Analysis of effectiveness of measures for concealment of information in communication systems and networks by chaotic dynamics methods
DOI:
https://doi.org/10.3103/S0735272706040042Abstract
The paper is devoted to analysis of information reticence in communication systems and networks when the reticence is achieved by the methods of chaotic dynamics. As distinct from traditional methods of information protection, which rely on “computational complexity” of cryptoanalysis, the advantage of the new method consists in ambiguity of inversion of the chaotic mapping. Characteristics of resistance of the method to some kinds of “krypto-invasions” are considered and defined.References
PTITSYN, N.I. Application of the Deterministic Chaos Theory in Cryptography [in Russian]. Moscow: MGTU, 2002.
KOCAREV, L. "Chaos-based cryptography: a brief overview," IEEE Circuits Systems Mag., v.1, n.3, р.6-21, 2001. DOI: https://doi.org/10.1109/7384.963463.
KOCAREV, L.; TASEV, Z. "Public-key encryption based on Chebyshev maps," Proc. of Int. Symp. on Circuits and Systems, 25-28 May 2003, Bangkok, Thailand. IEEE, 2003, v.3, р.28-31. DOI: https://doi.org/10.1109/ISCAS.2003.1204947.
MASUDA, N.; AIHARA, K. "Cryptosystems with discretized chaotic maps," IEEE Trans. Circuits, Syst. I: Fund. Theory Applications, v.49, n.1, р.28-39, 2002. DOI: https://doi.org/10.1109/81.974872.
KOTULSKI, Zbigniew; SZCZEPAŃSKI, Janusz; GÓRSKI, Karol; PASZKIEWICZ, Andrzej; ZUGAJ, Anna. "Application of discrete chaotic dynamical systems in cryptography — DCC method," Int. J. Bifurcation Chaos, v.9, n.6, р.1121-1135, 1999. DOI: https://doi.org/10.1142/S0218127499000778.
DIFFIE, W.; HELLMAN, M.E. "New directions in cryptography," IEEE Trans. Inf. Theory, v.22, n.6, р.644-654, 1976. DOI: https://doi.org/10.1109/TIT.1976.1055638.
COWIE, James; DODSON, Bruce; ELKENBRACHT-HUIZING, R. Marije; LENSTRA, Arjen K.; MONTGOMERY, Peter L.; ZAYER, Jörg. "A world wide number field Sieve factoring record: on to 512 Bits," Proc. ASIACRYPT’96, Nov. 1996. DOI: https://doi.org/10.1007/BFb0034863.
ODLYZKO, A. "The future of integer factorization," CryptoBytes, Sum. 1995.
WIENER, M.J. "Cryptoanalysis of short RSA secret exponents," IEEE Trans. Inf. Theory, v.36, n.3, p.553-558, 1990. DOI: https://doi.org/10.1109/18.54902.
RIVEST, R.L.; SHAMIR, A.; ADLEMAN, L. "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, v.21, n.2, p.120-126, 1978. DOI: https://doi.org/10.1145/359340.359342.
The Federal Information Processing Standard. FIPS PUB 186, NIST USA, 1996.
ELGAMAL, T. "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, v.31, n.4, р.469-472, 1985. DOI: https://doi.org/10.1109/TIT.1985.1057074.
SCHNORR, C.P. "Efficient signature generation by smart cards," J. Cryptology, v.4, n.3, p.161-174, 1991. DOI: https://doi.org/10.1007/BF00196725.
KOTULSKI, Z.A.; SZCZEPANSKI, Janusz; GÓRSKI, Karol; GÓRSKA, Anna; PASZKIEWICZ, Andrzej. "On constructive approach to chatic pseudorandom number generators," Proc. of Regional Conf. on Military Communication and Information Systems, CIS Solutions for an Enlarged NATO, RCMIS 2000.
MOON, F.C. Chaotic Vibrations. An Introduction for Applied Scientists and Engineers. Wiley, 1987.
KOHDA, T.; YOSHIMURA, T. "Statistical attack on chaos-based Elgamal public key system," Proc. of IEEE Symp. on Circuits and Systems, ISCAS 2004, IEEE, 2004, p. 1-13.
STALLINGS, W. Cryptography and Network Security. Principles and Practice, 2nd ed. Prentice Hall, 1998.