SlideShare a Scribd company logo
1 of 28
Chaos based
Cryptography
Presented by:
Amirul Haque Muhammad Hamid (16MCS001)
(16MCS012)
Introduction
• Chaos refers to the complex, difficult-to-predict behavior
found in nonlinear systems.
Chaos : the state of randomness or confusion
• Chaos theory: A field of study in mathematic
• Study the behavior of dynamic system with initial condition
• Sensitive dependence on initial conditions means that a very
small change in the initial state of a system can have a large
effect on its later state.
Characteristics of chaos
• They are aperiodic.
• They exhibit sensitive dependence on initial conditions and
unpredictable in the long term.
• They are governed by one or more control parameters, a
small change in which can cause the chaos to appear or
disappear.
• Their governing equations are nonlinear.
• Chaotic system will produce the same results if given the same
inputs, it is unpredictable in the sense that you can not predict
in what way the system's behavior will change for any change
in the input to that system. a random system will produce
different results when given the same inputs.
Types of system
• All systems can be basically divided into three types:
•
• 1.Deterministic systems
• These are systems for which for a given set of conditions the
result can be predicted and the output does not vary much with change in initial
conditions.
•
• 2. Stochastic systems
• These systems, which are not as reliable as deterministic
systems. Their output can be predicted only for a certain range of values.
•
• 3. Chaotic systems
• Chaotic systems are the most unpredictable of the three
systems. Moreover they are very sensitive to initial conditions and a small
change in initial conditions can bring about a great change in its output.
•
Example of Chaotic
System
• Chaos theory offers ordered models for seemingly
disorderly systems, such as:
 Weather patterns
 Turbulent Flow
 Population dynamics
 Stock Market Behavior
 Traffic Flow
 Nonlinear circuits
Bifurcation
• The logistic map shows a variety of behaviors and it has
transitions between these behaviors as we change the
parameter r. Such transitions in dynamical systems are called
bifurcations.
• Bifurcation is a scientific way to say something splits in
two—branches.
• If patterns bifurcate quickly enough, they can become
complex very fast, leading to bifurcation cascade and chaos.
Bifurcation Cont.
Lyapunov exponent
How to quantify chaos?
0
)(
ln
1
lim
d
td
tt 

