Novel Public Key Encryption Technique Based on Multiple Chaotic Systems
- 26 August 2005
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review Letters
- Vol. 95 (9), 098702
- https://doi.org/10.1103/physrevlett.95.098702
Abstract
Public key encryption was first introduced by Diffie and Hellman in 1976. Since then, the Diffie-Hellman key exchange protocol has been used in developing public key systems such as Rivest-Shamir-Adleman and elliptic curve cryptography. Chaotic functions, so far, have been used for symmetric cryptography only. In this Letter we propose, for the first time, a methodology to use multiple chaotic systems and a set of linear functions for key exchange over an insecure channel. To the best of our knowledge, this is the first Letter that reports the use of chaotic systems for public key cryptography. We have shown that the security of the proposed algorithm grows as , where , , and are large numbers that can be chosen as the parameters of the cryptosystem.
Keywords
This publication has 22 references indexed in Scilit:
- Chaos-based random number generators. Part II: practical realizationIEEE Transactions on Circuits and Systems I: Regular Papers, 2001
- Chaos-based random number generators-part I: analysis [cryptography]IEEE Transactions on Circuits and Systems I: Regular Papers, 2001
- Chaos and cryptography: block encryption ciphers based on chaotic mapsIEEE Transactions on Circuits and Systems I: Regular Papers, 2001
- APPLICATION OF DISCRETE CHAOTIC DYNAMICAL SYSTEMS IN CRYPTOGRAPHY — DCC METHODInternational Journal of Bifurcation and Chaos, 1999
- Symmetric Ciphers Based on Two-Dimensional Chaotic MapsInternational Journal of Bifurcation and Chaos, 1998
- Cryptography with chaosPhysics Letters A, 1998
- Discrete chaotic cryptographyAnnalen der Physik, 1997
- ON THE DERIVATION OF A “CHAOTIC” ENCRYPTION ALGORITHMCryptologia, 1989
- Symmetric and Asymmetric EncryptionACM Computing Surveys, 1979
- New directions in cryptographyIEEE Transactions on Information Theory, 1976