<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta charset="utf-8">
<meta name="generator" content="pdf2htmlEX">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<link rel="stylesheet" href="https://static.pudn.com/base/css/base.min.css">
<link rel="stylesheet" href="https://static.pudn.com/base/css/fancy.min.css">
<link rel="stylesheet" href="https://static.pudn.com/prod/directory_preview_static/622b6d7915da9b288bc09a40/raw.css">
<script src="https://static.pudn.com/base/js/compatibility.min.js"></script>
<script src="https://static.pudn.com/base/js/pdf2htmlEX.min.js"></script>
<script>
try{
pdf2htmlEX.defaultViewer = new pdf2htmlEX.Viewer({});
}catch(e){}
</script>
<title></title>
</head>
<body>
<div id="sidebar" style="display: none">
<div id="outline">
</div>
</div>
<div id="pf1" class="pf w0 h0" data-page-no="1"><div class="pc pc1 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/622b6d7915da9b288bc09a40/bg1.jpg"><div class="t m0 x1 h2 y1 ff1 fs0 fc0 sc0 ls0 ws0">Physics<span class="_"> </span>L<span class="_ _0"></span>etters<span class="_"> </span>A<span class="_ _1"> </span>309<span class="_"> </span>(2003)<span class="_ _1"> </span>75–82</div><div class="t m0 x2 h2 y2 ff1 fs0 fc1 sc0 ls1 ws0">www<span class="_ _2"></span>.elsevier<span class="_ _2"></span>.com/locate/pla</div><div class="t m0 x3 h3 y3 ff1 fs1 fc0 sc0 ls2 ws0">Discrete<span class="_"> </span>chaotic<span class="_ _3"> </span>cryptography<span class="_ _3"> </span>using<span class="_"> </span>e<span class="_ _2"></span>xternal<span class="_ _3"> </span>ke<span class="_ _2"></span>y</div><div class="t m0 x4 h4 y4 ff1 fs2 fc0 sc0 ls3 ws0">N.K.<span class="_"> </span>P<span class="_ _2"></span>areek</div><div class="t m0 x5 h2 y5 ff1 fs0 fc0 sc0 ls4 ws0">a<span class="ff2">,</span>b</div><div class="t m0 x6 h4 y4 ff1 fs2 fc0 sc0 ls5 ws0">,<span class="_"> </span>V<span class="_ _4"></span>inod<span class="_"> </span>P<span class="_ _2"></span>atidar</div><div class="t m0 x7 h2 y5 ff1 fs0 fc0 sc0 ls4 ws0">a</div><div class="t m0 x8 h4 y4 ff1 fs2 fc0 sc0 ls6 ws0">,K<span class="_ _5"></span>.<span class="_ _5"></span>K<span class="_ _5"></span>.S<span class="_ _5"></span>u<span class="_ _5"></span>d</div><div class="t m0 x9 h2 y5 ff1 fs0 fc0 sc0 ls4 ws0">a<span class="ff2">,</span>b<span class="ff2">,<span class="ff3">∗</span></span></div><div class="t m0 xa h5 y6 ff1 fs3 fc0 sc0 ls4 ws0">a</div><div class="t m0 xb h6 y7 ff4 fs0 fc0 sc0 ls7 ws0">Department<span class="_ _1"> </span>of<span class="_"> </span>Physics,<span class="_ _1"> </span>Colle<span class="_ _2"></span>ge<span class="_ _1"> </span>of<span class="_"> </span>Science<span class="_ _1"> </span>Campus,<span class="_ _1"> </span>M.L.S.<span class="_"> </span>University<span class="_ _2"></span>,<span class="_ _1"> </span>Udaipur<span class="_ _1"> </span>313002,<span class="_"> </span>India</div><div class="t m0 xc h5 y8 ff1 fs3 fc0 sc0 ls4 ws0">b</div><div class="t m0 xd h6 y9 ff4 fs0 fc0 sc0 ls8 ws0">Computer<span class="_ _1"> </span>Centre<span class="_ _2"></span>,<span class="_"> </span>M.<span class="_ _0"></span>L.S.<span class="_"> </span>University<span class="_ _2"></span>,<span class="_ _1"> </span>Udaipur<span class="_ _1"> </span>313002,<span class="_ _1"> </span>India</div><div class="t m0 xe h2 ya ff1 fs0 fc0 sc0 ls9 ws0">Recei<span class="_ _2"></span>ved<span class="_ _1"> </span>23<span class="_"> </span>October<span class="_ _1"> </span>2002;<span class="_"> </span>received<span class="_ _1"> </span>in<span class="_"> </span>revised<span class="_"> </span>form<span class="_ _1"> </span>24<span class="_"> </span>December<span class="_ _1"> </span>2002;<span class="_ _1"> </span>accepted<span class="_ _1"> </span>7<span class="_"> </span>January<span class="_ _1"> </span>2003</div><div class="t m0 xf h2 yb ff1 fs0 fc0 sc0 lsa ws0">Communicated<span class="_ _1"> </span>by<span class="_"> </span>C.<span class="_ _0"></span>R.<span class="_"> </span>Doering</div><div class="t m0 x10 h7 yc ff5 fs4 fc0 sc0 lsb ws0">Abstract</div><div class="t m0 x11 h8 yd ff1 fs4 fc0 sc0 lsb ws0">In<span class="_"> </span>this<span class="_"> </span>Letter<span class="_ _2"></span>,<span class="_ _6"> </span>we<span class="_"> </span>propose<span class="_"> </span>a<span class="_"> </span>symmetric<span class="_"> </span>k<span class="_ _2"></span>ey<span class="_"> </span>block<span class="_ _6"> </span>cipher<span class="_"> </span>algorithm<span class="_"> </span>utilizing<span class="_"> </span>the<span class="_"> </span>essence<span class="_"> </span>of<span class="_"> </span>chaos.<span class="_"> </span>The<span class="_ _6"> </span>proposed<span class="_ _1"> </span>cryptosystem</div><div class="t m0 x10 h8 ye ff1 fs4 fc0 sc0 lsc ws0">does<span class="_ _7"> </span>not<span class="_"> </span>use<span class="_ _7"> </span>explicitly<span class="_"> </span>the<span class="_ _7"> </span>system<span class="_"> </span>parameter<span class="_ _7"> </span>or<span class="_"> </span>initial<span class="_ _7"> </span>condition<span class="_"> </span>of<span class="_ _7"> </span>the<span class="_ _1"> </span>chaotic<span class="_ _7"> </span>map<span class="_ _1"> </span>as<span class="_ _7"> </span>a<span class="_"> </span>secret<span class="_ _7"> </span>ke<span class="_ _2"></span>y<span class="_ _4"></span>.<span class="_ _7"> </span>Howe<span class="_ _2"></span>v<span class="_ _2"></span>er<span class="_ _2"></span>,<span class="_ _1"> </span>these<span class="_ _7"> </span>parameters</div><div class="t m0 x10 h8 yf ff1 fs4 fc0 sc0 lsd ws0">are<span class="_"> </span>g<span class="_ _2"></span>enerated<span class="_"> </span>by<span class="_ _6"> </span>an<span class="_"> </span>e<span class="_ _2"></span>xternal<span class="_"> </span>secret<span class="_ _6"> </span>k<span class="_ _2"></span>ey<span class="_"> </span>of<span class="_ _6"> </span>v<span class="_ _4"></span>ar<span class="_ _0"></span>iable<span class="_"> </span>length<span class="_ _6"> </span>(maximum<span class="_"> </span>128-bits)<span class="_"> </span>and<span class="_ _6"> </span>used<span class="_ _6"> </span>in<span class="_"> </span>our<span class="_ _6"> </span>algorithm.