Some basic cryptographic requirements for chaos-based cryptosystems

G Alvarez, S Li - International journal of bifurcation and chaos, 2006 - World Scientific
In recent years, a large amount of work on chaos-based cryptosystems have been
published. However, many of the proposed schemes fail to explain or do not possess a …

A new chaotic algorithm for image encryption

H Gao, Y Zhang, S Liang, D Li - Chaos, Solitons & Fractals, 2006 - Elsevier
Recent researches of image encryption algorithms have been increasingly based on chaotic
systems, but the drawbacks of small key space and weak security in one-dimensional …

Discovering chaos-based communications by recurrence quantification and quantified return map analyses

V Rybin, D Butusov, E Rodionova… - … Journal of Bifurcation …, 2022 - World Scientific
Many studies show the possibility of transmitting messages in a protected and covert
manner using a noise-like chaotic waveform as a carrier. Among popular chaotic …

Analog chaos-based secure communications and cryptanalysis: a brief survey

S Li, G Alvarez, Z Li, WA Halang - arXiv preprint arXiv:0710.5455, 2007 - arxiv.org
A large number of analog chaos-based secure communication systems have been
proposed since the early 1990s exploiting the technique of chaos synchronization. A brief …

Image encryption by chaos mixing

Y Abanda, A Tiedeu - IET Image Processing, 2016 - Wiley Online Library
The need for image encryption is constantly on the rise and has led to the emergence of
many techniques in literature. In recent years, many chaos‐based encryption techniques …

Breaking a chaos-based secure communication scheme designed by an improved modulation method

S Li, G Alvarez, G Chen - Chaos, Solitons & Fractals, 2005 - Elsevier
Recently Bu and Wang [Bu S, Wang BH. Chaos, Solitons & Fractals 2004; 19 (4): 919–24]
proposed a simple modulation method aiming to improve the security of chaos-based …

Observers-based synchronization and input recovery for a class of nonlinear chaotic models

E Cherrier, M Boutayeb, J Ragot - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
In this paper, we propose a simple and efficient crypto-system based on a chaotic time delay
model. It consists of two steps: the first one assures the transmitter/receiver synchronization …

Return-map cryptanalysis revisited

S Li, G Chen, G Alvarez - International Journal of Bifurcation and …, 2006 - World Scientific
As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract
secret messages masked by chaos in secure communication schemes. Recently, a simple …

Randomness analysis for the generalized self-shrinking sequences

SD Cardell, V Requena, A Fúster-Sabater, AB Orúe - Symmetry, 2019 - mdpi.com
In cryptography, the property of randomness in pseudo-random generators is very important
to avoid any pattern in output sequences, to provide security against attacks, privacy and …

Synchronization and secure communication in time delayed semiconductor laser systems

TM Hoang, SK Palit, S Mukherjee, S Banerjee - Optik, 2016 - Elsevier
We investigate the synchronization in coupled time delayed semiconductor laser models
without and under the influence of external noise sources. The synchronization and its …