You are on page 1of 3

Chaotic Encryption TechniquesChaotic Encryption Techniques Student: M. K. Ho, 50115849@plink.cityu.edu.hk Supervisor: Dr. Wong, K W, eekww@cityu.edu.hk Assessor: Dr.

PAO, Derek Chi-Wai, eedpao@cityu.edu.hk Date: Augest, 2000 - June, 2001 Project code: BECE-2000-KWW-04 Abstract Cryptography is an important technique to keep private data secretly in order to avoid unauthorized access. Nowadays the Internet becomes popular and encryption technology becomes essential to everyone. Traditional encryption methods such as DES, RSA etc... are widely used today and it seems to be computationally secure. In 1998, Baptista proposed a Chaotic Encryption Method, which seems to be much better than traditional encryption methods used today. Chaotic encryption is the new direction of cryptography and only few papers discuss on it. It makes use of chaotic system properties such as sensitive to initial condition and lost of information. But it still has several problems that cause it is not applicable, such as slow in speed and suffering from floating point operations. This project is to overcome these problems so that this technique is applicable. Introduction In this project, I focus on Baptista's method and continue the work down by Wong, W. K last year. Last year, Wong tried to use a three dimension chaotic system in encryption and proposed a new flatten methods to reduce the use of random number and to have faster encryption performance. My work is to implement the chaotic encryption program using different methods, evaluate and analyze its performance, try to overcome the problem of chaotic encryption methods, suggest some methods and concerns that is important in using chaotic encryption technique and propose some new methods to enhance chaotic encryption technique. Encryption Encryption is to rearrange the message into difference form so that the message is keep secret. The goal of encryption is to provide an easy and inexpensive means of encryption and decryption to all authorized users in possession of the appropriate key and difficult and expensive means to estimate the plain text without use of the key... [Detail] Chaotic Dynamics The purpose of this project is to learn the method to use chaotic function in security purpose. Three chaotic systems and it properties will be study in this project. They are Logistic map (1D), Lorenz equation (3D) and Rossler equation (3D). Chaotic Equation Properties Lyapunov Exponents Bifurcation Diagram Chaotic Encryption In 1998, Baptista publish a paper on Chaotic Encryption. This project is base on his method and the improved method proposed by Wong, W. K. last year. I will give analyze and evaluation to these methods in order to propose method for

improvement. General Chaotic Encryption Method Baptista's Method WWK Method 1 WWK Method 2 Using continues chaotic system for encryption Mapping trajectory into site Evaluation In the project, I design some experiments and base on the result obtained and base on the mathematical idea to analyze and evaluate the performance of chaotic encryption technique and compare all methods. This is a very important step in improving chaotic encryption method. Since chaotic encryption is new and there is lack of documentation or researches about the properties or behavior of chaotic encryption, this is impossible to understand or to improve without evidence. In the evaluation, I find out some characteristics and behaviors that are never done and never know before. And these properties are helpful to understand the performance of chaotic encryption technique. Trajectory Distribution Cipher Distribution Cipher Response Site Distribution Computational Complexity Block Size Analysis Cryptanalysis To learn the security of the chaotic encryption technique, learning and knowing the weakness and the possible attack method for this technique is essential. Somebody may think that if the encryption method can be analyzed, all works are meaningless. This is a wrong idea on Cryptography studies since all successful encryption method have it's own weakness on some issue providing that it still require a very long time to process (over few months by the state of the art computer). For example, RSA and DES are very common and useful encryption method on security standard used on Internet today, it also have some weakness and method for analysis. Thus, knowing the weakness of the chaotic encryption is not a bad idea but this can gives us an important idea on improvement. Following are some discussion on attacking chaotic encryption method. Classic Threats Brute-force attack Trajectory attack Lost of information attack Memory attack Improvement In this chapter, I am going to summarize and propose the methods to improve the chaotic encryption base on the result collected in this project. I will also describe the concerns and problems of chaotic encryption technique in this chapter. [Detail] Report Project Planning Time Chart [PDF] Progress Report [PDF] Presentation [Power Point Power Point (Full Vision)] Finial Report [PDF] References Alvarez, E., Fernandez, A., Garcia, P., Jimenez, J. & Marcano A. (1999

December 6). New approach to chaotic encryption. Physics Letters A, 263 (4-6), 373-375. [Source] Baptista, M. S. (1998 March 16). Cryptography with chaos. Physics Letters A, 240 (1-2), 50-54. [Source] Kocarev, L., Jakimoski, G., Stojanovski, T. & Parlitz, U. (1998). From chaotic maps to encryption schemes. Paper presented at the Conference on the International Symposium on Circuits and System, Naval Postgraduate School, California. Luby, M. (1996). Pseudorandomness and cryptographic applications. Princeton, N.J.: Princeton University. Menezes, A. J., Oorschot, P. V. & Vanstone, S. A. (1997). Handbook of applied crytography. Boca Raton, Fla.: CRC. Moon, F. C. (1992). Chaotic and fractal dynamics: An introduction for applied scientists and engineers. New York: Wiley Interscience. Ott, E. (1993). Chaos in dynamical systems. Canada: Cambridge University. Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C (2nd ed.). New York: John Wiley & Sons. Tezuka, S. (1995). Uniform random numbers: Thery and practice. Boston, Mass.: Kluwer Academic Publishers. Wong, W. K. (1999). Chaotic Encryption Technique (Report No. KWW-05-99A-BSIT). Hong Kong: City University of Hong Kong, Department of Electronic Engineering. [Homepage]

You might also like