Lorenz’s attractor applied to the stream cipher (Ali-Pacha generator)
暂无分享,去创建一个
Abstract The safety of information is primarily founded today on the calculation of algorithms whose confidentiality depends on the number of the necessary bits for the definition of a cryptographic key. If this type of system has proved reliable, then the increasing power of the means of calculation threatens the confidentiality of these methods. The powerful computers are certainly able to quantify and decipher information quickly, but their computing speed allows parallel cryptanalysis, which aims “to break” a code by discovering the key, for example, by testing all the possible keys. The only evocation of the principle of the quantum computer, with the potentially colossal capacities of calculation, has started a shock, even in the most savaged who are convinced of algorithmic cryptography. To mitigate this concern, we will introduce in this article a new cryptographic system based on chaotic concepts.
[1] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[2] I. Stewart. Does God Play Dice? The New Mathematics of Chaos , 1989 .
[3] A. Belgoraf,et al. Chaotic behavior for the secrete key of cryptographic system , 2005 .