On the reliability of computational chaos-based cryptography for information exchange (1910.06116v1)
Abstract: This paper investigates the use of dynamical chaotic systems to encrypt and exchange images between different devices. Two devices were used to simulate the Cubic Map, having the same set of initial conditions, to generate an encryption key. Although both devices are floating-point compliant, the simulations, and consequently the encryption key, turned out to differ from one another. This indicates that many existing chaos-based encryption schemes are just special cases of computational arithmetic properties, in which some characteristics in the construction of the devices coincided. A method to mitigate such flaw was also presented.
Collections
Sign up for free to add this paper to one or more collections.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.