Cryptography with chaos
Abstract
The goal of the thesis is the application of chaotic transformations in cryptography. The objectives of the thesis are 1) the statistical analysis of chaotic transformations in terms of Entropy production, 2) the mathematical modeling of cryptography with chaos, 3) the development of algorithms for encryption of text and image, using classes of chaotic transformations, 4) the implementation of algorithms in real images and texts and 5) the evaluation of results based on criteria and indicators. The chaotic differential equations used in cryptography mainly as random number generators. Therefore we shall confine ourselves to chaotic images. This restriction is not essential since the chaotic properties of differential equations inherited the relevant illustrations Poincare through Poincare sections. We analyzed the encryption algorithms from 4 classes of chaotic systems, 6 image encryption schemes (ΣΚΕ) and 2 text encryption schemes (ΣΚΚ). Each of four encryption algorithms from the sel ...
show more
Download full text in PDF format (8.33 MB)
(Available only to registered users)
|
All items in National Archive of Phd theses are protected by copyright.
|
Usage statistics
VIEWS
Concern the unique Ph.D. Thesis' views for the period 07/2018 - 07/2023.
Source: Google Analytics.
Source: Google Analytics.
ONLINE READER
Concern the online reader's opening for the period 07/2018 - 07/2023.
Source: Google Analytics.
Source: Google Analytics.
DOWNLOADS
Concern all downloads of this Ph.D. Thesis' digital file.
Source: National Archive of Ph.D. Theses.
Source: National Archive of Ph.D. Theses.
USERS
Concern all registered users of National Archive of Ph.D. Theses who have interacted with this Ph.D. Thesis. Mostly, it concerns downloads.
Source: National Archive of Ph.D. Theses.
Source: National Archive of Ph.D. Theses.