Chaos-Based Secure Communication and Cryptography, 2nd Edition

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Mathematics and Computer Science".

Deadline for manuscript submissions: 31 January 2025 | Viewed by 1165

Special Issue Editor


E-Mail Website
Guest Editor
School of Software, Nanchang University, Nanchang 330031, China
Interests: chaos-based cryptogtaphy; image encryption
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

We are excited to announce the launch of the second edition of our Special Issue, "Chaos-Based Secure Communication and Cryptography".

Over the past decade, chaotic systems have been widely used in chaos-based encryption and chaotic secure communications due to their dynamical complexity. In this Special Issue, we are specifically seeking submissions on chaos-based secure mechanisms and applications, including chaos-based block ciphers, stream ciphers, public key ciphers, chaos-based multimedia security, chaos-based synchronization, chaotic optical communications, the design of chaotic sources, complex networks, etc. However, we do not wish to restrict this Special Issue to these particular cases, and instead, encourage submissions specifically on foundational aspects, such as the dynamical degradation of chaotic systems, security evaluation of chaotic cryptography, chaos-based cryptanalysis, etc.

We eagerly await your contributions.

Dr. Lingfeng Liu
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • chaos-based cryptography
  • chaos-based block cipher
  • chaos-based stream cipher
  • chaos-based public key cipher
  • chaos-based synchronization
  • chaotic optical communications
  • complex network
  • cryptanalysis
  • design of chaotic source
  • dynamical degradation
  • multimedia security
  • image encryption
  • security evaluation

Related Special Issue

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 269 KiB  
Article
Secure Key Exchange in Tropical Cryptography: Leveraging Efficiency with Advanced Block Matrix Protocols
by Mariana Durcheva and Kiril Danilchenko
Mathematics 2024, 12(10), 1429; https://doi.org/10.3390/math12101429 - 7 May 2024
Viewed by 336
Abstract
In the quest for robust and efficient digital communication, this paper introduces cutting-edge key exchange protocols leveraging the computational prowess of tropical semirings and the structural resilience of block matrices. Moving away from the conventional use of finite fields, these protocols deliver markedly [...] Read more.
In the quest for robust and efficient digital communication, this paper introduces cutting-edge key exchange protocols leveraging the computational prowess of tropical semirings and the structural resilience of block matrices. Moving away from the conventional use of finite fields, these protocols deliver markedly faster processing speeds and heightened security. We present two implementations of our concept, each utilizing a different platform for the set of commuting matrices: one employing tropical polynomials of matrices and the other employing Linde–de la Puente matrices. The inherent simplicity of tropical semirings leads to a decrease in operational complexity, while using block matrices enhances our protocols’ security profile. The security of these protocols relies on the Matrix Decomposition Problem. In addition, we provide a comparative analysis of our protocols against existing matrix block-based protocols in finite fields. This research marks a significant shift in cryptographic protocol design, is specifically tailored for demanding engineering applications, and sets a new standard in secure and efficient digital communication. Full article
(This article belongs to the Special Issue Chaos-Based Secure Communication and Cryptography, 2nd Edition)
Show Figures

Figure 1

21 pages, 23005 KiB  
Article
Coherent Chaotic Communication Using Generalized Runge–Kutta Method
by Ivan Babkin, Vyacheslav Rybin, Valery Andreev, Timur Karimov and Denis Butusov
Mathematics 2024, 12(7), 994; https://doi.org/10.3390/math12070994 - 27 Mar 2024
Viewed by 682
Abstract
Computer simulation of continuous chaotic systems is usually performed using numerical methods. The discretization may introduce new properties into finite-difference models compared to their continuous prototypes and can therefore lead to new types of dynamical behavior exhibited by discrete chaotic systems. It is [...] Read more.
Computer simulation of continuous chaotic systems is usually performed using numerical methods. The discretization may introduce new properties into finite-difference models compared to their continuous prototypes and can therefore lead to new types of dynamical behavior exhibited by discrete chaotic systems. It is known that one can control the dynamics of a discrete system using a special class of integration methods. One of the applications of such a phenomenon is chaos-based communication systems, which have recently attracted attention due to their high covertness and broadband transmission capability. Proper modulation of chaotic carrier signals is one of the key problems in chaos-based communication system design. It is challenging to modulate and demodulate a chaotic signal in the same way as a conventional signal due to its noise-like shape and broadband characteristics. Therefore, the development of new modulation–demodulation techniques is of great interest in the field. One possible approach here is to use adaptive numerical integration, which allows control of the properties of the finite-difference chaotic model. In this study, we describe a novel modulation technique for chaos-based communication systems based on generalized explicit second-order Runge–Kutta methods. We use a specially designed test bench to evaluate the efficiency of the proposed modulation method and compare it with state-of-the-art solutions. Experimental results show that the proposed modulation technique outperforms the conventional parametric modulation method in both coverage and noise immunity. The obtained results can be efficiently applied to the design of advanced chaos-based communication systems as well as being used to improve existing architectures. Full article
(This article belongs to the Special Issue Chaos-Based Secure Communication and Cryptography, 2nd Edition)
Show Figures

Figure 1

Back to TopTop