{"title":"A Cryptosystem Based on Multiple Chaotic Maps","authors":"Jin-mei Liu, S. Qiu, Fei Xiang, Huijuan Xiao","doi":"10.1109/ISIP.2008.99","DOIUrl":null,"url":null,"abstract":"A cryptosystem based on multiple chaotic maps is proposed. It is composed of a function f(times), a 2D chaotic map and two cascaded chaotic subsystems. The iteration times of the cascaded subsystem constructed by simple chaotic maps are changed with the outputs of the 2D chaotic map. Plaintext and the outputs of the cascaded subsystems are handled by the function f(times) to generate ciphertext. Simulation tests and security analyses indicate that the proposed cryptosystem is featured by large key space, high sensitivity to key, and resistance to statistical attacks and differential attacks.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposiums on Information Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIP.2008.99","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16
Abstract
A cryptosystem based on multiple chaotic maps is proposed. It is composed of a function f(times), a 2D chaotic map and two cascaded chaotic subsystems. The iteration times of the cascaded subsystem constructed by simple chaotic maps are changed with the outputs of the 2D chaotic map. Plaintext and the outputs of the cascaded subsystems are handled by the function f(times) to generate ciphertext. Simulation tests and security analyses indicate that the proposed cryptosystem is featured by large key space, high sensitivity to key, and resistance to statistical attacks and differential attacks.