DOI: https://doi.org/10.3103/S0735272706040042
Open Access Open Access  Restricted Access Subscription Access

Analysis of effectiveness of measures for concealment of information in communication systems and networks by chaotic dynamics methods

Pavlo Yu. Kostenko, A. V. Antonov, T. P. Kostenko

Abstract


The paper is devoted to analysis of information reticence in communication systems and networks when the reticence is achieved by the methods of chaotic dynamics. As distinct from traditional methods of information protection, which rely on “computational complexity” of cryptoanalysis, the advantage of the new method consists in ambiguity of inversion of the chaotic mapping. Characteristics of resistance of the method to some kinds of “krypto-invasions” are considered and defined.

Full Text:

PDF

References


PTITSYN, N.I. Application of the Deterministic Chaos Theory in Cryptography [in Russian]. Moscow: MGTU, 2002.

KOCAREV, L. "Chaos-based cryptography: a brief overview," IEEE Circuits Systems Mag., v.1, n.3, р.6-21, 2001. DOI: https://doi.org/10.1109/7384.963463.

KOCAREV, L.; TASEV, Z. "Public-key encryption based on Chebyshev maps," Proc. of Int. Symp. on Circuits and Systems, 25-28 May 2003, Bangkok, Thailand. IEEE, 2003, v.3, р.28-31. DOI: https://doi.org/10.1109/ISCAS.2003.1204947.

MASUDA, N.; AIHARA, K. "Cryptosystems with discretized chaotic maps," IEEE Trans. Circuits, Syst. I: Fund. Theory Applications, v.49, n.1, р.28-39, 2002. DOI: https://doi.org/10.1109/81.974872.

KOTULSKI, Zbigniew; SZCZEPAŃSKI, Janusz; GÓRSKI, Karol; PASZKIEWICZ, Andrzej; ZUGAJ, Anna. "Application of discrete chaotic dynamical systems in cryptography — DCC method," Int. J. Bifurcation Chaos, v.9, n.6, р.1121-1135, 1999. DOI: https://doi.org/10.1142/S0218127499000778.

DIFFIE, W.; HELLMAN, M.E. "New directions in cryptography," IEEE Trans. Inf. Theory, v.22, n.6, р.644-654, 1976. DOI: https://doi.org/10.1109/TIT.1976.1055638.

COWIE, James; DODSON, Bruce; ELKENBRACHT-HUIZING, R. Marije; LENSTRA, Arjen K.; MONTGOMERY, Peter L.; ZAYER, Jörg. "A world wide number field Sieve factoring record: on to 512 Bits," Proc. ASIACRYPT’96, Nov. 1996. DOI: https://doi.org/10.1007/BFb0034863.

ODLYZKO, A. "The future of integer factorization," CryptoBytes, Sum. 1995.

WIENER, M.J. "Cryptoanalysis of short RSA secret exponents," IEEE Trans. Inf. Theory, v.36, n.3, p.553-558, 1990. DOI: https://doi.org/10.1109/18.54902.

RIVEST, R.L.; SHAMIR, A.; ADLEMAN, L. "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, v.21, n.2, p.120-126, 1978. DOI: https://doi.org/10.1145/359340.359342.

The Federal Information Processing Standard. FIPS PUB 186, NIST USA, 1996.

ELGAMAL, T. "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, v.31, n.4, р.469-472, 1985. DOI: https://doi.org/10.1109/TIT.1985.1057074.

SCHNORR, C.P. "Efficient signature generation by smart cards," J. Cryptology, v.4, n.3, p.161-174, 1991. DOI: https://doi.org/10.1007/BF00196725.

KOTULSKI, Z.A.; SZCZEPANSKI, Janusz; GÓRSKI, Karol; GÓRSKA, Anna; PASZKIEWICZ, Andrzej. "On constructive approach to chatic pseudorandom number generators," Proc. of Regional Conf. on Military Communication and Information Systems, CIS Solutions for an Enlarged NATO, RCMIS 2000.

MOON, F.C. Chaotic Vibrations. An Introduction for Applied Scientists and Engineers. Wiley, 1987.

KOHDA, T.; YOSHIMURA, T. "Statistical attack on chaos-based Elgamal public key system," Proc. of IEEE Symp. on Circuits and Systems, ISCAS 2004, IEEE, 2004, p. 1-13.

STALLINGS, W. Cryptography and Network Security. Principles and Practice, 2nd ed. Prentice Hall, 1998.







© Radioelectronics and Communications Systems, 2004–2020
When you copy an active link to the material is required
ISSN 1934-8061 (Online), ISSN 0735-2727 (Print)
tel./fax +38044 204-82-31, 204-90-41