32,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
16 °P sammeln
  • Broschiertes Buch

This book is to design, implement, test and cryptanalyze three stream ciphers that are based on the multi-map orbit hopping mechanism (Mmohom), a generic method to design stream ciphers. Mmohocc, multi-map orbit hopping chaotic cipher: chaos has been connected to cryptography due to its confusion and diffusion, the two important properties of a secure cipher. We apply Mmohom to multiple chaotic systems to construct Mmohocc, which greatly accelerates chaos behavior and makes chaos more suitable for cryptographic purposes. The keystreams have passed two batteries of the most popular and…mehr

Produktbeschreibung
This book is to design, implement, test and cryptanalyze three stream ciphers that are based on the multi-map orbit hopping mechanism (Mmohom), a generic method to design stream ciphers. Mmohocc, multi-map orbit hopping chaotic cipher: chaos has been connected to cryptography due to its confusion and diffusion, the two important properties of a secure cipher. We apply Mmohom to multiple chaotic systems to construct Mmohocc, which greatly accelerates chaos behavior and makes chaos more suitable for cryptographic purposes. The keystreams have passed two batteries of the most popular and stringent statistical tests. Cryptanalysis shows that Mmohocc is resistant against known attacks. Mmohom-LFSR-based cipher: Mmohom is used in conjunction with multiple LFSRs (Linear Feedback Shift Register) to destroy the linearity of LFSRs. Cryptanalysis against algebraic attack is discussed. Mmohoct, multi-map orbit hopping cipher by T- functions: the T-function has maximal single cycle property; meanwhile it has some undesired algebraic patterns. We introduce the Mmohom to destroy the unwanted properties and build two experimental Mmohoct ciphers.
Autorenporträt
Xiaowen Zhang received a PhD in Computer Science from City University of New York (2007) and a PhD in Electrical Engineering from Northern Jiaotong University (1999). His research interests include information security, cryptography, quantum computing, wireless communications, biometrics, and RFID security and privacy.