<span class="_"> </span>The<span class="_ _6"> </span>encryption<span class="_"> </span>of<span class="_ _6"> </span>each</div><div class="t m0 x10 h8 y10 ff1 fs4 fc0 sc0 lse ws0">block<span class="_"> </span>of<span class="_ _6"> </span>plaintext<span class="_ _6"> </span>has<span class="_"> </span>been<span class="_ _6"> </span>made<span class="_ _6"> </span>dependent<span class="_"> </span>on<span class="_ _6"> </span>the<span class="_ _6"> </span>secret<span class="_"> </span>ke<span class="_ _2"></span>y<span class="_ _6"> </span>and<span class="_"> </span>the<span class="_ _6"> </span>cryptosystem<span class="_"> </span>is<span class="_ _6"> </span>further<span class="_"> </span>made<span class="_ _6"> </span>robust<span class="_ _6"> </span>against<span class="_ _6"> </span>any<span class="_ _6"> </span>reasonable</div><div class="t m0 x10 h8 y11 ff1 fs4 fc0 sc0 lse ws0">attack<span class="_ _7"> </span>by<span class="_ _8"> </span>using<span class="_ _7"> </span>the<span class="_ _8"> </span>feedback<span class="_ _8"> </span>technique.<span class="_ _8"> </span>Simulati<span class="_ _0"></span>on<span class="_ _7"> </span>results<span class="_ _8"> </span>sho<span class="_ _2"></span>w<span class="_ _7"> </span>that<span class="_ _8"> </span>the<span class="_ _7"> </span>proposed<span class="_ _8"> </span>cryptosystem<span class="_ _8"> </span>requires<span class="_ _8"> </span>less<span class="_ _7"> </span>t<span class="_ _0"></span>ime<span class="_ _7"> </span>to<span class="_ _7"> </span>encrypt</div><div class="t m0 x10 h8 y12 ff1 fs4 fc0 sc0 lsf ws0">the<span class="_ _7"> </span>plainte<span class="_ _2"></span>xt<span class="_ _7"> </span>as<span class="_ _7"> </span>compare<span class="_ _2"></span>d<span class="_ _7"> </span>to<span class="_ _7"> </span>the<span class="_ _7"> </span>existin<span class="_ _2"></span>g<span class="_ _7"> </span>chaotic<span class="_ _7"> </span>crypto<span class="_ _2"></span>systems<span class="_ _7"> </span>and<span class="_ _7"> </span>further<span class="_"> </span>produces<span class="_ _7"> </span>the<span class="_ _7"> </span>cipherte<span class="_ _2"></span>xt<span class="_ _7"> </span>hav<span class="_ _2"></span>ing<span class="_ _7"> </span>flat<span class="_ _7"> </span>distrib<span class="_ _2"></span>ution<span class="_"> </span>of</div><div class="t m0 x10 h8 y13 ff1 fs4 fc0 sc0 ls10 ws0">same<span class="_"> </span>size<span class="_"> </span>as<span class="_"> </span>the<span class="_"> </span>p<span class="_ _2"></span>laintext.</div><div class="t m0 x10 h9 y14 ff6 fs0 fc0 sc0 ls4 ws0"><span class="_ _1"> </span><span class="ff1 fs4 ls11">2003<span class="_"> </span>E<span class="_ _0"></span>lsevier<span class="_"> </span>Science<span class="_"> </span>B.<span class="_ _0"></span>V<span class="_ _9"></span>.<span class="_"> </span>All<span class="_"> </span>r<span class="_ _0"></span>ights<span class="_"> </span>r<span class="_ _0"></span>eserved.</span></div><div class="t m0 x10 h2 y15 ff4 fs0 fc0 sc0 ls12 ws0">PA<span class="_ _0"></span>C<span class="_ _a"></span>S<span class="_ _a"></span>:<span class="_ _1"> </span><span class="ff1 ls13">05.45.<span class="_ _0"></span>+b</span></div><div class="t m0 x10 h2 y16 ff4 fs0 fc0 sc0 ls13 ws0">Ke<span class="_ _4"></span>ywords:<span class="_ _1"> </span><span class="ff1 ls14">Discrete<span class="_"> </span>chaotic<span class="_ _1"> </span>cryptography<span class="_ _7"> </span>(DCC);<span class="_"> </span>Block<span class="_ _1"> </span>ciphers;<span class="_ _1"> </span>Secret-key<span class="_"> </span>cryptography</span></div><div class="t m0 x10 ha y17 ff5 fs5 fc0 sc0 ls15 ws0">1.<span class="_ _b"> </span>Intr<span class="_ _2"></span>oduction</div><div class="t m0 x12 hb y18 ff1 fs5 fc0 sc0 ls16 ws0">The<span class="_"> </span>techni<span class="_ _2"></span>ques<span class="_ _1"> </span>of<span class="_"> </span>secure<span class="_ _1"> </span>communicat<span class="_ _2"></span>ion<span class="_ _1"> </span>by<span class="_"> </span>w<span class="_ _2"></span>hich</div><div class="t m0 x10 hb y19 ff1 fs5 fc0 sc0 ls17 ws0">one<span class="_"> </span>can<span class="_ _1"> </span>transmit<span class="_ _1"> </span>confidential<span class="_ _1"> </span>mess<span class="_ _2"></span>ages<span class="_"> </span>secreti<span class="_ _4"></span>vely<span class="_"> </span>are</div><div class="t m0 x10 hb y1a ff1 fs5 fc0 sc0 ls18 ws0">of<span class="_ _3"> </span>practical<span class="_ _c"> </span>interest<span class="_ _c"> </span>in<span class="_ _3"> </span>se<span class="_ _2"></span>veral<span class="_ _c"> </span>areas,<span class="_ _3"> </span>includi<span class="_ _2"></span>ng<span class="_ _c"> </span>data-</div><div class="t m0 x10 hb y1b ff1 fs5 fc0 sc0 ls19 ws0">bases,<span class="_"> </span>internet<span class="_"> </span>banking,<span class="_ _1"> </span>soft<span class="_ _2"></span>wares,<span class="_"> </span>protecti<span class="_ _2"></span>on<span class="_"> </span>of<span class="_"> </span>com-</div><div class="t m0 x10 hb y1c ff1 fs5 fc0 sc0 ls19 ws0">munication<span class="_ _1"> </span>channel<span class="_ _2"></span>s<span class="_"> </span>etc.<span class="_"> </span>A<span class="_ _1"> </span>cryptosys<span class="_ _2"></span>tem<span class="_ _1"> </span>is<span class="_"> </span>si<span class="_ _2"></span>mply<span class="_"> </span>an</div><div class="t m0 x10 hb y1d ff1 fs5 fc0 sc0 ls1a ws0">algorith<span class="_ _0"></span>m<span class="_ _3"> </span>th<span class="_ _0"></span>at<span class="_ _3"> </span>co<span class="_ _0"></span>n<span class="_ _2"></span>verts<span class="_ _3"> </span>an<span class="_ _d"> </span>origin<span class="_ _0"></span>al<span class="_ _3"> </span>intelligible<span class="_ _d"> </span>mes-</div><div class="t m0 x10 hb y1e ff1 fs5 fc0 sc0 ls1b ws0">sage,<span class="_ _b"> </span>referred<span class="_ _b"> </span>as<span class="_ _e"> </span>plainte<span class="_ _2"></span>xt,<span class="_ _e"> </span>into<span class="_ _b"> </span>apparently<span class="_ _e"> </span>random</div><div class="t m0 x10 hb y1f ff1 fs5 fc0 sc0 ls1c ws0">non-sense<span class="_ _8"> </span>message,<span class="_ _8"> </span>referred<span class="_ _8"> </span>as<span class="_ _c"> </span>ciphert<span class="_ _2"></span>ext<span class="_ _7"> </span>and<span class="_ _c"> </span>recov-</div><div class="t m0 x10 hb y20 ff1 fs5 fc0 sc0 ls1b ws0">ers<span class="_ _c"> </span>the<span class="_ _c"> </span>message<span class="_ _c"> </span>back<span class="_ _c"> </span>i<span class="_ _2"></span>n<span class="_ _c"> </span>its<span class="_ _c"> </span>original<span class="_ _c"> </span>form.