIC KEITH CONRAD. Introduction We will define the notion of congruent integers (with respect to a modulus) and develop some basic ideas of modular arithmetic. Applications of modular arithmetic
More informationTowards Provable Security of Substitution-Permutation Encryption Networks
Towards Provable Security of Substitution-Permutation Encryption Networks Zhi-Guo Chen and Stafford E. Tavares Department of Electrical and Computer Engineering Queen s University at Kingston, Ontario,
More informationStability Analysis and Synthesis for Scalar Linear Systems With a Quantized Feedback
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 48, NO 9, SEPTEMBER 2003 1569 Stability Analysis and Synthesis for Scalar Linear Systems With a Quantized Feedback Fabio Fagnani and Sandro Zampieri Abstract
More informationDATA receivers for digital transmission and storage systems
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 52, NO. 10, OCTOBER 2005 621 Effect of Loop Delay on Phase Margin of First-Order Second-Order Control Loops Jan W. M. Bergmans, Senior
More informationThree Theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module 2 w
JOURNAL OF L A TEX CLASS FILES, VOL. 13, NO. 9, SEPTEMBER 014 1 Three Theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module w Atsushi Iwasaki,
More informationOn the second smallest prime non-residue
On the second smallest prime non-residue Kevin J. McGown 1 Department of Mathematics, University of California, San Diego, 9500 Gilman Drive, La Jolla, CA 92093 Abstract Let χ be a non-principal Dirichlet
More informationFOR linear time-invariant systems with outputs, there are
154 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 2, FEBRUARY 2005 Nonlinear Norm-Observability Notions Stability of Switched Systems João P. Hespanha, Senior Member, IEEE, Daniel Liberzon, Senior
More information4.1 Exponential Functions
Graduate T.A. Department of Mathematics Dynamical Systems and Chaos San Diego State University April 9, 211 Definitions The functions that involve some combinations of basic arithmetic operations, powers,
More informationOn the mean connected induced subgraph order of cographs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,
More informationMaximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer
More informationEvaluation of the Maximum Productivity for Block Encryption Algorithms
Evaluation of the Maximum Productivity for Block Encryption Algorithms Authors: V.M. Fomichev, A.M. Koreneva, D.I. Zadorozhniy, A.R. Miftahutdinova CTCrypt 2018 / Suzdal Introduction Block ciphers are
More informationSecurity Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography
Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography Peter Schwabe October 21 and 28, 2011 So far we assumed that Alice and Bob both have some key, which nobody else has. How
More information1 Cryptographic hash functions
CSCI 5440: Cryptography Lecture 6 The Chinese University of Hong Kong 23 February 2011 1 Cryptographic hash functions Last time we saw a construction of message authentication codes (MACs) for fixed-length
More informationarxiv: v3 [cs.cr] 15 Jun 2017
Use of Signed Permutations in Cryptography arxiv:1612.05605v3 [cs.cr] 15 Jun 2017 Iharantsoa Vero RAHARINIRINA ihvero@yahoo.fr Department of Mathematics and computer science, Faculty of Sciences, BP 906
More informationThe ϵ-capacity of a gain matrix and tolerable disturbances: Discrete-time perturbed linear systems
IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765X. Volume 11, Issue 3 Ver. IV (May - Jun. 2015), PP 52-62 www.iosrjournals.org The ϵ-capacity of a gain matrix and tolerable disturbances:
More informationCHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS
24 CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS 3.1 INTRODUCTION Pseudo Random Number Generators (PRNGs) are widely used in many applications, such as numerical analysis, probabilistic
More informationarxiv:nlin/ v1 [nlin.cd] 10 Aug 2006
Cryptanalysis of a chaotic block cipher with external key and its improved version arxiv:nlin/0608020v1 [nlin.cd] 10 Aug 2006 Chengqing Li a,, Shujun Li b,, Gonzalo Álvarezc, Guanrong Chen a and Kwok-Tung
More informationThird-order nonlinearities of some biquadratic monomial Boolean functions
Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this
More informationA Byte-Based Guess and Determine Attack on SOSEMANUK
A Byte-Based Guess and Determine Attack on SOSEMANUK Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu and Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy
More information1 Cryptographic hash functions
CSCI 5440: Cryptography Lecture 6 The Chinese University of Hong Kong 24 October 2012 1 Cryptographic hash functions Last time we saw a construction of message authentication codes (MACs) for fixed-length
More informationLinear Cellular Automata as Discrete Models for Generating Cryptographic Sequences
Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences Pino Caballero-Gil Faculty of Mathematics. University of La Laguna 38271. La Laguna, Tenerife, Spain. pcaballe@ull.es
