The beta-transformation: a case study for chaos based cryptography
In this paper we study characteristics of the beta-transformation and its suitability as a candidate for implementation as a symmetric cryptosystem. For β > 1 the betatransformation is given by fβ (x) = βx(mod1) and x ∈ [0, 1]. It is well known that its Lyapunov exponent is λ = logβ. Since λ >...
| Main Authors: | Kamel Ariffin, Muhammad Rezal, Md Noorani, Mohd Salmi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Malaysian Society for Cryptology Research
2009
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/17024/ http://psasir.upm.edu.my/id/eprint/17024/1/The%20beta-transformation%20a%20case%20study%20for%20chaos%20based%20cryptography.pdf |
Similar Items
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
Constructing the prime orbit theorem for the beta transformation
by: Kamel Ariffin, Muhammad Rezal
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal
Published: (2009)
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
AAβ-Cryptosystem: a chaos based public key cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Enhancing the sensitivity of a chaos sensor for Internet of Things
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
Number theoretical foundations in cryptography
by: Mohd Atan, Kamel Ariffin
Published: (2016)
by: Mohd Atan, Kamel Ariffin
Published: (2016)
Conditions for counter measure against one time pad attack on Baptista type cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Modified Baptista type cryptosystem via matrix secret key.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2008)
The Mellin Transform of Generalized Functions and Some Applications
by: Kamel Ariffin, Muhammad Rezal
Published: (2002)
by: Kamel Ariffin, Muhammad Rezal
Published: (2002)
Project : case-management in Chaos
by: Chen, Fong Main
Published: (1997)
by: Chen, Fong Main
Published: (1997)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Machine based cryptography
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
Chaos synchronization of logistics, Qi and Maxwell-Bloch systems for chaos-based communication
by: Abdul Fataf, Nur Aisyah
Published: (2018)
by: Abdul Fataf, Nur Aisyah
Published: (2018)
Chaos in a hybrid food chain model
by: Jawad Ali, Safaa, et al.
Published: (2021)
by: Jawad Ali, Safaa, et al.
Published: (2021)
New quintupling point arithmetic 5P formulas for Lŏpez-Dahab coordinate over binary elliptic curve cryptography
by: Abdul Raheem, Waleed Khalid Amin, et al.
Published: (2019)
by: Abdul Raheem, Waleed Khalid Amin, et al.
Published: (2019)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
Quantum cryptography
by: Messikh, Azeddin
Published: (2011)
by: Messikh, Azeddin
Published: (2011)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Yhwh's battle against chaos in Ezekiel: the transformation of Judahite mythology for a new situation
by: Strine, C.A., et al.
Published: (2013)
by: Strine, C.A., et al.
Published: (2013)
Mengenal chaos for beginners
by: Sardar, Ziauddin, et al.
Published: (2001)
by: Sardar, Ziauddin, et al.
Published: (2001)
On rare mutation and chaos
by: Ganikhodjaev, Nasir, et al.
Published: (2013)
by: Ganikhodjaev, Nasir, et al.
Published: (2013)
The 'unimaginable' chaos continues
by: Abd Razak, Dzulkifli
Published: (2006)
by: Abd Razak, Dzulkifli
Published: (2006)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
History, development and trend of Fractal based biometric cryptography
by: Labu, Md Ahadullah, et al.
Published: (2015)
by: Labu, Md Ahadullah, et al.
Published: (2015)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Implementing cryptography in database
by: Kwan, Shong Hann
Published: (2010)
by: Kwan, Shong Hann
Published: (2010)
On the relation of seven chaos characterizations
by: Malouh Baloush,, et al.
Published: (2024)
by: Malouh Baloush,, et al.
Published: (2024)
Web-based question bank / Chao Ai Ling
by: Chao, Ai Ling
Published: (2004)
by: Chao, Ai Ling
Published: (2004)
Analysable Chaos-based Design Paradigms For Cryptographic Applications
by: Abba, Abubakar
Published: (2024)
by: Abba, Abubakar
Published: (2024)
Generation and statistical analysis of chaos-based pseudorandom sequences
by: Hina, Aliyu Danladi
Published: (2019)
by: Hina, Aliyu Danladi
Published: (2019)
The students' self perception on learning C++ programming via the cryptography project: a case study
by: Kamarudin, Shafinah, et al.
Published: (2022)
by: Kamarudin, Shafinah, et al.
Published: (2022)
A review on multimedia communications cryptography
by: Salem, Yasser, et al.
Published: (2011)
by: Salem, Yasser, et al.
Published: (2011)
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Similar Items
-
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008) -
Constructing the prime orbit theorem for the beta transformation
by: Kamel Ariffin, Muhammad Rezal
Published: (2009) -
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019) -
AAβ-Cryptosystem: a chaos based public key cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009) -
Enhancing the sensitivity of a chaos sensor for Internet of Things
by: Kadhim, Hayder Natiq, et al.
Published: (2019)