Article ID Journal Published Year Pages File Type
721506 IFAC Proceedings Volumes 2009 5 Pages PDF
Abstract

In this work we comment some conclusions derived from the analysis of recent proposals in the field of chaos-based cryptography. These observations remark a number of major problems detected in some of those schemes under examination. Therefore, this paper is a list of what to avoid and to pay special attention to when considering chaos as source of new strategies to conceal and protect information.

Related Topics
Physical Sciences and Engineering Engineering Computational Mechanics