More informationarxiv:cs/ v1 [cs.cr] 2 Feb 2004
Problems of Baptista s chaotic cryptosystems and countermeasures for enhancement of their overall performances arxiv:cs/0402004v1 [cs.cr] 2 Feb 2004 Shujun Li, Guanrong Chen Department of Electronic Engineering,
More informationComputing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring
Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics University of Paderborn 33102 Paderborn,
More informationConstructing Explicit RIP Matrices and the Square-Root Bottleneck
Constructing Explicit RIP Matrices and the Square-Root Bottleneck Ryan Cinoman July 18, 2018 Ryan Cinoman Constructing Explicit RIP Matrices July 18, 2018 1 / 36 Outline 1 Introduction 2 Restricted Isometry
More informationFunctions on Finite Fields, Boolean Functions, and S-Boxes
Functions on Finite Fields, Boolean Functions, and S-Boxes Claude Shannon Institute www.shannoninstitute.ie and School of Mathematical Sciences University College Dublin Ireland 1 July, 2013 Boolean Function
More informationSecure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm
Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Gwo-Ruey Yu Department of Electrical Engineering I-Shou University aohsiung County 840, Taiwan gwoyu@isu.edu.tw
More informationIN this paper, we exploit the information given by the generalized
4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 10, OCTOBER 2006 A New Upper Bound on the Block Error Probability After Decoding Over the Erasure Channel Frédéric Didier Abstract Motivated by
More informationStabilizing and Destabilizing Control for a Piecewise-Linear Circuit
172 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: FUNDAMENTAL THEORY AND APPLICATIONS, VOL. 45, NO. 2, FEBRUARY 1998 Stabilizing and Destabilizing Control for a Piecewise-Linear Circuit Tadashi Tsubone
More informationDesign and Hardware Implementation of a Chaotic Encryption Scheme for Real-time Embedded Systems
Design and Hardware Implementation of a Chaotic Encryption Scheme for Real-time Embedded Systems Amit Pande and Joseph Zambreno Department of Electrical and Computer Engineering Iowa State University,
More informationSIMPLE CONDITIONS FOR PRACTICAL STABILITY OF POSITIVE FRACTIONAL DISCRETE TIME LINEAR SYSTEMS
Int. J. Appl. Math. Comput. Sci., 2009, Vol. 19, No. 2, 263 269 DOI: 10.2478/v10006-009-0022-6 SIMPLE CONDITIONS FOR PRACTICAL STABILITY OF POSITIVE FRACTIONAL DISCRETE TIME LINEAR SYSTEMS MIKOŁAJ BUSŁOWICZ,
More informationA Chaotic Encryption System Using PCA Neural Networks
A Chaotic Encryption System Using PCA Neural Networks Xiao Fei, Guisong Liu, Bochuan Zheng Computational Intelligence Laboratory, School of Computer Science and Engineering, University of Electronic Science
More informationConstructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 3, 2014 1 Constructions of Resilient S-Boxes with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes Wei-Guo Zhang, Member, IEEE, and
More informationA Generalized Uncertainty Principle and Sparse Representation in Pairs of Bases
2558 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 48, NO 9, SEPTEMBER 2002 A Generalized Uncertainty Principle Sparse Representation in Pairs of Bases Michael Elad Alfred M Bruckstein Abstract An elementary
More informationNonlinear Discrete-Time Observer Design with Linearizable Error Dynamics
622 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 48, NO. 4, APRIL 2003 Nonlinear Discrete-Time Observer Design with Linearizable Error Dynamics MingQing Xiao, Nikolaos Kazantzis, Costas Kravaris, Arthur
More informationA NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION Claudia Peerez Ruisanchez Universidad Autonoma del Estado de Morelos ABSTRACT In this paper is proposed a new algorithm to construct S-Boxes over
More informationOn Cryptographic Properties of the Cosets of R(1;m)
1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract
More informationCryptanalysis of a Multistage Encryption System
Cryptanalysis of a Multistage Encryption System Chengqing Li, Xinxiao Li, Shujun Li and Guanrong Chen Department of Mathematics, Zhejiang University, Hangzhou, Zhejiang 310027, China Software Engineering
More informationCONTROLLABILITY AND OBSERVABILITY OF 2-D SYSTEMS. Klamka J. Institute of Automatic Control, Technical University, Gliwice, Poland
CONTROLLABILITY AND OBSERVABILITY OF 2D SYSTEMS Institute of Automatic Control, Technical University, Gliwice, Poland Keywords: Controllability, observability, linear systems, discrete systems. Contents.
More informationA Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System
Commun. Theor. Phys. (Beijing China) 44 (2005) pp. 1115 1124 c International Academic Publishers Vol. 44 No. 6 December 15 2005 A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized
More informationExercise Sheet Cryptography 1, 2011
Cryptography 1 http://www.cs.ut.ee/~unruh/crypto1-11/ Exercise Sheet Cryptography 1, 2011 Exercise 1 DES The Data Encryption Standard (DES) is a very famous and widely used block cipher. It maps 64-bit
More information