<span class="_ _c"> </span>The<span class="_ _c"> </span>cryp-</div><div class="t m0 x11 h5 y21 ff1 fs3 fc0 sc0 ls4 ws0">*</div><div class="t m0 x13 h2 y22 ff1 fs0 fc0 sc0 ls1d ws0">Corresponding<span class="_ _1"> </span>author<span class="_ _2"></span>.</div><div class="t m0 x13 h2 y23 ff4 fs0 fc0 sc0 ls1e ws0">E-mail<span class="_ _1"> </span>addr<span class="_ _2"></span>ess:<span class="_ _1"> </span><span class="ff1 ls1f">kksud@yahoo.com<span class="_ _1"> </span>(K.K.<span class="_"> </span>Sud).</span></div><div class="t m0 x14 hb y17 ff1 fs5 fc0 sc0 ls20 ws0">tosystems<span class="_ _c"> </span>a<span class="_ _2"></span>vailable<span class="_ _8"> </span>in<span class="_ _c"> </span>the<span class="_ _c"> </span>literature<span class="_ _8"> </span>can<span class="_ _c"> </span>be<span class="_ _c"> </span>discussed</div><div class="t m0 x14 hb y24 ff1 fs5 fc0 sc0 ls20 ws0">with<span class="_"> </span>respect<span class="_"> </span>to<span class="_"> </span>the<span class="_"> </span>fo<span class="_ _0"></span>llowing<span class="_ _1"> </span>aspects:</div><div class="t m0 x15 hb y25 ff3 fs5 fc0 sc0 ls4 ws0">•<span class="_ _b"> </span><span class="ff1 ls21">Structure<span class="_ _1"> </span>of<span class="_ _1"> </span>the<span class="_ _1"> </span>encryption<span class="_ _6"> </span>algorithm;</span></div><div class="t m0 x15 hb y26 ff3 fs5 fc0 sc0 ls4 ws0">•<span class="_ _b"> </span><span class="ff1 ls1b">Method<span class="_"> </span>of<span class="_ _1"> </span>dis<span class="_ _2"></span>trib<span class="_ _2"></span>ution<span class="_ _1"> </span>of<span class="_"> </span>s<span class="_ _2"></span>ecret<span class="_"> </span>ke<span class="_ _2"></span>ys;</span></div><div class="t m0 x15 hb y27 ff3 fs5 fc0 sc0 ls4 ws0">•<span class="_ _b"> </span><span class="ff1 ls22">Method<span class="_"> </span>of<span class="_ _1"> </span>const<span class="_ _2"></span>ructing<span class="_ _1"> </span>a<span class="_ _2"></span>lgorithms.</span></div><div class="t m0 x14 hb y28 ff1 fs5 fc0 sc0 ls23 ws0">Based<span class="_ _d"> </span>on<span class="_ _d"> </span>the<span class="_ _e"> </span>structure<span class="_ _3"> </span>of<span class="_ _e"> </span>the<span class="_ _d"> </span>encryption<span class="_ _3"> </span>algorithm</div><div class="t m0 x14 hb y29 ff1 fs5 fc0 sc0 ls24 ws0">we<span class="_ _e"> </span>can<span class="_ _b"> </span>classify<span class="_ _e"> </span>cryptosystems<span class="_ _e"> </span>into<span class="_ _e"> </span>two<span class="_ _b"> </span>categories,</div><div class="t m0 x14 hb y2a ff1 fs5 fc0 sc0 ls25 ws0">namely<span class="_ _4"></span>,<span class="_ _c"> </span>stream<span class="_ _c"> </span>cipher<span class="_ _c"> </span>and<span class="_ _3"> </span>block<span class="_ _c"> </span>cipher<span class="_ _4"></span>.<span class="_ _c"> </span>In<span class="_ _3"> </span>a<span class="_ _c"> </span>stream</div><div class="t m0 x14 hb y2b ff1 fs5 fc0 sc0 ls26 ws0">cipher<span class="_ _8"> </span>algorithm,<span class="_"> </span>the<span class="_ _c"> </span>message<span class="_ _7"> </span>is<span class="_ _c"> </span>encrypted<span class="_ _8"> </span>bit-by-bit</div><div class="t m0 x14 hb y2c ff1 fs5 fc0 sc0 ls24 ws0">with<span class="_ _8"> </span>the<span class="_ _8"> </span>application<span class="_"> </span>of<span class="_ _8"> </span>a<span class="_ _8"> </span>secret<span class="_ _8"> </span>ke<span class="_ _2"></span>y<span class="_ _8"> </span>generator<span class="_"> </span>and<span class="_ _8"> </span>the</div><div class="t m0 x14 hb y2d ff1 fs5 fc0 sc0 ls23 ws0">decryption<span class="_ _6"></span>can<span class="_ _6"> </span>be<span class="_ _6"> </span>done<span class="_ _6"> </span>by<span class="_ _1"> </span>usi<span class="_ _2"></span>ng<span class="_ _6"> </span>the<span class="_ _1"> </span>s<span class="_ _2"></span>ame<span class="_ _6"> </span>algorithm<span class="_ _6"> </span>as</div><div class="t m0 x14 hb y2e ff1 fs5 fc0 sc0 ls27 ws0">in<span class="_"> </span>encryption,<span class="_ _6"> </span>and<span class="_"> </span>with<span class="_"> </span>the<span class="_"> </span>same<span class="_ _1"> </span>secret-ke<span class="_ _2"></span>y<span class="_"> </span>generator<span class="_ _4"></span>.</div><div class="t m0 x14 hb y2f ff1 fs5 fc0 sc0 ls25 ws0">In<span class="_"> </span>practice,<span class="_ _1"> </span>s<span class="_ _2"></span>hift<span class="_"> </span>re<span class="_ _2"></span>gister<span class="_ _4"></span>,<span class="_"> </span>non-linear<span class="_ _6"> </span>combination<span class="_"> </span>gen-</div><div class="t m0 x10 h9 y30 ff1 fs0 fc0 sc0 ls28 ws0">0375-9601/03/$<span class="_ _1"> </span>–<span class="_"> </span>see<span class="_ _1"> </span>front<span class="_"> </span>matter<span class="_ _d"> </span><span class="ff6 ls4"><span class="_"> </span></span><span class="ls29">2003<span class="_"> </span>E<span class="_ _0"></span>lsevier<span class="_"> </span>Science<span class="_ _1"> </span>B.V<span class="_ _9"></span>.<span class="_ _1"> </span>All<span class="_"> </span>rights<span class="_ _1"> </span>reserved.</span></div><div class="t m0 x10 h2 y31 ff1 fs0 fc0 sc0 ls2a ws0">doi:10.1016/S0375-9601(03)00122-1</div><a class="l" rel='nofollow' onclick='return false;'><div class="d m1"></div></a></div><div class="pi" data-data='{"ctm":[1.758242,0.000000,0.000000,1.758242,-43.956044,-87.912088]}'></div></div>
</body>
</html>
<div id="pf2" class="pf w0 h0" data-page-no="2"><div class="pc pc2 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://static.pudn.com/prod/directory_preview_static/622b6d7915da9b288bc09a40/bg2.jpg"><div class="t m0 x10 h2 y32 ff1 fs0 fc0 sc0 ls2b ws0">76<span class="_ _f"> </span><span class="ff4 ls29">N.K.<span class="_"> </span>P<span class="_ _2"></span>areek<span class="_"> </span>et<span class="_"> </span>al.<span class="_"> </span>/<span class="_ _1"> </span>Physics<span class="_"> </span>L<span class="_ _0"></span>etters<span class="_ _1"> </span>A<span class="_"> </span>309<span class="_"> </span>(2003)<span class="_ _1"> </span>75–82</span></div><div class="t m0 x10 hb y33 ff1 fs5 fc0 sc0 ls27 ws0">erator<span class="_ _2"></span>,<span class="_ _1"> </span>clock<span class="_ _1"> </span>controlled<span class="_ _1"> </span>generators<span class="_ _6"> </span>etc.<span class="_"> </span>are<span class="_ _1"> </span>used<span class="_ _1"> </span>as<span class="_"> </span>k<span class="_ _2"></span>ey</div><div class="t m0 x10 hb y34 ff1 fs5 fc0 sc0 ls2c ws0">generators.