Summary

International Symposium on Nonlinear Theory and Its Applications

2015

Session Number:B3L-B

Session:

Number:B3L-B-2

Randomness and Disorder of Chaotic Iterations. Applications in Information Security Field

Xiaole Fang,  Christophe Guyeux,  Qianxue Wang,  Jacques Bahi,  

pp.546-549

Publication Date:2015/12/1

Online ISSN:2188-5079

DOI:10.34385/proc.47.B3L-B-2

PDF download (168.1KB)

Summary:
Design and cryptanalysis of chaotic encryption schemes are major concerns to provide secured information systems. Pursuing our previous research works, some well-defined discrete chaotic iterations that satisfy the reputed Devaney's definition of chaos have been proposed. In this article, we summarize these contributions and propose applications in the fields of pseudorandom number generation, hash functions, and symmetric cryptography. For all these applications, the proofs of chaotic properties are outlined.