Summary of Topological Study of Chaotic CBC Mode of Operation

In cryptography, block ciphers are the most fundamental elements in many symmetric-key encryption systems. The Cipher Block Chaining, denoted CBC, presents one of the most famous mode of operation that uses a block cipher to provide confidentiality or authenticity. In this research work, we intend to summarize our results that have been detailed in our previous series of articles. The goal of this series has been to obtain a complete topological study of the CBC block cipher mode of operation after proving his chaotic behavior according to the reputed definition of Devaney.

[1]  Roy L. Adler,et al.  Topological entropy , 2008, Scholarpedia.

[2]  M. Bernhard Introduction to Chaotic Dynamical Systems , 1992 .

[3]  Belgacem Bouallegue,et al.  Proving Chaotic Behavior of CBC Mode of Operation , 2016, Int. J. Bifurc. Chaos.

[4]  Davood Rezaeipour,et al.  The block cipher algorithm–properties, encryption efficiency analysis and security evaluation , 2010 .

[5]  Douglas Lind,et al.  An Introduction to Symbolic Dynamics and Coding , 1995 .

[6]  R. Bowen Entropy for group endomorphisms and homogeneous spaces , 1971 .

[7]  J. Banks,et al.  On Devaney's definition of chaos , 1992 .

[8]  CouturierRaphaël,et al.  Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU , 2015 .

[9]  Jacques M. Bahi,et al.  Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding , 2011, ArXiv.

[10]  Jacques M. Bahi,et al.  A Topological Study of Chaotic Iterations Application to Hash Functions , 2016, Computational Intelligence for Privacy and Security.

[11]  Belgacem Bouallegue,et al.  The dynamics of the CBC Mode of Operation , 2016, ArXiv.

[12]  Belgacem Bouallegue,et al.  Quantitative evaluation of chaotic CBC mode of operation , 2016, 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).

[13]  Jacques M. Bahi,et al.  Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU , 2015, The Journal of Supercomputing.

[14]  Jacques M. Bahi,et al.  Hash Functions Using Chaotic Iterations , 2017, ArXiv.