Cryptography chaos theory
Articolul precedent
Articolul urmator
732 5
Ultima descărcare din IBN:
2023-10-04 11:54
Căutarea după subiecte
similare conform CZU
004.056.55 (50)
Computer science and technology. Computing. Data processing (4244)
SM ISO690:2012
BULAI, Rodica, FANARI, Victor. Cryptography chaos theory. In: Central and Eastern European eDem and eGov Days , 3-4 mai 2018, Budapesta. Viena, Austria: Facultas Verlags- und Buchhandels, 2018, pp. 447-458. ISBN 978-3-7089-1737-5. ISSN 2520-3401. DOI:
EXPORT metadate:
Google Scholar

Dublin Core
Central and Eastern European eDem and eGov Days 2018
Conferința "Central and Eastern European eDem and eGov Days "
Budapesta, Ungaria, 3-4 mai 2018

Cryptography chaos theory

CZU: 004.056.55

Pag. 447-458

Bulai Rodica, Fanari Victor
Technical University of Moldova
Disponibil în IBN: 21 decembrie 2018


The development of information society, which has led to an impressive increase in the volume of information, mainly economic, circulated in computer networks, accelerated the development and mostly the use of modern cryptography tools. In the last years, researchers have pointed out that there is a possible similarity between chaos and cryptography, many of the properties of chaotic dynamic systems having correlation among the cryptographic systems that are based on computational methods. Studies carried out on chaotic dynamic systems usage in digital crypto-systems have determined the occurrence of similar to classic techniques, but also of some specific techniques and methods that have been analyzed and evaluated. The attempts to develop new encryption аlgorithms based on chaos theory have evolved gradually from simple solutions, which suppose the iteration of a dinаmic system to obtain binary sequence used for text masking, to methods that imply coupled dinаmic systems and hybrid techniques that would combine the chaos advantages with classical methods. In this article there are presented 3 encryption algorithms based on chaos theory: RC4, Fractal Encryption and Cellular Automata, implemented in a system of encryption and operation mode analysis for each algorithm separately.