• DocumentCode
    113397
  • Title

    Title: The promising future of chaos theory for personal cryptographic security

  • fYear
    2014
  • fDate
    8-10 Dec. 2014
  • Firstpage
    20
  • Lastpage
    20
  • Abstract
    The first example of the use of chaos for cryptographic purpose goes back to the early 90´ when Pécora and Carroll found how to synchronize chaotic systems. A first reported experimental secure communication system via chaotic synchronization was built two years after, using Chua´s circuit and was soon improved reducing the noise of the transmitted signal. Since this pioneer works, the possibility for self-synchronization of chaotic oscillation has sparked an avalanche of researches on application of chaos in cryptography. Nowadays, twenty-five years after the beginning of chaotic cryptography this research field continues to be active, as shown by the large number of papers being published and it is thriving in form of new and interesting proposals in all areas of modern cryptology. Some patents have been also taken out. However in spite of the momentum given by these researches, chaos-based cryptography does not yet gain advantage against traditional techniques like AES or RSA because most of the authors are still using chaotic mappings initially discovered long time ago. Nonetheless several improvements have been recently done in chaos theory, allowing to master completely the use of chaos in various industrial projects. Henceforth, it seems that the spitting point were chaos-based cryptography surpasses traditional techniques will be reached in the not too distant future. It is why we think that the use of chaos theory for Personal Cryptography Security (PCS) has a promising future. In this seminar we discuss about the fascinating perspectives of this research field.
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for
  • Conference_Location
    London, United Kingdom
  • Type

    conf

  • DOI
    10.1109/ICITST.2014.7038765
  • Filename
    7038765