<span class="_ _8"> </span>Unlike<span class="_ _8"> </span>the<span class="_ _c"> </span>st<span class="_ _2"></span>ream<span class="_ _c"> </span>cipher<span class="_ _2"></span>,<span class="_ _8"> </span>in<span class="_ _c"> </span>block<span class="_ _8"> </span>cipher</div><div class="t m0 x10 hb y35 ff1 fs5 fc0 sc0 ls21 ws0">a<span class="_ _8"> </span>group<span class="_ _8"> </span>(blocks)<span class="_"> </span>of<span class="_ _8"> </span>bits<span class="_ _8"> </span>of<span class="_ _8"> </span>fixed<span class="_ _7"> </span>length<span class="_ _8"> </span>are<span class="_ _8"> </span>encrypted</div><div class="t m0 x10 hb y36 ff1 fs5 fc0 sc0 ls21 ws0">block-by-block.<span class="_"> </span>In<span class="_ _8"> </span>an<span class="_ _8"> </span>another<span class="_ _7"> </span>classificati<span class="_ _2"></span>on,<span class="_ _8"> </span>which<span class="_ _8"> </span>is</div><div class="t m0 x10 hb y37 ff1 fs5 fc0 sc0 ls2d ws0">based<span class="_ _6"> </span>on<span class="_ _6"> </span>method<span class="_ _6"> </span>of<span class="_ _6"> </span>distrib<span class="_ _2"></span>ution<span class="_ _6"> </span>of<span class="_ _6"> </span>secret<span class="_ _6"> </span>ke<span class="_ _2"></span>y<span class="_ _4"></span>,<span class="_ _6"> </span>one<span class="_ _6"> </span>clas-</div><div class="t m0 x10 hb y38 ff1 fs5 fc0 sc0 ls2e ws0">sifies<span class="_ _6"> </span>the<span class="_"> </span>cryptosys<span class="_ _2"></span>tems<span class="_ _6"> </span>into<span class="_ _1"> </span>t<span class="_ _2"></span>wo<span class="_ _1"> </span>cl<span class="_ _2"></span>asses<span class="_ _2"></span>-pri<span class="_ _2"></span>vate<span class="_ _6"> </span>(sym-</div><div class="t m0 x10 hb y39 ff1 fs5 fc0 sc0 ls2f ws0">metric)<span class="_ _3"> </span>key<span class="_ _3"> </span>and<span class="_ _3"> </span>pub<span class="_ _0"></span>lic<span class="_ _3"> </span>(asymmetr<span class="_ _0"></span>ic)<span class="_ _3"> </span>ke<span class="_ _2"></span>y<span class="_ _3"> </span>crypto<span class="_ _0"></span>sys-</div><div class="t m0 x10 hb y3a ff1 fs5 fc0 sc0 ls22 ws0">tems.<span class="_ _7"> </span>In<span class="_ _8"> </span>the<span class="_ _7"> </span>priv<span class="_ _2"></span>ate<span class="_"> </span>key<span class="_"> </span>cryptosystems<span class="_"> </span>sender<span class="_"> </span>and<span class="_ _8"> </span>re-</div><div class="t m0 x10 hb y3b ff1 fs5 fc0 sc0 ls30 ws0">cei<span class="_ _2"></span>ver<span class="_ _6"> </span>use<span class="_"> </span>the<span class="_ _6"> </span>same<span class="_ _1"> </span>ke<span class="_ _2"></span>y<span class="_ _6"> </span>for<span class="_ _1"> </span>the<span class="_ _6"> </span>encryption<span class="_ _1"> </span>and<span class="_ _6"> </span>decryp-</div><div class="t m0 x10 hb y3c ff1 fs5 fc0 sc0 ls27 ws0">tion,<span class="_ _6"> </span>respectively<span class="_ _4"></span>.<span class="_ _6"> </span>These<span class="_ _6"> </span>systems<span class="_ _6"> </span>are<span class="_"> </span>ef<span class="_ _2"></span>ficient<span class="_ _6"> </span>and<span class="_ _1"> </span>their</div><div class="t m0 x10 hb y3d ff1 fs5 fc0 sc0 ls1b ws0">security<span class="_ _3"> </span>depends<span class="_ _d"> </span>on<span class="_ _d"> </span>the<span class="_ _d"> </span>sta<span class="_ _2"></span>tistical<span class="_ _3"> </span>properties<span class="_ _3"> </span>o<span class="_ _0"></span>f<span class="_ _d"> </span>the</div><div class="t m0 x10 hb y3e ff1 fs5 fc0 sc0 ls1b ws0">random<span class="_"> </span>bit<span class="_ _8"> </span>sequence<span class="_"> </span>and<span class="_ _8"> </span>the<span class="_"> </span>length<span class="_ _7"> </span>o<span class="_ _0"></span>f<span class="_ _7"> </span>the<span class="_ _8"> </span>secret<span class="_ _8"> </span>ke<span class="_ _2"></span>y<span class="_ _4"></span>.</div><div class="t m0 x10 hb y3f ff1 fs5 fc0 sc0 ls31 ws0">The<span class="_"> </span>main<span class="_ _6"> </span>difficulty<span class="_ _1"> </span>with<span class="_ _6"> </span>the<span class="_"> </span>pri<span class="_ _2"></span>vate<span class="_ _6"> </span>key<span class="_ _6"> </span>cry<span class="_ _0"></span>ptosystems</div><div class="t m0 x10 hb y40 ff1 fs5 fc0 sc0 ls32 ws0">is<span class="_"> </span>in<span class="_ _8"> </span>the<span class="_"> </span>security<span class="_ _7"> </span>of<span class="_ _8"> </span>the<span class="_"> </span>secret<span class="_"> </span>key<span class="_"> </span>to<span class="_ _7"> </span>be<span class="_ _7"> </span>tr<span class="_ _0"></span>ansmitted<span class="_"> </span>to</div><div class="t m0 x10 hb y41 ff1 fs5 fc0 sc0 ls33 ws0">the<span class="_ _c"> </span>receiver<span class="_ _4"></span>.<span class="_ _c"> </span>Some<span class="_ _c"> </span>typical<span class="_ _3"> </span>examples<span class="_ _c"> </span>of<span class="_ _c"> </span>such<span class="_ _c"> </span>type<span class="_ _3"> </span>of</div><div class="t m0 x10 hb y42 ff1 fs5 fc0 sc0 ls34 ws0">cryptosystems<span class="_ _c"> </span>are:<span class="_ _8"> </span>classical<span class="_ _c"> </span>cryptosystems<span class="_ _8"> </span>(Su<span class="_ _0"></span>bstitu-</div><div class="t m0 x10 hb y43 ff1 fs5 fc0 sc0 ls1c ws0">tion<span class="_"> </span>and<span class="_ _7"> </span>V<span class="_ _4"></span>igenere),<span class="_"> </span>block<span class="_"> </span>ciphers<span class="_"> </span>(DES,<span class="_ _7"> </span>AES,<span class="_ _7"> </span>IDEA)</div><div class="t m0 x10 hb y44 ff1 fs5 fc0 sc0 ls35 ws0">and<span class="_ _e"> </span>LFSR-based<span class="_ _e"> </span>stream<span class="_ _e"> </span>ciphers.<span class="_ _e"> </span>In<span class="_ _e"> </span>the<span class="_ _e"> </span>public<span class="_ _e"> </span>key</div><div class="t m0 x10 hb y45 ff1 fs5 fc0 sc0 ls25 ws0">cryptosystems<span class="_ _8"> </span>sender<span class="_ _c"> </span>and<span class="_ _10"> </span>recei<span class="_ _2"></span>ver<span class="_ _8"> </span>use<span class="_ _c"> </span>different<span class="_ _8"> </span>keys</div><div class="t m0 x10 hb y46 ff1 fs5 fc0 sc0 ls36 ws0">for<span class="_ _3"> </span>the<span class="_ _3"> </span>encryption<span class="_ _3"> </span>and<span class="_ _d"> </span>decryption,<span class="_ _c"> </span>respectiv<span class="_ _2"></span>ely<span class="_ _4"></span>,<span class="_ _3"> </span>i.e.,</div><div class="t m0 x10 hb y47 ff1 fs5 fc0 sc0 ls21 ws0">these<span class="_ _3"> </span>cryptos<span class="_ _2"></span>ystems<span class="_ _c"> </span>work<span class="_ _3"> </span>wit<span class="_ _2"></span>h<span class="_ _3"> </span>a<span class="_ _3"> </span>pair<span class="_ _3"> </span>of<span class="_ _3"> </span>public<span class="_ _3"> </span>and</div><div class="t m0 x10 hb y48 ff1 fs5 fc0 sc0 ls21 ws0">pri<span class="_ _2"></span>vat<span class="_ _2"></span>e<span class="_ _10"> </span>keys<span class="_ _2"></span>.