Mathematical Treatment for Constructing a countermeasure against the one time pad attack on the Baptista Type Cryptosystem

The relationship between chaos and cryptography makes it natural to employ chaotic systems to design new cryptosystems. It is based on the facts that chaotic signals are usually noise-like and chaotic systems are very sensitive to initial conditions. Their sensitivity to initial conditions and their spreading out of trajectories over the whole interval seems to be a model that satisfies the classic Shannon requirements of confusion and diffusion (Shannon, 1949). From 1989 onwards, many different chaotic encryption systems have been proposed. The most celebrated cryptosystems based on the ergodicity property of ABSTRACT

[1]  X. Mou,et al.  Improving security of a chaotic encryption approach , 2001, Physics Letters A.

[2]  K. Wong,et al.  A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .

[3]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[4]  G. Álvarez,et al.  Cryptanalysis of an ergodic chaotic cipher , 2003 .

[5]  Yu-Huang Chu,et al.  Dynamic data encryption system based on synchronised chaotic systems , 1999 .

[6]  Kwok-wo Wong,et al.  A modified chaotic cryptographic method , 2001 .

[7]  Mohammad Jafar Tarokh,et al.  A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents , 2009, Int. J. Inf. Secur. Priv..

[8]  G. Álvarez,et al.  Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .

[9]  G. Álvarez,et al.  Cryptanalysis of a chaotic encryption system , 2000 .

[10]  Daniel Sanz,et al.  Integrating Access Policies into the Development Process of Hypermedia Web Systems , 2006 .

[11]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[12]  E. Alvarez,et al.  New approach to chaotic encryption , 1999 .

[13]  Kwok-Wo Wong,et al.  A chaotic cryptography scheme for generating short ciphertext , 2003 .

[14]  Kwok-Wo Wong,et al.  Baptista-type chaotic cryptosystems: problems and countermeasures , 2004, Physics Letters A.

[15]  A. Palacios,et al.  Cryptography with cycling chaos , 2002 .

[16]  Ljupco Kocarev,et al.  Analysis of some recently proposed chaos-based encryption algo-rithms , 2001 .

[17]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[18]  P. García,et al.  Communication through chaotic map systems , 2002 .

[19]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[20]  G. Álvarez,et al.  Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.

[21]  Hamid R. Nemati,et al.  Information Security and Ethics: Concepts, Methodologies, Tools and Applications , 2008 .

[22]  M. Baptista Cryptography with chaos , 1998 .

[23]  Saverio Mascolo,et al.  Observer design for cryptography based on hyperchaotic oscillators , 1998 .

[24]  Hamid R. Nemati International Journal of Information Security and Privacy , 2007 .

[25]  Gonzalo Alvarez,et al.  Cryptanalysis of a chaotic secure communication system , 2003 .

[26]  Wasim A. Al-Hamdani,et al.  Three Models to Measure Information Security Compliance , 2009, Int. J. Inf. Secur. Priv..

[27]  X. Mou,et al.  Performance analysis of Jakimoski–Kocarev attack on a class of chaotic cryptosystems , 2003 .