350 rub
Journal Nonlinear World №10 for 2010 г.
Article in number:
Research of the Enciphering Method Based on Use of Lorentz Attractor as the Generator of Determined Chaos
Authors:
V.V. Andreev, Ju.V. Sapozhnikova
Abstract:
The field of information safety is intensively developing at present. Very often maintenance of information safety is required at transfer of any computer types of the data usually sent, for example, by e-mail or by means of other electronic means, including Internet loading, audio, video and other files of the data. Especially the safety thorny question rises at realization of financial transactions, and also at message transfer in military or governmental contexts. If this information as a result of malefactors actions appear opened then the consequences for users can be catastrophic. For example, there can be huge financial losses, disclosure of the confidential information, trust loss from outside clients and infringement of activity of users. In these cases it would be possible to send the confidential data from the addressee to the receiver on safe communication channels, such as secret couriers, safe telephone lines, etc., but frequently it is impractical and is expensive. In paper the enciphering method of the information, based on application of the determined chaos is developed and investigated. As the generator of such chaos Lorentz attractor is used. The cryptographic analysis of algorithm is carried out. It is shown that the developed enciphering algorithm has certain advantages before existing analogues from the point of view of possible attempts of its breaking.
Pages: 599-604
References
  1. Kamel Ariffin Muhammad Rezal, Kamel Ariffin Mohd Atan. Chaotic asymmetric encryption process for data security// US Patent 20100034377, 2010.
  2. Ciet Mathieu, Farrugia Augustin J., Riendeau Jean-Francois. Method and apparatus for data protection system using geometry of fractals or other chaotic systems// US Patent 20100031039, 2010.
  3. Новоселов О.Н., Давыдов В.Ф., Карташов А.В. Способ шифрования текстов// Патент Российской Федерации Ru 2.302.702, H04L 9/14, 2006.
  4. Короновский А.А., Москаленко О.И., Попов П.В., Храмов А.Е. Способ секретной передачи информации// Патент Российской Федерации Ru 2.295.835, H04L 9/12, 2005.
  5. Kal-yanov G.N., Kal-yanov E.V. Coding Digital Information with the Use of Generators with Chaotic Dynamics // Journal of communications technologies and electronics. 2008. № 4. P. 434-442.
  6. Зайцев В.В., Зайцев О.В. Способ защиты информации с использованием алгоритма генерации хаотических колебаний// Вестник СамГУ - Естественнонаучная серия. 2006. №9 (49). С. 66-70.
  7. Lepsoy S., Oien G.E., Ramstad T.A. Attractor image compression with a fast non-iterative decoding algorithm// In book: Acoustics, Speech, and Signal Processing: 1993 IEEE International Conference. 1993. V.5. P. 337-340.
  8. Андреев В.В., Сапожникова Ю.В., Фомичев А.И. Детерминированный хаос и кодирование информации// Прикладная информатика. 2009. №6(24). С.80-85.
  9. Андреев В.В., Сапожникова Ю.В. Исследование алгоритма кодирования, основанного на детерминированном хаосе// Всеросс. конф. с элементами научной школы для молодежи «Проведение научных исследований в области хранения. Обработки и защиты информации»: сб. научн. трудов. Ульяновск: УлГТУ: В 4-х томах. Т.2. 2009. С. 578- 585.
  10. Сапожникова Ю.В., Андреев В.В. Хаос и кодирование информации// Информационные технологии в профессиональной деятельности и научной работе: сб. материалов Всеросс. научно-практич. конф. с международным участием; г. Йошкар- Ола: Марийский государственный технический университет: В 2-х частях. Ч.2. 2009. С. 9- 12.
  11. Шнайер Б. Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си. М.: Триумф. 2002.