d0
d(t)
The Lyapunov exponent characterizes the rate of exponential divergence of
nearby orbits
It is formally defined as:
The rate of divergence may depend on the orientation of the d0 vector
Cont..
• Lyapunov exponents are defined as the long time average
exponential rates of divergence of nearby states.
• If a system has at least one positive Lyapunov exponent, than the
system is chaotic.
• The larger the positive exponent, the more chaotic the system
becomeGives a measure for the predictability of a dynamic system
• Describes the average rate which predictability is lost
• Usually Calculate the Maximal Lyapunov Exponent
• Gives the best indication of predictability
• Positive value usually taken as an indication that the system is
chaotic
Exmaple
Information Entropy
• The information entropy is design to evaluate the
uncertainty in a random variable.
• The evaluation equation is
• The information entropy has a maximum when all signal
values have random distributions.
Chaos Based Cryptography
• Chaotic cryptology = chaotic cryptography + chaotic cryptanalysis
• Cryptography: The art of hiding messages
• Cryptanalysis: The art of decrypting or obtaining plain text
from hidden messages
Why someone choose chaos based cryptosystem over
traditional cryptosystem
• Traditional symmetric ciphers such as Advanced Encryption
Standard (AES) are designed with good confusion and diffusion
properties.
• These two properties can also be found in chaotic systems which
have desirable properties of pseudo-randomness, ergodicity, high
sensitivity to initial conditions and parameters.
• Chaotic maps have demonstrated great potential for information
security, especially image encryption, while the standard
encryption methods as the AES algorithm seem not to be suitable to
cipher such type of data.
Chaotic cryptography and standard algorithm
Similarities and differences between chaotic systems and cryptographic algorithms.
Highly secured
and
fast execution
How to design chaotic cryptosystem
Figure. A procedure for a design of a chaos-
based block-encryption algorithm.
Encryption Algorithm
The encryption process of the proposed algorithm [1]
Experimental Results of above algorithm
(a) Original image, (b-c-d) Histograms of the R, G, B components of the original image,
(e) Encrypted image, (f-g-h) Histograms of the R, G, B components of the encrypted image
Decrypting above encrypted image
(a) Encrypted image (Sailboat on lake), (b) Decrypted image by using K, (c) Decrypted image by using K1
Example 2:
Pseudo Random generator using chaotic system [2]
• Random numbers are mainly used to create
secret keys or random sequences.
• This Pseudo random number generator (PRNG) based
on chaotic maps and S-Box tables.
•
Block of the PRNG
Block diagram of the PRNG
Performance and Security Analysis
• Histogram Analysis
• Speed Analysis
Histogram of 43 000 numbers
Performance and Security Analysis
• Randomness Tests
Since the computed P-value of each test is > 0.01, then
conclude that the output sequence of our PRNG is random
Chaos Based Secure Hash
• The chaotic hash function is new trend in cryptography.
• Hashing using chaotic system needs defining the
mapping scheme for trajectory, choosing valid initial
condition and parameters
Diagram of chaotic hash function[3]
Detail construction of CBHF[3]
Application of chaos in
Cryptography
• Block cipher
• Pseudo random number generation
• Public Key algorithm
• Chaotic Communication
• Chaos in image encryption
• Chaotic Neuronal Networks
• Genetic networks
• Design of Chaotic Circuit
Summary
• Chaotic encryption not as well known as standard
encryption methods (e.g.,DES).
• Applicable to a wide range of encryption techniques –
e.g. chaotic masking.
• Potential to be as strong as other existing methods
• Potential to be easier to compute – eliminate need for file
scrambling
• Potentially less vulnerable to cryptanalysis
References
[1] R. Parvaz, M. Zarebnia, “A combination chaotic system and application in color image
encryption,” Optics and Laser Technology, Vol. 101, PP 30–41, (2018)
[1] Chanil Pak, Lilian Huang, A new color image encryption using combination of 1D chaotic
map, Signal Process.138 (2017) 129–137.
[3] Mohamed Amin, Osama S. Faragallah, Ahmed A. Abd El-Latif, “Chaos-based hash function
(CBHF) for cryptographic applications”, Chaos, Solitons and Fractals 42 (2012) 767–772.
[2] Nigel Crook and Tjeerd olde Scheper, A Novel Chaotic Neural Network Architecture
[3] Chaos and Time-Series Analysis, by J.C. Sprott, Oxford Press 2006
[4] S. M. Chang, M. C. Li and W. W. Lin, Asymptotic synchronization of modified logistic
hyper-chaotic systems and its applications. Nonlinear Analysis: Real World Applications, Vol.
10, Issue 2 (2009), pp. 869–880.
[5] Nigel Crook and Tjeerd olde Scheper, A Novel Chaotic Neural Network Architecture
[6] R. Parvaz ⇑, M. Zarebnia
THANK YOU

More Related Content

What's hot

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSADr.Florence Dayana
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation harshit chavda
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)farazvirk554
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design PrinciplesSHUBHA CHATURVEDI
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And DecryptionNA
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipherAntony Alex
 
Birthday Paradox explained
Birthday Paradox explainedBirthday Paradox explained
Birthday Paradox explainedSajith Ekanayaka
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 

What's hot (20)

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
DES
DESDES
DES
 
Hash Function
Hash Function Hash Function
Hash Function
 
Birthday Paradox explained
Birthday Paradox explainedBirthday Paradox explained
Birthday Paradox explained
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 

Similar to Seminar on Chaos Based Cryptography

The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
 
Impromptu ideas in respect of v2 v and other
Impromptu ideas in respect of v2 v and otherImpromptu ideas in respect of v2 v and other
Impromptu ideas in respect of v2 v and otherHarshit Srivastava
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyjournalBEEI
 
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks Muhammad Jawad Ikram
 
A New Chaotic Map for Secure Transmission
A New Chaotic Map for Secure TransmissionA New Chaotic Map for Secure Transmission
A New Chaotic Map for Secure TransmissionTELKOMNIKA JOURNAL
 
Markov Chain & Matrix Geometric Analysis.pptx
Markov Chain & Matrix Geometric Analysis.pptxMarkov Chain & Matrix Geometric Analysis.pptx
Markov Chain & Matrix Geometric Analysis.pptxHabibullahAbbasi2
 
Applied Stochastic Processes, Chaos Modeling, and Probabilistic Properties of...
Applied Stochastic Processes, Chaos Modeling, and Probabilistic Properties of...Applied Stochastic Processes, Chaos Modeling, and Probabilistic Properties of...
Applied Stochastic Processes, Chaos Modeling, and Probabilistic Properties of...e2wi67sy4816pahn
 
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkOBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkshesnasuneer
 
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkOBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkshesnasuneer
 
Modeling & Simulation Lecture Notes
Modeling & Simulation Lecture NotesModeling & Simulation Lecture Notes
Modeling & Simulation Lecture NotesFellowBuddy.com
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...sipij
 