<span class="_ _8"> </span>All<span class="_ _10"> </span>public<span class="_ _8"> </span>keys<span class="_ _8"> </span>are<span class="_ _10"> </span>published<span class="_ _8"> </span>while<span class="_ _8"> </span>the</div><div class="t m0 x10 hb y49 ff1 fs5 fc0 sc0 ls27 ws0">pri<span class="_ _2"></span>vate<span class="_ _1"> </span>k<span class="_ _2"></span>eys<span class="_ _1"> </span>are<span class="_ _1"> </span>kept<span class="_ _1"> </span>s<span class="_ _2"></span>ecret.<span class="_"> </span>While<span class="_ _1"> </span>communicating<span class="_ _6"> </span>we</div><div class="t m0 x10 hb y4a ff1 fs5 fc0 sc0 ls37 ws0">use<span class="_ _8"> </span>p<span class="_ _0"></span>ublic<span class="_ _8"> </span>key<span class="_ _8"> </span>an<span class="_ _0"></span>d<span class="_ _8"> </span>the<span class="_ _10"> </span>private<span class="_"> </span>key<span class="_ _8"> </span>is<span class="_ _10"> </span>no<span class="_ _0"></span>t<span class="_ _8"> </span>transm<span class="_ _0"></span>itted.</div><div class="t m0 x10 hb y4b ff1 fs5 fc0 sc0 ls38 ws0">A<span class="_"> </span>few<span class="_ _1"> </span>e<span class="_ _2"></span>xamples<span class="_"> </span>of<span class="_ _1"> </span>this<span class="_"> </span>kind<span class="_ _1"> </span>are<span class="_ _1"> </span>RSA,<span class="_"> </span>ElGamal,<span class="_"> </span>etc.</div><div class="t m0 x12 hb y4c ff1 fs5 fc0 sc0 ls39 ws0">Most<span class="_ _10"> </span>of<span class="_ _10"> </span>the<span class="_ _c"> </span>existi<span class="_ _2"></span>ng<span class="_ _10"> </span>cryptosystems,<span class="_ _8"> </span>except<span class="_ _8"> </span>a<span class="_ _c"> </span>few<span class="_ _4"></span>,</div><div class="t m0 x10 hb y4d ff1 fs5 fc0 sc0 ls3a ws0">utilize<span class="_ _11"> </span>number<span class="_ _11"> </span>theory<span class="_ _4"></span>,<span class="_ _11"> </span>algebra,<span class="_ _11"> </span>combinatorics<span class="_ _12"> </span>and</div><div class="t m0 x10 hb y4e ff1 fs5 fc0 sc0 ls3b ws0">computer<span class="_ _d"> </span>arithmetic,<span class="_ _d"> </span>etc.<span class="_ _e"> </span>as<span class="_ _d"> </span>mathematical<span class="_ _e"> </span>tools<span class="_ _d"> </span>for</div><div class="t m0 x10 hb y4f ff1 fs5 fc0 sc0 ls23 ws0">constructi<span class="_ _2"></span>ng<span class="_"> </span>the<span class="_ _1"> </span>algori<span class="_ _2"></span>thms<span class="_ _1"> </span>for<span class="_ _1"> </span>the<span class="_"> </span>encrypti<span class="_ _2"></span>on<span class="_ _1"> </span>and<span class="_ _1"> </span>de-</div><div class="t m0 x10 hb y50 ff1 fs5 fc0 sc0 ls19 ws0">cryption.<span class="_ _6"> </span>W<span class="_ _9"></span>e<span class="_ _1"> </span>refer<span class="_ _6"> </span>the<span class="_ _6"> </span>readers<span class="_ _6"> </span>for<span class="_ _6"> </span>complete<span class="_ _6"> </span>descri<span class="_ _2"></span>ption</div><div class="t m0 x10 hb y51 ff1 fs5 fc0 sc0 ls3c ws0">of<span class="_"> </span>the<span class="_ _1"> </span>exi<span class="_ _2"></span>sting<span class="_ _1"> </span>crypt<span class="_ _2"></span>osyste<span class="_ _2"></span>ms<span class="_ _1"> </span>to<span class="_ _1"> </span>the<span class="_ _1"> </span>Refs.<span class="_ _1"> </span>[1–3].</div><div class="t m0 x12 hb y52 ff1 fs5 fc0 sc0 ls36 ws0">In<span class="_ _1"> </span>recent<span class="_ _6"> </span>years,<span class="_ _1"> </span>e<span class="_ _2"></span>xtensi<span class="_ _2"></span>ve<span class="_ _6"> </span>studies<span class="_ _1"> </span>ha<span class="_ _2"></span>ve<span class="_ _6"> </span>been<span class="_ _1"> </span>done<span class="_ _6"> </span>in</div><div class="t m0 x10 hb y53 ff1 fs5 fc0 sc0 ls21 ws0">the<span class="_ _1"> </span>t<span class="_ _2"></span>heory<span class="_ _6"> </span>of<span class="_ _1"> </span>chaos<span class="_ _6"> </span>in<span class="_ _6"> </span>different<span class="_ _6"> </span>fiel<span class="_ _2"></span>ds<span class="_ _1"> </span>of<span class="_ _6"> </span>physics,<span class="_ _6"> </span>math-</div><div class="t m0 x10 hb y54 ff1 fs5 fc0 sc0 ls21 ws0">ematics,<span class="_ _3"> </span>engineering,<span class="_ _c"> </span>biology<span class="_ _4"></span>,<span class="_ _3"> </span>chemistry<span class="_ _4"></span>,<span class="_ _3"> </span>economics</div><div class="t m0 x10 hb y55 ff1 fs5 fc0 sc0 ls3d ws0">and<span class="_ _10"> </span>atmospheric<span class="_ _8"> </span>sciences.<span class="_ _10"> </span>At<span class="_ _c"> </span>the<span class="_ _10"> </span>start<span class="_ _10"> </span>o<span class="_ _0"></span>f<span class="_ _10"> </span>last<span class="_ _10"> </span>decade</div><div class="t m0 x10 hb y56 ff1 fs5 fc0 sc0 ls22 ws0">only<span class="_ _4"></span>,<span class="_ _d"> </span>the<span class="_ _d"> </span>use<span class="_ _e"> </span>of<span class="_ _d"> </span>the<span class="_ _d"> </span>continuous<span class="_ _d"> </span>as<span class="_ _d"> </span>well<span class="_ _d"> </span>as<span class="_ _e"> </span>discrete</div><div class="t m0 x10 hb y57 ff1 fs5 fc0 sc0 ls18 ws0">chaotic<span class="_"> </span>dynamical<span class="_ _8"> </span>systems<span class="_"> </span>has<span class="_ _8"> </span>been<span class="_ _7"> </span>made<span class="_ _8"> </span>to<span class="_ _8"> </span>de<span class="_ _2"></span>velop</div><div class="t m0 x10 hb y58 ff1 fs5 fc0 sc0 ls21 ws0">cryptosyst<span class="_ _2"></span>ems<span class="_ _3"> </span>[4–6].