Multi-algorithmic Cryptography using Deterministic Chaos with Applications to Mobile Communications.

Jonathan Blackledge

Research output: Contribution to journalArticlepeer-review

Abstract

In this extended paper, we present an overview of the principal issues associated with cryptography, providing historically significant examples for illustrative purposes as part of a short tutorial for readers that are not familiar with the subject matter. This is used to introduce the role that nonlinear dynamics and chaos play in the design of encryption engines which utilize different types of Iteration Function Systems (IFS). The design of such encryption engines requires that they conform to the principles associated with diffusion and confusion for generating ciphers that are of a maximum entropy type. For this reason, the role of confusion and diffusion in cryptography is discussed giving a design guide to the construction of ciphers that are based on the use of IFS. We then present the background and operating framework associated with a new product - CrypsticTM - which is based on the application of multi-algorithmic IFS to design encryption engines mounted on a USB memory stick using both disinformation and obfuscation to ‘hide’ a forensically inert application. The protocols and procedures associated with the use of this product are also briefly discussed.
Original languageEnglish
Pages (from-to)23-64
JournalISAST Transactions on Electronics and Signal Processing
Volume2
Issue number1
DOIs
Publication statusPublished - 1 Jan 2008
Externally publishedYes

Keywords

  • cryptography
  • nonlinear dynamics
  • chaos
  • encryption engines
  • Iteration Function Systems
  • diffusion
  • confusion
  • ciphers
  • CrypsticTM
  • disinformation
  • obfuscation

Fingerprint

Dive into the research topics of 'Multi-algorithmic Cryptography using Deterministic Chaos with Applications to Mobile Communications.'. Together they form a unique fingerprint.

Cite this