Using the Deterministic Chaos in Variable Mode of Operation of Block Ciphers

  • Petr ZacekEmail author
  • Roman Jasek
  • David Malanik
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 347)


This paper describes creating the new variable mode of operation for block cipher, and it also discusses possibilities of using the deterministic chaos in this mode of operation. It discusses the use of deterministic chaos to make the mode of operation variable and pseudo-random. Main idea of this article is to design the mode of operation dependent on all parts of encryption process as plaintext, cipher text and previous used key, and to create the function controlled by deterministic chaos, where the chaotic system has role of pseudo-random number generator, which manages the rules how these parts are used. The logistic map as the simple deterministic chaos system is used for showing the example of the application.


Deterministic Chaos Block Cipher Mode of Operation Logistic Map Variability 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bellovin, S.M.: Modes of Operation. Columbia University, Columbia, USA (2009), (cit. January 30, 2015)
  2. 2.
    Weisstein, E.W.: Logistic Map. From MathWorld–A Wolfram Web Resource,
  3. 3.
    Modes Development. In: National Institute of Standards and Technology: Computer Security Resource Center (2001) (October 16, 2014), (cit. February 03, 2015)
  4. 4.
    Sprott, J.C.: Chaos and Time-Series Analysis. Oxford University Press (2003)Google Scholar
  5. 5.
    Senkerik, R., Pluhacek, M., Zelinka, I., Davendra, D., Oplatkova, Z.: A Brief Survey on the Chaotic Systems as the Pseudo Random Number Generators. In: Sanayei, A., Rössler, O.E., Zelinka, I. (eds.) ISCS 2014: Interdisciplinary Symposium on Complex Systems. Emergence, Complexity and Computation, vol. 14, pp. 205–214. Springer International Publishing (2015), doi:10.1007/978-3-319-10759-2_22Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Faculty of Applied InformaticsTomas Bata University in ZlinZlinCzech Republic

Personalised recommendations