Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
721506 | IFAC Proceedings Volumes | 2009 | 5 Pages |
Abstract
In this work we comment some conclusions derived from the analysis of recent proposals in the field of chaos-based cryptography. These observations remark a number of major problems detected in some of those schemes under examination. Therefore, this paper is a list of what to avoid and to pay special attention to when considering chaos as source of new strategies to conceal and protect information.
Related Topics
Physical Sciences and Engineering
Engineering
Computational Mechanics