<span class="_ _3"> </span>The<span class="_ _d"> </span>chaotic<span class="_ _3"> </span>systems<span class="_ _3"> </span>are<span class="_ _d"> </span>char<span class="_ _2"></span>-</div><div class="t m0 x10 hb y59 ff1 fs5 fc0 sc0 ls3e ws0">acterized<span class="_ _10"> </span>by<span class="_ _8"> </span>the<span class="_ _c"> </span>sensiti<span class="_ _2"></span>vity<span class="_ _8"> </span>on<span class="_ _10"> </span>initial<span class="_ _c"> </span>conditions,<span class="_ _8"> </span>sys-</div><div class="t m0 x10 hb y5a ff1 fs5 fc0 sc0 ls3b ws0">tem<span class="_"> </span>parameters<span class="_ _6"> </span>and<span class="_ _1"> </span>unpredictability<span class="_ _6"> </span>of<span class="_ _6"> </span>evolution<span class="_ _6"> </span>of<span class="_ _1"> </span>its</div><div class="t m0 x10 hb y5b ff1 fs5 fc0 sc0 ls1c ws0">orbits.<span class="_ _3"> </span>Thes<span class="_ _2"></span>e<span class="_ _3"> </span>properties<span class="_ _10"> </span>make<span class="_ _3"> </span>the<span class="_ _3"> </span>chaotic<span class="_ _3"> </span>s<span class="_ _2"></span>ystems<span class="_ _3"> </span>a</div><div class="t m0 x10 hb y5c ff1 fs5 fc0 sc0 ls22 ws0">worthy<span class="_ _6"> </span>choice<span class="_ _1"> </span>for<span class="_ _6"> </span>constructing<span class="_ _6"> </span>cryptos<span class="_ _2"></span>ystems.<span class="_ _6"> </span>Further</div><div class="t m0 x10 hb y5d ff1 fs5 fc0 sc0 ls26 ws0">more,<span class="_ _6"> </span>these<span class="_ _6"> </span>properties<span class="_ _6"> </span>make<span class="_ _6"> </span>the<span class="_ _6"> </span>chaotic<span class="_ _6"> </span>cryptosyste<span class="_ _2"></span>ms</div><div class="t m0 x10 hb y5e ff1 fs5 fc0 sc0 ls27 ws0">robust<span class="_ _c"> </span>against<span class="_ _c"> </span>any<span class="_ _3"> </span>statistical<span class="_ _c"> </span>attacks.<span class="_ _3"> </span>The<span class="_ _3"> </span>cryptos<span class="_ _2"></span>ys-</div><div class="t m0 x10 hb y5f ff1 fs5 fc0 sc0 ls26 ws0">tems<span class="_ _8"> </span>based<span class="_"> </span>o<span class="_ _0"></span>n<span class="_ _8"> </span>the<span class="_ _8"> </span>continuous<span class="_"> </span>chaotic<span class="_"> </span>dynamical<span class="_ _8"> </span>sys-</div><div class="t m0 x10 hb y60 ff1 fs5 fc0 sc0 ls3f ws0">tem<span class="_ _e"> </span>utilize<span class="_ _e"> </span>the<span class="_ _d"> </span>idea<span class="_ _e"> </span>of<span class="_ _e"> </span>contro<span class="_ _0"></span>l<span class="_ _d"> </span>and<span class="_ _d"> </span>sy<span class="_ _0"></span>nchro<span class="_ _0"></span>nization</div><div class="t m0 x10 hb y61 ff1 fs5 fc0 sc0 ls23 ws0">of<span class="_ _c"> </span>chaos<span class="_ _c"> </span>[7–9].<span class="_ _c"> </span>The<span class="_ _c"> </span>first<span class="_ _c"> </span>idea<span class="_ _c"> </span>to<span class="_ _3"> </span>appl<span class="_ _2"></span>y<span class="_ _c"> </span>the<span class="_ _c"> </span>theory<span class="_ _c"> </span>of</div><div class="t m0 x10 hb y62 ff1 fs5 fc0 sc0 ls19 ws0">continuous<span class="_ _c"> </span>chaotic<span class="_ _3"> </span>dynamical<span class="_ _c"> </span>systems<span class="_ _3"> </span>in<span class="_ _3"> </span>cryptogra-</div><div class="t m0 x14 hb y63 ff1 fs5 fc0 sc0 ls19 ws0">phy<span class="_ _3"> </span>w<span class="_ _2"></span>as<span class="_ _3"> </span>giv<span class="_ _2"></span>en<span class="_ _3"> </span>by<span class="_ _3"> </span>Pecora<span class="_ _3"> </span>and<span class="_ _3"> </span>Carrol<span class="_ _2"></span>l<span class="_ _3"> </span>[4].<span class="_ _3"> </span>The<span class="_ _3"> </span>syn-</div><div class="t m0 x14 hb y64 ff1 fs5 fc0 sc0 ls1c ws0">chronization<span class="_ _13"></span>of<span class="_ _6"> </span>chaos<span class="_ _6"> </span>has<span class="_ _6"> </span>b<span class="_ _0"></span>een<span class="_ _6"> </span>experimentally<span class="_ _13"></span>demon-</div><div class="t m0 x14 hb y65 ff1 fs5 fc0 sc0 ls40 ws0">strated<span class="_ _3"> </span>by<span class="_ _c"> </span>Kocare<span class="_ _2"></span>v<span class="_ _c"> </span>et<span class="_ _3"> </span>al.<span class="_ _3"> </span>[10]<span class="_ _3"> </span>and<span class="_ _c"> </span>Parlitz<span class="_ _3"> </span>et<span class="_ _c"> </span>al.<span class="_ _3"> </span>[11<span class="_ _0"></span>]</div><div class="t m0 x14 hb y66 ff1 fs5 fc0 sc0 ls1c ws0">using<span class="_ _13"> </span>electronic<span class="_ _13"> </span>circuits.<span class="_ _13"></span>Further<span class="_ _13"> </span>work<span class="_ _13"> </span>on<span class="_ _6"> </span>synchroniza-</div><div class="t m0 x14 hb y67 ff1 fs5 fc0 sc0 ls23 ws0">tion<span class="_ _6"> </span>o<span class="_ _0"></span>f<span class="_ _1"> </span>chaos<span class="_ _6"> </span>has<span class="_"> </span>been<span class="_ _6"> </span>done<span class="_"> </span>by<span class="_ _6"> </span>Hayes<span class="_ _1"> </span>et<span class="_ _1"> </span>al<span class="_ _2"></span>.<span class="_"> </span>[12],<span class="_ _13"> </span>Chua</div><div class="t m0 x14 hb y68 ff1 fs5 fc0 sc0 ls16 ws0">et<span class="_ _10"> </span>al.<span class="_ _10"> </span>[13],<span class="_ _10"> </span>Murali<span class="_ _10"> </span>et<span class="_ _10"> </span>al.<span class="_ _10"> </span>[14],<span class="_ _10"> </span>Martienssen<span class="_ _8"> </span>et<span class="_ _10"> </span>al.<span class="_ _c"> </span>[15]</div><div class="t m0 x14 hb y69 ff1 fs5 fc0 sc0 ls41 ws0">etc.</div><div class="t m0 x16 hb y6a ff1 fs5 fc0 sc0 ls1c ws0">Ho<span class="_ _2"></span>wev<span class="_ _2"></span>er<span class="_ _2"></span>,<span class="_ _d"> </span>the<span class="_ _b"> </span>use<span class="_ _14"> </span>of<span class="_ _b"> </span>discrete<span class="_ _e"> </span>chaotic<span class="_ _e"> </span>dynamical</div><div class="t m0 x14 hb y6b ff1 fs5 fc0 sc0 ls23 ws0">systems<span class="_ _c"> </span>in<span class="_ _3"> </span>cryptography<span class="_ _c"> </span>has<span class="_ _3"> </span>been<span class="_ _3"> </span>done<span class="_ _3"> </span>for<span class="_ _c"> </span>the<span class="_ _3"> </span>first</div><div class="t m0 x14 hb y6c ff1 fs5 fc0 sc0 ls31 ws0">time<span class="_ _3"> </span>by<span class="_ _c"> </span>Matth<span class="_ _0"></span>ews<span class="_ _c"> </span>[5].