Paper 2005/273
CRYPTOGRAPHY BASED ON CHAOTIC SYNCHRONIZATION: ROUND III
P G Vaidya and Sajini Anand
Abstract
This paper discusses cryptography based on the property of chaotic
synchronization. Specifically, it is about Round III of such a
cryptographic method. Round I showed the feasibility of using
chaotic synchronization for cryptography. Round II consisted of a
method to counter attack. This paper is Round III and shows how to
counter the counter attacks. First, we show numerical evidence that
synchronization is possible between two Lorenz systems if one system
sends information about
Note: -
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. none
- Keywords
- Chaotic CryptographySynchronizationSecure CommunicationSuper-key
- Contact author(s)
- pgvaidya @ nias iisc ernet in
- History
- 2005-08-17: received
- Short URL
- https://ia.cr/2005/273
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2005/273, author = {P G Vaidya and Sajini Anand}, title = {{CRYPTOGRAPHY} {BASED} {ON} {CHAOTIC} {SYNCHRONIZATION}: {ROUND} {III}}, howpublished = {Cryptology {ePrint} Archive, Paper 2005/273}, year = {2005}, url = {https://eprint.iacr.org/2005/273} }