会议专题

ATTACKING OF CHAO-CRYPTOSYSTEM AND KEY RECOVERY

With the growing of electronic information transfer, arises the need to protect data and ensure its integrity. Thus, the communications security becomes an important task to guard any transmitted information against unwanted disclosure as well as to protect the data from unauthorized modification while in transit. Chaotic systems drive their inherent complexity from the extreme sensitivity of the system to the initial conditions. These properties match the security requirements where generating unpredictable chaotic signal can be used as a key stream in security systems. There are various techniques for mixing the original information with the chaotic

component Chaotic systems Cryptanalysis optimization functions

Mazhar B. Tayel Mohamed Farouk Abu-Elfadl Abdel-latef Ahmed Abdel-latef

Faculty of Engineering, Alexandria University Alexandria, EGYPT Military Technical College Cairo, EGYPT

国际会议

2011 International Conference on Security Science and Technology(ICSST 2011) (2011年安全科学与技术国际会议)

重庆

英文

163-166

2011-01-21(万方平台首次上网日期,不代表论文的发表时间)