<span class="_ _3"> </span>Matthe<span class="_ _2"></span>ws<span class="_ _3"> </span>has<span class="_ _c"> </span>de<span class="_ _0"></span>rived<span class="_ _10"> </span>a<span class="_ _3"> </span>one-</div><div class="t m0 x14 hb y6d ff1 fs5 fc0 sc0 ls23 ws0">dimensional<span class="_ _8"> </span>chaotic<span class="_ _8"> </span>map,<span class="_ _10"> </span>which<span class="_ _c"> </span>exhibit<span class="_ _2"></span>s<span class="_ _10"> </span>chaotic<span class="_ _8"> </span>be-</div><div class="t m0 x14 hb y6e ff1 fs5 fc0 sc0 ls37 ws0">havior<span class="_ _8"> </span>fo<span class="_ _0"></span>r<span class="_ _10"> </span>a<span class="_ _10"> </span>ran<span class="_ _0"></span>ge<span class="_ _10"> </span>of<span class="_ _c"> </span>param<span class="_ _0"></span>eter<span class="_ _8"> </span>and<span class="_ _c"> </span>initial<span class="_ _10"> </span>values.<span class="_ _10"> </span>In</div><div class="t m0 x14 hb y6f ff1 fs5 fc0 sc0 ls2d ws0">Mathe<span class="_ _2"></span>w’<span class="_ _4"></span>s<span class="_ _3"> </span>algorithm<span class="_ _3"> </span>the<span class="_ _3"> </span>map<span class="_ _d"> </span>is<span class="_ _3"> </span>u<span class="_ _0"></span>sed<span class="_ _3"> </span>for<span class="_ _3"> </span>generating</div><div class="t m0 x14 hb y70 ff1 fs5 fc0 sc0 ls1b ws0">a<span class="_ _8"> </span>sequence<span class="_"> </span>of<span class="_ _8"> </span>pseudo-random<span class="_"> </span>numbers,<span class="_"> </span>which<span class="_ _8"> </span>serv<span class="_ _2"></span>es</div><div class="t m0 x14 hb y71 ff1 fs5 fc0 sc0 ls2c ws0">as<span class="_ _10"> </span>a<span class="_ _c"> </span>one<span class="_ _c"> </span>time<span class="_ _10"> </span>pad<span class="_ _10"> </span>for<span class="_ _c"> </span>encrypting<span class="_ _8"> </span>message.<span class="_ _10"> </span>His<span class="_ _10"> </span>work</div><div class="t m0 x14 hb y72 ff1 fs5 fc0 sc0 ls42 ws0">has<span class="_"> </span>been<span class="_"> </span>criticized<span class="_ _7"> </span>by<span class="_ _7"> </span>Wheeler<span class="_ _7"> </span>[16<span class="_ _0"></span>],<span class="_"> </span>who<span class="_"> </span>showed<span class="_"> </span>that</div><div class="t m0 x14 hb y73 ff1 fs5 fc0 sc0 ls19 ws0">when<span class="_"> </span>the<span class="_"> </span>chaotic<span class="_ _1"> </span>map<span class="_"> </span>is<span class="_"> </span>i<span class="_ _2"></span>mplemented<span class="_"> </span>on<span class="_"> </span>di<span class="_ _2"></span>gital<span class="_"> </span>com-</div><div class="t m0 x14 hb y74 ff1 fs5 fc0 sc0 ls3e ws0">puters,<span class="_ _d"> </span>the<span class="_ _e"> </span>discretized<span class="_ _e"> </span>map<span class="_ _e"> </span>produces<span class="_ _d"> </span>cycles,<span class="_ _e"> </span>which</div><div class="t m0 x14 hb y75 ff1 fs5 fc0 sc0 ls43 ws0">are<span class="_ _3"> </span>unpredictable<span class="_ _3"> </span>and<span class="_ _3"> </span>often<span class="_ _d"> </span>short.<span class="_ _3"> </span>In<span class="_ _d"> </span>1990<span class="_ _3"> </span>Hab<span class="_ _2"></span>utsu</div><div class="t m0 x14 hb y76 ff1 fs5 fc0 sc0 ls3d ws0">et<span class="_ _8"> </span>al.<span class="_ _8"> </span>[6]<span class="_ _8"> </span>de<span class="_ _2"></span>veloped<span class="_"> </span>a<span class="_ _8"> </span>cryptosystem<span class="_"> </span>based<span class="_ _8"> </span>on<span class="_ _8"> </span>a<span class="_ _8"> </span>piece-</div><div class="t m0 x14 hb y77 ff1 fs5 fc0 sc0 ls23 ws0">wise<span class="_ _8"> </span>linear<span class="_"> </span>chaotic<span class="_ _8"> </span>tent<span class="_ _8"> </span>map.<span class="_ _7"> </span>In<span class="_ _8"> </span>Habuts<span class="_ _2"></span>u’<span class="_ _4"></span>s<span class="_ _8"> </span>cryptosys-</div><div class="t m0 x14 hb y78 ff1 fs5 fc0 sc0 ls27 ws0">tem<span class="_ _10"> </span>use<span class="_ _c"> </span>is<span class="_ _10"> </span>made<span class="_ _10"> </span>of<span class="_ _c"> </span>the<span class="_ _10"> </span>p<span class="_ _0"></span>arameter<span class="_ _8"> </span>of<span class="_ _c"> </span>the<span class="_ _10"> </span>tent<span class="_ _c"> </span>map<span class="_ _10"> </span>as</div><div class="t m0 x14 hb y79 ff1 fs5 fc0 sc0 ls1c ws0">a<span class="_ _d"> </span>secret<span class="_ _3"> </span>key<span class="_ _d"> </span>and<span class="_ _3"> </span>the<span class="_ _d"> </span>encryption<span class="_ _3"> </span>and<span class="_ _d"> </span>decryption<span class="_ _3"> </span>are</div><div class="t m0 x14 hb y7a ff1 fs5 fc0 sc0 ls19 ws0">achie<span class="_ _2"></span>ved<span class="_ _3"> </span>by<span class="_ _d"> </span>performing<span class="_ _3"> </span>the<span class="_ _3"> </span>in<span class="_ _2"></span>verse<span class="_ _3"> </span>and<span class="_ _3"> </span>forward<span class="_ _3"> </span>it-</div><div class="t m0 x14 hb y7b ff1 fs5 fc0 sc0 ls2c ws0">erations<span class="_ _8"> </span>of<span class="_ _8"> </span>the<span class="_ _10"> </span>chaotic<span class="_ _8"> </span>tent<span class="_ _8"> </span>map,<span class="_ _10"> </span>respecti<span class="_ _2"></span>vely<span class="_ _4"></span>.<span class="_ _7"> </span>Habut-</div><div class="t m0 x14 hb y7c ff1 fs5 fc0 sc0 ls23 ws0">su’<span class="_ _4"></span>s<span class="_ _1"> </span>method<span class="_ _13"> </span>works<span class="_ _1"> </span>only<span class="_ _6"> </span>for<span class="_ _6"> </span>the<span class="_"> </span>c<span class="_ _2"></span>haotic<span class="_ _6"> </span>dynamical<span class="_ _6"> </span>sys-</div><div class="t m0 x14 hb y7d ff1 fs5 fc0 sc0 ls19 ws0">tems<span class="_ _c"> </span>for<span class="_ _c"> </span>which<span class="_ _3"> </span>t<span class="_ _2"></span>he<span class="_ _c"> </span>map<span class="_ _3"> </span>properti<span class="_ _2"></span>es<span class="_ _10"> </span>are<span class="_ _3"> </span>strongl<span class="_ _2"></span>y<span class="_ _c"> </span>sen-</div><div class="t m0 x14 hb y7e ff1 fs5 fc0 sc0 ls17 ws0">siti<span class="_ _2"></span>ve<span class="_ _8"> </span>to<span class="_ _10"> </span>the<span class="_ _10"> </span>system<span class="_ _10"> </span>parameters.<span class="_ _10"> </span>Moreover<span class="_ _4"></span>,<span class="_ _8"> </span>this<span class="_ _10"> </span>prop-</div><div class="t m0 x14 hb y7f ff1 fs5 fc0 sc0 ls2d ws0">erty<span class="_ _1"> </span>has<span class="_ _6"> </span>been<span class="_ _1"> </span>observ<span class="_ _2"></span>ed<span class="_ _6"> </span>for<span class="_ _1"> </span>onl<span class="_ _2"></span>y<span class="_ _1"> </span>certain<span class="_ _6"> </span>dynamical<span class="_ _6"> </span>sys-</div><div class="t m0 x14 hb y80 ff1 fs5 fc0 sc0 ls23 ws0">tems.