From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions Gabriele D'Angelo
 
Chaos Communication
Chaos CommunicationChaos Communication
Chaos CommunicationAkshay Anand
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet ProtocoltxMosesOkumu4
 
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...Harshal Solao
 

Similar to Seminar on Chaos Based Cryptography (20)

The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
Impromptu ideas in respect of v2 v and other
Impromptu ideas in respect of v2 v and otherImpromptu ideas in respect of v2 v and other
Impromptu ideas in respect of v2 v and other
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey Study
 
Machine Learning, Stock Market and Chaos
Machine Learning, Stock Market and Chaos Machine Learning, Stock Market and Chaos
Machine Learning, Stock Market and Chaos
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks
 
A New Chaotic Map for Secure Transmission
A New Chaotic Map for Secure TransmissionA New Chaotic Map for Secure Transmission
A New Chaotic Map for Secure Transmission
 
Markov Chain & Matrix Geometric Analysis.pptx
Markov Chain & Matrix Geometric Analysis.pptxMarkov Chain & Matrix Geometric Analysis.pptx
Markov Chain & Matrix Geometric Analysis.pptx
 
Applied Stochastic Processes, Chaos Modeling, and Probabilistic Properties of...
Applied Stochastic Processes, Chaos Modeling, and Probabilistic Properties of...Applied Stochastic Processes, Chaos Modeling, and Probabilistic Properties of...
Applied Stochastic Processes, Chaos Modeling, and Probabilistic Properties of...
 
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkOBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
 
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkOBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
 
Modeling & Simulation Lecture Notes
Modeling & Simulation Lecture NotesModeling & Simulation Lecture Notes
Modeling & Simulation Lecture Notes
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
 
Stochastic hybrid system
Stochastic hybrid systemStochastic hybrid system
Stochastic hybrid system
 
From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions
 
Unit i
Unit iUnit i
Unit i
 
Chaos Communication
Chaos CommunicationChaos Communication
Chaos Communication
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
Open Systems Interconnection (OSI)
Open Systems Interconnection (OSI)Open Systems Interconnection (OSI)
Open Systems Interconnection (OSI)
 
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...
 

Recently uploaded

Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 

Recently uploaded (20)

Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 

Seminar on Chaos Based Cryptography

  • 1. Chaos based Cryptography Presented by: Amirul Haque Muhammad Hamid (16MCS001) (16MCS012)
  • 2. Introduction • Chaos refers to the complex, difficult-to-predict behavior found in nonlinear systems. Chaos : the state of randomness or confusion • Chaos theory: A field of study in mathematic • Study the behavior of dynamic system with initial condition • Sensitive dependence on initial conditions means that a very small change in the initial state of a system can have a large effect on its later state.
  • 3. Characteristics of chaos • They are aperiodic. • They exhibit sensitive dependence on initial conditions and unpredictable in the long term. • They are governed by one or more control parameters, a small change in which can cause the chaos to appear or disappear. • Their governing equations are nonlinear. • Chaotic system will produce the same results if given the same inputs, it is unpredictable in the sense that you can not predict in what way the system's behavior will change for any change in the input to that system. a random system will produce different results when given the same inputs.
  • 4. Types of system • All systems can be basically divided into three types: • • 1.Deterministic systems • These are systems for which for a given set of conditions the result can be predicted and the output does not vary much with change in initial conditions. • • 2. Stochastic systems • These systems, which are not as reliable as deterministic systems. Their output can be predicted only for a certain range of values. • • 3. Chaotic systems • Chaotic systems are the most unpredictable of the three systems. Moreover they are very sensitive to initial conditions and a small change in initial conditions can bring about a great change in its output. •
  • 5. Example of Chaotic System • Chaos theory offers ordered models for seemingly disorderly systems, such as:  Weather patterns  Turbulent Flow  Population dynamics  Stock Market Behavior  Traffic Flow  Nonlinear circuits
  • 6. Bifurcation • The logistic map shows a variety of behaviors and it has transitions between these behaviors as we change the parameter r. Such transitions in dynamical systems are called bifurcations. • Bifurcation is a scientific way to say something splits in two—branches. • If patterns bifurcate quickly enough, they can become complex very fast, leading to bifurcation cascade and chaos.
  • 8. Lyapunov exponent How to quantify chaos? 0 )( ln 1 lim d td tt   d0 d(t) The Lyapunov exponent characterizes the rate of exponential divergence of nearby orbits It is formally defined as: The rate of divergence may depend on the orientation of the d0 vector
  • 9. Cont.. • Lyapunov exponents are defined as the long time average exponential rates of divergence of nearby states. • If a system has at least one positive Lyapunov exponent, than the system is chaotic. • The larger the positive exponent, the more chaotic the system becomeGives a measure for the predictability of a dynamic system • Describes the average rate which predictability is lost • Usually Calculate the Maximal Lyapunov Exponent • Gives the best indication of predictability • Positive value usually taken as an indication that the system is chaotic
  • 11. Information Entropy • The information entropy is design to evaluate the uncertainty in a random variable. • The evaluation equation is • The information entropy has a maximum when all signal values have random distributions.
  • 12. Chaos Based Cryptography • Chaotic cryptology = chaotic cryptography + chaotic cryptanalysis • Cryptography: The art of hiding messages • Cryptanalysis: The art of decrypting or obtaining plain text from hidden messages
  • 13. Why someone choose chaos based cryptosystem over traditional cryptosystem • Traditional symmetric ciphers such as Advanced Encryption Standard (AES) are designed with good confusion and diffusion properties. • These two properties can also be found in chaotic systems which have desirable properties of pseudo-randomness, ergodicity, high sensitivity to initial conditions and parameters. • Chaotic maps have demonstrated great potential for information security, especially image encryption, while the standard encryption methods as the AES algorithm seem not to be suitable to cipher such type of data.
  • 14. Chaotic cryptography and standard algorithm Similarities and differences between chaotic systems and cryptographic algorithms. Highly secured and fast execution
  • 15. How to design chaotic cryptosystem Figure. A procedure for a design of a chaos- based block-encryption algorithm.
  • 16. Encryption Algorithm The encryption process of the proposed algorithm [1]
  • 17. Experimental Results of above algorithm (a) Original image, (b-c-d) Histograms of the R, G, B components of the original image, (e) Encrypted image, (f-g-h) Histograms of the R, G, B components of the encrypted image
  • 18. Decrypting above encrypted image (a) Encrypted image (Sailboat on lake), (b) Decrypted image by using K, (c) Decrypted image by using K1
  • 19. Example 2: Pseudo Random generator using chaotic system [2] • Random numbers are mainly used to create secret keys or random sequences. • This Pseudo random number generator (PRNG) based on chaotic maps and S-Box tables. •
  • 20. Block of the PRNG Block diagram of the PRNG
  • 21. Performance and Security Analysis • Histogram Analysis • Speed Analysis Histogram of 43 000 numbers
  • 22. Performance and Security Analysis • Randomness Tests Since the computed P-value of each test is > 0.01, then conclude that the output sequence of our PRNG is random
  • 23. Chaos Based Secure Hash • The chaotic hash function is new trend in cryptography. • Hashing using chaotic system needs defining the mapping scheme for trajectory, choosing valid initial condition and parameters Diagram of chaotic hash function[3]
  • 25. Application of chaos in Cryptography • Block cipher • Pseudo random number generation • Public Key algorithm • Chaotic Communication • Chaos in image encryption • Chaotic Neuronal Networks • Genetic networks • Design of Chaotic Circuit
  • 26. Summary • Chaotic encryption not as well known as standard encryption methods (e.g.,DES). • Applicable to a wide range of encryption techniques – e.g. chaotic masking. • Potential to be as strong as other existing methods • Potential to be easier to compute – eliminate need for file scrambling • Potentially less vulnerable to cryptanalysis
  • 27. References [1] R. Parvaz, M. Zarebnia, “A combination chaotic system and application in color image encryption,” Optics and Laser Technology, Vol. 101, PP 30–41, (2018) [1] Chanil Pak, Lilian Huang, A new color image encryption using combination of 1D chaotic map, Signal Process.138 (2017) 129–137. [3] Mohamed Amin, Osama S. Faragallah, Ahmed A. Abd El-Latif, “Chaos-based hash function (CBHF) for cryptographic applications”, Chaos, Solitons and Fractals 42 (2012) 767–772. [2] Nigel Crook and Tjeerd olde Scheper, A Novel Chaotic Neural Network Architecture [3] Chaos and Time-Series Analysis, by J.C. Sprott, Oxford Press 2006 [4] S. M. Chang, M. C. Li and W. W. Lin, Asymptotic synchronization of modified logistic hyper-chaotic systems and its applications. Nonlinear Analysis: Real World Applications, Vol. 10, Issue 2 (2009), pp. 869–880. [5] Nigel Crook and Tjeerd olde Scheper, A Novel Chaotic Neural Network Architecture [6] R. Parvaz ⇑, M. Zarebnia