Summary

the 2014 International Symposium on Nonlinear Theory and its Applications

2014

Session Number:C1L-A

Session:

Number:C1L-A2

Introducing the truly chaotic finite state machines and theirs applications in security field

Christophe Guyeux,  Qianxue Wang,  Xiaole Fang,  Jacques M. Bahi,  

pp.385-388

Publication Date:2014/9/14

Online ISSN:2188-5079

DOI:10.34385/proc.46.C1L-A2

PDF download (148.4KB)

Summary:
The truly chaotic finite machines introduced by authors in previous research papers are presented here. A state of the art in this discipline, encompassing all previous mathematical investigations, is provided, explaining how finite state machines can behave chaotically regarding the slight alteration of their inputs. This behavior is explained using Turing machines and formalized thanks to a special family of discrete dynamical systems called chaotic iterations. An illustrative example is finally given in the field of hash functions.