Abstract
This paper reviews some developments in cryptographic primitives based on chaotic systems; such as Mandelbrot set, Julia set, and logistic map. However we classified the reviewed chaotic cryptosystems into two categorizes; public-key and nonpublic key cryptosystems. Chaos system has attracted much attention in the field of cryptography due to its properties such as being deterministic and sensitive to the initial values. As it will be indicated in the following sections, researchers are urgently looking for new public-key primitives (encryption, key sharing and digital signature) and nonpublic key system (Hash function) which might be able to replace standard cryptographic algorithms. In the surveyed nonpublic key system, we are showing the latest hash function (chaos Hash Algorithm 1 (CHA-1)) which is based on chaos theory. CHA-1 accepts messages with length less than 280 bits and produces a unique message digest of length 160-bit. As well as in the public-key systems, the creation of the Fractal based public-key primitives is possible because of the intrinsic connection between the Mandelbrot and Julia Fractal sets. The surveyed chaotic cryptosystems are attractive alternative to the traditional number theory based cryptosystems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alia M, Samsudin A (2007a) New key exchange protocol based on Mandelbrot and Julia Fractal sets. Int J Comput Sci Netw Secur 7(2):302–307
Alia M, Samsudin A (2007b) A new public-key cryptosystem based on Mandelbrot and Julia Fractal Sets. Asian J Inf Technol, AJIT 6(5):567–575
Alia M, Samsudin A (2007c) Generalized scheme for fractal based digital signature (GFDS). Int J Comput Sci Netw Secur 7(7):99–104
Branovic R, Martinelli GE (2003) Memory performance of public-key cryptography methods in mobile environments. ACM SIGARCH workshop on memory performance: dealing with applications, systems and architecture (MEDEA-03), New Orleans, LA, USA pp 24–31
Burnett S, Paine S (2001) RSA security’s official guide to cryptography. Osborne/McGraw-Hill, Berkeley
David C, Antwerpen HV (1990) Undeniable signatures. Crypto’89, LNCS, vol 435. Springer, Berlin, pp 212–216
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theor IT-22: 644–654
ElGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theor, IT 31(4):469–472
Franzblau A (1958) Primer of statistics for non-statisticians, 4th edn. Harcourt, Brace, New York
Giffin N (2006) Fractint. TRIUMF Project at the university of British Columbia campus in vancouver B.C. Canada http://spanky.triumf.ca/www/fractint/fractint.html, Accessed 22.02.2014
Kaoru K, Ogata W (1999) Efficient rabin-type digital signature scheme. Des, Codes Crypt 16(1):53–64
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput, pp 203–209
Law Public (2001) Electronic signatures in global and national commerce act. Weekly Compilation Presidential Doc 36:106–229
Lazareck L, Verch G, Peter JF (2001) Fractals in circuits. IEEE Conf 1:589–594
Mandelbrot BB (1982) The fractal geometry of nature. W. H. Freeman and Company, New York
Menezes A, Van Oorschot P, Vanstone S (1996) Handbook of applied cryptography. CRC Press 516:4–15
Michael M (2000) Julia Jewels: an exploration of Julia Sets. McGoodwin net
National Security Agency Announcing (2002) The secure hash standard. Federal Information Processing Standards Publication 180-2
NIST (1995) Secure hash standard. Federal information processing standard, FIPS-180-1
Patrzalek E (2006) Fractals: useful beauty general introduction to fractal geometry. Stan Ackermans Institute, IPO, Centre for User-System Interaction, Eindhoven University of Technology. http://fractal.org/Bewustzijns-Besturings-Model/Fractals-Useful-Beauty.htm. Accessed 25.01.2014
Peitgen O, Jrgens H, Saupe D (1992) Fractals for the classroom, part one, introduction to fractals and chaos. Springer, New York
Pete (2007) Mandelbrot and Julia sets, the math forum, http://mathforum.org/dr.math/. Accessed 22.01.2014
Rabin MO (1979) Digitalized signatures and public-key functions as intractable as factorization. The ACM Digital Library. Technical Report. UMI Order Number: TR-212., Massachusetts Institute of Technology
Rivest R (1992) The MD5 message-digest algorithm. Network information center RFC 1321, Menlo Park, pp 1–21
Rivest RA, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Ruhl M, Hartenstein H (1997) Optimal fractal coding is NP-Hard. In: Storer JA, Cohn M (eds) Proceedings DCC97 data compression conference, IEEE Computer Society Press
Spencer S (1997) (nd) About fractals. http://avatargraphics.com/fractalland/fractalfaq.html. Accessed 25.01.2014
Wang X (2006) Wikipedia, The Free Encyclopedia http://en.wikipedia.org/w/index.php?title=Xiaoyun_Wang&oldid=39379778
Wang X, Yin YL, Yu H (2005) Finding collisions in the full SHA-1. In: Shoup V (ed) Advances in cryptology—CRYPTO’05. Lecture notes in computer science, vol 3621. Springer, Berlin, pp 17–36
Winter D (2007) The mandelbrot set. Course online. Department of Mathematics. University of Michigan, USA
Zheng Y, Pieprzyk J, Haval (1993) A one-way hashing algorithm with variable length of output. In: Advances in cryptology—AUSCRYPT’92. Lecture notes in computer science, vol 718. Springer, Berlin, pp 83–104
Acknowledgments
The authors would like to thank Al Zaytoonah University of Jordan for supporting this study.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Alia, M.A. (2015). Cryptosystems Based on Chaos Theory. In: Erçetin, Ş., Banerjee, S. (eds) Chaos, Complexity and Leadership 2013. Springer Proceedings in Complexity. Springer, Cham. https://doi.org/10.1007/978-3-319-09710-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-09710-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09709-1
Online ISBN: 978-3-319-09710-7
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)