Encryption By Chaotic Systems

Cryptographic systems are linked to the integrity of messages, authentication, data confidentiality. The chaotic approach allows to solve various aspects of security, whether by symmetric-key algorithms, both asymmetric public key. The most interesting aspect is undoubtedly the high level of safety that is independent of the length of the password or the computing power that you have available to decrypt the data.
The advantages of chaos are linked to high levels of security that can be made, both analog implementations, the voice signals, for example, both of those digital databases or information systems in general. This type of algorithms are to be used primarily for point-to-point or point to multi point. The disadvantages are to be found mainly in the initial investment that relates only to this great software house.
The starting point to create encryption systems based on chaos are the so-called chaotic models. These are recursive systems that evolve from certain initial values ​​indefinitely over time so essential and complex (to learn more about the chaotic maps you read this article). The Henon chaotic map is a good starting point to see how to create an encryption algorithm. By providing the initial conditions and iterate them for a finite number of points, it generates a chaotic series of data that seems random, but actually allows you to have a qualitative idea of ​​the map that generated them. It should be said that in addition to the initial conditions need to set the so-called control parameters that provide the map of the Henon chaotic or periodic operation, this data is the key to the encoding and decoding of our algorithm to encrypt data. Summing up we can list the steps to make these points:

  1. Choose a chaotic map.
  2. Customize the initial values ​​and control parameters.
  3. Iterate it N times.

As you can see enough that only one of these data is that all the different key found to be different, so it is very complicated to reproduce the same situation, characteristic of chaotic systems.
For now, let’s stop this brief introduction to cryptography with chaotic systems, but if I see interest from someone, then I can continue with describing and better yet, write an algorithm example that allows you to encrypt the data. Finally we could see how to enhance our algorithm by increasing the level of security.

This entry was posted in Programming. Bookmark the permalink.