Two approaches are presented to stream cipher utilizing a peculiar dynamical system called as composite discrete chaotic dynamical system (for short, composite system), which consists of two chaotic dynamical systems. The secret keys are the initial state of the chaotic dynamical systems, and the plaintext is used as its composite sequence that decides the choice of iterating function in the iterating process. Because of sensitivity of the composite system to initial conditions and randomness in the iterating process, the approach mingles secret keys with plaintext when using the composite system to produce ciphertext. Therefore they hold very complex and sensitive nonlinear relations. The algorithm is also provided with uniform distributing ciphertext. These peculiarities prevent ciphertext to leak the information of plaintext and secret key and make the security of the algorithms not depend on the complexity of the ciphertext.
[1]Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code. New York: John Wiley & Sons Inc., 1994. 347~375.
[2]Feng DG, Pei DY. Introduction to Cryptography. Beijing: Science Press, 1999. 54~100 (in Chinese).
[3]Feng DG. Cryptanalysis. Beijing: Tsinghua University Press, 2000. 55~92 (in Chinese).
[4]Habutsu T, Nishio Y, Sasase I, Mori S. A Secret Key Cryptsystem by Iterating a Chaotic Map. LNCS 547, Berlin: Springer-Verlag, 1991. 127~136.
[5]G?tz M, Kelber K, Schwarz W. Discrete-Time chaotic encryption systems-part I: Statistical design approach. IEEE Transactions on Circuits System-1: Fundamental Theory and Applications, 1997,44(10):963~970.
[6]Alvarez E, Fernández A, García P, Jiménez J, Marcano A. New approach to chaotic encryption. Physics Letters A, 1999,263: 373~375.
[7]Biham E. Cryptanalysis of the chaotic-map cryptosystem suggested. In: Davies DW, ed. Proceedings of the EUROCRYPT'91. LNCS 547, Berlin: Springer-Verlag, 1991. 532~534.
[8]Baptista MS. Cryptography with chaos. Physics Letters A, 1998,240(12):50~54.
[9]Kotulski Z, Szczepański J. Application of discrete chaotic dynamical systems in cryptography--DCC method. International Journal of Bifurcation and Chaos, 1999,9(6):1121~1135.
[10]Stojanovski T, Kocarev L. Chaos-Based random number generators--Part I: Analysis. IEEE Transactions on Circuits System-1: Fundamental Theory and Applications, 2001,48(3):281~288.
[11]Stojanovski T, Pihl J, Kocarev L. Chaos-Based random number generators--Part II: Practical realization. IEEE Transactions on Circuits System-1: Fundamental Theory and Applications, 2001,48(3):382~385.
[12]Jakimoski G, Kocarev L. Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Transactions on Circuits System-1: Fundamental Theory and Applications, 2001,48(2):163~169.
[13]Wu XX, Chen Z. An Introduction to Chaos. Shanghai: Shanghai Sciences and Technology Press, 2001. 57~83 (in Chinese).
[14]Baranovsky A, Daems D. Design of one-dimensional chaotic maps with prescribed statistical properties. International Journal of Bifurcation and Chaos, 1995,5(6):1585~1598.