IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Novel Cryptography Technique via Chaos Synchronization of Fractional-Order Derivative Systems

Novel Cryptography Technique via Chaos Synchronization of Fractional-Order Derivative Systems
View Sample PDF
Author(s): Alain Giresse Tene (University of Dschang, Cameroon)and Timoleon Crépin Kofane (University of Yaounde I, Cameroon)
Copyright: 2021
Pages: 34
Source title: Research Anthology on Artificial Intelligence Applications in Security
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-7998-7705-9.ch097

Purchase

View Novel Cryptography Technique via Chaos Synchronization of Fractional-Order Derivative Systems on the publisher's website for pricing and purchasing information.

Abstract

Synchronization of fractional-order-derivative systems for cryptography purpose is still exploratory and despite an increase in cryptography research, several challenges remain in designing a powerful cryptosystem. This chapter addresses the problem of synchronization of fractional-order-derivative chaotic systems using random numbers generator for a novel technique to key distribution in cryptography. However, there is evidence that researchers have approached the problem using integer order derivative chaotic systems. Consequently, the aim of the chapter lies in coding and decoding a text via chaos synchronization of fractional-order derivative, the performance analysis and the key establishment scheme following an application on a text encryption using the chaotic Mathieu-Van Der Pol fractional system. In order to improve the level of the key security, the Fibonacci Q-matrix is used in the key generation process and the initial condition; the order of the derivative of the responder system secretly shared between the responder and the receiver are also involved. It followed from this study that compared to the existing cryptography techniques, this proposed method is found to be very efficient due to the fact that, it improves the key security.

Related Content

Kamel Mouloudj, Vu Lan Oanh LE, Achouak Bouarar, Ahmed Chemseddine Bouarar, Dachel Martínez Asanza, Mayuri Srivastava. © 2024. 20 pages.
José Eduardo Aleixo, José Luís Reis, Sandrina Francisca Teixeira, Ana Pinto de Lima. © 2024. 52 pages.
Jorge Figueiredo, Isabel Oliveira, Sérgio Silva, Margarida Pocinho, António Cardoso, Manuel Pereira. © 2024. 24 pages.
Fatih Pinarbasi. © 2024. 20 pages.
Stavros Kaperonis. © 2024. 25 pages.
Thomas Rui Mendes, Ana Cristina Antunes. © 2024. 24 pages.
Nuno Geada. © 2024. 12 pages.
Body Bottom