<span class="_ _10"> </span>At<span class="_ _c"> </span>the<span class="_ _c"> </span>same<span class="_ _10"> </span>time,<span class="_ _c"> </span>Biham<span class="_ _10"> </span>[17]<span class="_ _c"> </span>has<span class="_ _10"> </span>pointed<span class="_ _10"> </span>out</div><div class="t m0 x14 hb y81 ff1 fs5 fc0 sc0 ls1b ws0">that<span class="_ _8"> </span>Hab<span class="_ _2"></span>utsu’<span class="_ _4"></span>s<span class="_"> </span>cryptosystem<span class="_ _7"> </span>can<span class="_ _8"> </span>be<span class="_ _8"> </span>easily<span class="_ _8"> </span>broken<span class="_"> </span>us-</div><div class="t m0 x14 hb y82 ff1 fs5 fc0 sc0 ls1c ws0">ing<span class="_ _7"> </span>a<span class="_ _8"> </span>‘chosen<span class="_ _8"> </span>cipherte<span class="_ _2"></span>xt<span class="_"> </span>attack’<span class="_ _8"> </span>and<span class="_"> </span>‘known<span class="_"> </span>plaintext</div><div class="t m0 x14 hb y83 ff1 fs5 fc0 sc0 ls35 ws0">attack’.<span class="_"> </span>Bianco<span class="_"> </span>et<span class="_"> </span>al.<span class="_"> </span>[18]<span class="_"> </span>has<span class="_"> </span>us<span class="_ _2"></span>ed<span class="_"> </span>the<span class="_"> </span>logistic<span class="_"> </span>map<span class="_"> </span>to</div><div class="t m0 x14 hb y84 ff1 fs5 fc0 sc0 ls1b ws0">generate<span class="_"> </span>a<span class="_ _7"> </span>sequence<span class="_"> </span>o<span class="_ _0"></span>f<span class="_"> </span>floating<span class="_ _7"> </span>point<span class="_ _7"> </span>numbers,<span class="_"> </span>which</div><div class="t m0 x14 hb y85 ff1 fs5 fc0 sc0 ls1c ws0">is<span class="_"> </span>con<span class="_ _2"></span>verted<span class="_ _6"> </span>to<span class="_"> </span>a<span class="_"> </span>binary<span class="_"> </span>sequence<span class="_ _1"> </span>and<span class="_ _1"> </span>is<span class="_"> </span>XOR<span class="_ _2"></span>-ed<span class="_"> </span>with</div><div class="t m0 x14 hb y86 ff1 fs5 fc0 sc0 ls37 ws0">the<span class="_ _3"> </span>plaintext.<span class="_ _3"> </span>The<span class="_ _d"> </span>parameter<span class="_ _3"> </span>of<span class="_ _3"> </span>th<span class="_ _0"></span>e<span class="_ _3"> </span>logistic<span class="_ _3"> </span>m<span class="_ _0"></span>ap<span class="_ _3"> </span>to-</div><div class="t m0 x14 hb y87 ff1 fs5 fc0 sc0 ls3e ws0">gether<span class="_ _c"> </span>with<span class="_ _3"> </span>the<span class="_ _c"> </span>initial<span class="_ _3"> </span>condition<span class="_ _10"> </span>form<span class="_ _c"> </span>part<span class="_ _3"> </span>of<span class="_ _c"> </span>the<span class="_ _3"> </span>ci-</div><div class="t m0 x14 hb y88 ff1 fs5 fc0 sc0 ls43 ws0">phering<span class="_"> </span>k<span class="_ _2"></span>ey<span class="_ _4"></span>.<span class="_"> </span>The<span class="_"> </span>con<span class="_ _4"></span>version<span class="_ _1"> </span>from<span class="_"> </span>float<span class="_ _2"></span>ing<span class="_"> </span>point<span class="_"> </span>num-</div><div class="t m0 x14 hb y89 ff1 fs5 fc0 sc0 ls22 ws0">bers<span class="_ _3"> </span>to<span class="_ _d"> </span>binary<span class="_ _3"> </span>val<span class="_ _2"></span>ues<span class="_ _3"> </span>is<span class="_ _d"> </span>done<span class="_ _3"> </span>by<span class="_ _d"> </span>choosing<span class="_ _3"> </span>tw<span class="_ _2"></span>o<span class="_ _d"> </span>dis-</div><div class="t m0 x14 hb y8a ff1 fs5 fc0 sc0 ls44 ws0">joint<span class="_ _c"> </span>interval<span class="_ _c"> </span>ranges<span class="_ _c"> </span>representing<span class="_ _c"> </span>0<span class="_ _3"> </span>and<span class="_ _3"> </span>1.<span class="_ _c"> </span>Howe<span class="_ _2"></span>ver<span class="_ _4"></span>,</div><div class="t m0 x14 hb y8b ff1 fs5 fc0 sc0 ls2f ws0">the<span class="_ _d"> </span>fact<span class="_ _3"> </span>th<span class="_ _0"></span>at<span class="_ _d"> </span>this<span class="_ _d"> </span>method<span class="_ _d"> </span>is<span class="_ _d"> </span>based<span class="_ _d"> </span>on<span class="_ _d"> </span>floating<span class="_ _d"> </span>point</div><div class="t m0 x14 hb y8c ff1 fs5 fc0 sc0 ls2f ws0">arithmetic<span class="_ _10"> </span>co<span class="_ _0"></span>nstitutes<span class="_ _10"> </span>a<span class="_ _3"> </span>possible<span class="_ _10"> </span>disadvantage<span class="_ _10"> </span>as<span class="_ _10"> </span>th<span class="_ _0"></span>is</div><div class="t m0 x14 hb y8d ff1 fs5 fc0 sc0 ls25 ws0">makes<span class="_"> </span>it<span class="_"> </span>machine<span class="_"> </span>dependent,<span class="_ _6"> </span>and<span class="_"> </span>care<span class="_ _7"> </span>needs<span class="_"> </span>to<span class="_"> </span>be<span class="_"> </span>ex-</div><div class="t m0 x14 hb y8e ff1 fs5 fc0 sc0 ls19 ws0">ercised<span class="_"> </span>when<span class="_ _7"> </span>implementing<span class="_"> </span>the<span class="_"> </span>scheme.<span class="_"> </span>K<span class="_ _2"></span>otulski<span class="_"> </span>and</div><div class="t m0 x14 hb y8f ff1 fs5 fc0 sc0 ls45 ws0">Szczepanski<span class="_ _6"> </span>[19]<span class="_ _1"> </span>proposed<span class="_ _13"> </span>an<span class="_"> </span>algorithm<span class="_ _6"> </span>o<span class="_ _0"></span>f<span class="_ _1"> </span>encryption</div><div class="t m0 x14 hb y90 ff1 fs5 fc0 sc0 ls32 ws0">and<span class="_ _10"> </span>decry<span class="_ _0"></span>ption<span class="_ _10"> </span>based<span class="_ _10"> </span>o<span class="_ _0"></span>n<span class="_ _10"> </span>m<span class="_ _0"></span>ultiple<span class="_ _10"> </span>iteratio<span class="_ _0"></span>ns<span class="_ _10"> </span>of<span class="_ _c"> </span>a<span class="_ _10"> </span>cer-</div><div class="t m0 x14 hb y91 ff1 fs5 fc0 sc0 ls21 ws0">tain<span class="_ _10"> </span>one-dimensional<span class="_ _7"> </span>chaotic<span class="_ _10"> </span>map.<span class="_ _10"> </span>They<span class="_ _10"> </span>proposed<span class="_ _10"> </span>to</div><div class="t m0 x14 hb y92 ff1 fs5 fc0 sc0 ls46 ws0">assume<span class="_"> </span>some<span class="_ _7"> </span>part<span class="_ _8"> </span>of<span class="_"> </span>initial<span class="_ _8"> </span>condition<span class="_"> </span>as<span class="_ _7"> </span>plaintext<span class="_"> </span>and</div></div><div class="pi" data-data='{"ctm":[1.758242,0.000000,0.000000,1.758242,-43.956044,-87.912088]}'></div></div>