CFP last date
22 April 2024
Reseach Article

An Approach for Secured Transmission of Data using Fractal based Chaos

Published on November 2012 by Jyotsna Shaw, Olivia Saha, Atal Chaudhuri
National Conference on Communication Technologies & its impact on Next Generation Computing 2012
Foundation of Computer Science USA
CTNGC - Number 4
November 2012
Authors: Jyotsna Shaw, Olivia Saha, Atal Chaudhuri
3a4fc723-503f-4b0a-8a15-4fc7183dcad6

Jyotsna Shaw, Olivia Saha, Atal Chaudhuri . An Approach for Secured Transmission of Data using Fractal based Chaos. National Conference on Communication Technologies & its impact on Next Generation Computing 2012. CTNGC, 4 (November 2012), 13-17.

@article{
author = { Jyotsna Shaw, Olivia Saha, Atal Chaudhuri },
title = { An Approach for Secured Transmission of Data using Fractal based Chaos },
journal = { National Conference on Communication Technologies & its impact on Next Generation Computing 2012 },
issue_date = { November 2012 },
volume = { CTNGC },
number = { 4 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 13-17 },
numpages = 5,
url = { /proceedings/ctngc/number4/9072-1034/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%A Jyotsna Shaw
%A Olivia Saha
%A Atal Chaudhuri
%T An Approach for Secured Transmission of Data using Fractal based Chaos
%J National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%@ 0975-8887
%V CTNGC
%N 4
%P 13-17
%D 2012
%I International Journal of Computer Applications
Abstract

Cryptography today is assumed as the study of techniques and applications of securing the integrity and authenticity of transfer of information under difficult circumstances. This paper presents an innovative concept on Encryption/Decryption application that is able to work with image files, data files and audio files. The method of encryption is simple but competent enough to fit the needs of the day. This paper presents Chaos based cryptography where the chaos is generated by using the concept of Fractals . The technique uses a key of variable length which generates a 128 bit message digest using MD5 hash algorithm. Then the generated hash value used as a seed to generate fractals using Julia Set algorithm and this is used as a chaos for the respective files. The final encryption is performed through XOR operation on each block of data to generate the cipher file which is to be transmitted.

References
  1. G. R. Blakley, "Safeguarding cryptographic keys," AFIPS Conference Proceedings, vol. 48, pp. 313–317, 1979.
  2. M. Naor and A. Shamir, ³Visual cryptography,´ Advances in Cryptography-EURO CRYPT 94,Perugia, Italy, pp. 1-12, May 1994.
  3. H. Dobbertin. Cryptanalysis of MD5 compress, presented at the rump session of Eurocrypt'96.
  4. R. L. Rivest. The MD5 message-digest algorithm, Request for Comments (RFC 1320), Internet Activities Board, Internet Privacy Task Force, 1992.
  5. http://en. wikipedia. org/wiki/MD5
  6. P. Davern and M. Scott. Fractal based image. Information Hiding, First International Workshop, Lecture Notes in Computer Science, pages 279–294, 1996.
  7. J. Puate and F. Jordan. Using fractal compression scheme to embed a digital signature into an image. In Proceedings of SPIE Photonics East'96 Symposium, Boston, Massachusetts, 1996.
  8. Andy Wilson, "Tips and Tricks: XOR Encryption" http://www. andyw. com/director/xor. asp,1998.
  9. Threshold Cryptography Based on Blakley Secret Sharing,?Ilker Nadi Bozkurt, Kamer Kaya, Ali Ayd?n Selc¸uk
  10. C. Asmuth and J. Bloom. A modular approach to key safeguarding. IEEE Trans. Information Theory, 29(2):208–210, 1983.
  11. William Stallings, "Cryptography and Network Security, Principles and Practice", Third Edition, Pearson education, 2005
  12. J. Puate and F. Jordan. Using fractal compression scheme to embed a digital signature into an image. In Proceedings of SPIE Photonics East'96 Symposium, Boston, Massachusetts, 1996.
  13. E. Biham, A. Shamir. Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
  14. H. Dobbertin. Cryptanalysis of MD5 compress, presented at the rump session of Eurocrypt'96.
  15. R. L. Rivest. The MD5 message-digest algorithm, Request for Comments (RFC 1320), Internet Activities Board, Internet Privacy Task Force, 1992.
  16. Wikipedia,"Encryption", http://en. wikipedia. org /wiki/Encryption, modified on 13 December 2006.
  17. Freeman J. , Neely R. , and Megalo L. "Developing Secure Systems: Issues and Solutions". IEEE Journal of Computer and Communication, Vol. 89, PP. 36-45. 1998
  18. Andy Wilson, "Tips and Tricks: XOR Encryption" http://www. andyw. com/director/xor. asp,1998.
  19. Di_e, W. , and Hellman, M. New directions in cryptography. IEEE Trans. Inform. Theory IT-22, (Nov. 1976), 644-654.
  20. G. Jakimoski and L. Kocarev, Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps, IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications, Vol. 48, No. 2, pp. 163-169, February 2001.
  21. K. Kelber and W. Schwarz, General Design Rules for Chaos-Based Encryption Systems , International Symposium on Nonlinear, Theory and Its Applications (NOLTA2005), pp. 465-468, Bruges, Belgium, 18-21 October, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Fractals Cryptography Julia Set Md5