Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
            
  Top » Catalog » Books » Computer Science and Robotics » Horizons in Computer Science Research. Volume 4 » My Account  |  Cart Contents  |  Checkout   
Quick Find
  
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
Theory of Literature
$270.00
Shopping Cart more
0 items
Information
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
Notifications more
NotificationsNotify me of updates to Chaotic Map Cryptography and Security (pp.301-332)
Tell A Friend
 
Tell someone you know about this product.
Chaotic Map Cryptography and Security (pp.301-332) $100.00
Authors:  (Alexander N. Pisarchik, Massimiliano Zanin, Centro de Investigaciones en Optica, Loma del Bosque, Leon, Guanajuato, Mexico, and others)
Abstract:
In the last decade, chaos has emerged as a new promising candidate for cryptography
because many chaos fundamental characteristics such as a broadband spectrum,
ergodicity, and high sensitivity to initial conditions are directly connected with two
basic properties of good ciphers: confusion and diffusion. In this chapter we recount
some of the saga undergone by this field; we review the main achievements in the
field of chaotic cryptography, starting with the definition of chaotic systems and their
properties and the difficulties it has to outwit. According to their intrinsic dynamics,
chaotic cryptosystems are classified depending on whether the system is discrete or
continuous. Due to their simplicity and rapidity the discrete chaotic systems based
on iterative maps have received a lot of attention. In spite of the significant achievements
accomplished in this field, there are still many problems, basically speed, that
restrict the application of existing encoding/decoding algorithms to real systems. The
major advantages and drawbacks of the most popular chaotic map ciphers in terms of
security and computational cost are analyzed. The most significant cryptanalytic techniques
are considered and applied for testing the security of some chaotic algorithms.
Finally, future trends in the development of this topic are discussed. 


Available Options:
Version:
Special Focus Titles
01.Violent Communication and Bullying in Early Childhood Education
02.Cultural Considerations in Intervention with Women and Children Exposed to Intimate Partner Violence
03.Chronic Disease and Disability: The Pediatric Lung
04.Fruit and Vegetable Consumption and Health: New Research
05.Fire and the Sword: Understanding the Impact and Challenge of Organized Islamism. Volume 2

Nova Science Publishers
© Copyright 2004 - 2020

Chaotic Map Cryptography and Security (pp.301-332)