CFP last date
20 December 2024
Reseach Article

Design of Digital Signature Algorithm by Fractals and Chaos Theory

by Dr. G. Geetha, K. Thamizhchelvy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 37 - Number 5
Year of Publication: 2012
Authors: Dr. G. Geetha, K. Thamizhchelvy
10.5120/4608-6588

Dr. G. Geetha, K. Thamizhchelvy . Design of Digital Signature Algorithm by Fractals and Chaos Theory. International Journal of Computer Applications. 37, 5 ( January 2012), 50-57. DOI=10.5120/4608-6588

@article{ 10.5120/4608-6588,
author = { Dr. G. Geetha, K. Thamizhchelvy },
title = { Design of Digital Signature Algorithm by Fractals and Chaos Theory },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 37 },
number = { 5 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 50-57 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume37/number5/4608-6588/ },
doi = { 10.5120/4608-6588 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:23:34.257554+05:30
%A Dr. G. Geetha
%A K. Thamizhchelvy
%T Design of Digital Signature Algorithm by Fractals and Chaos Theory
%J International Journal of Computer Applications
%@ 0975-8887
%V 37
%N 5
%P 50-57
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Message Authentication Code is a function of the message and a secret key that produces a fixed-length value that serves as the authenticator. MAC provides authentication and confidentiality. This authentication technique does not include measures to counter repudiation by the source i.e. it does not provide digital signature. We propose a new Message authentication Image (MAI) Algorithm that provides confidentiality, authentication and digital signature. It uses Cryptographic and Steganographic ideas to conceal the data in the image. MAI is generated by using fractals. This approach explores the main feature of fractal image generated by Iterated Function System (IFS) techniques.

References
  1. El-Khamy, S.E. Khedr et all ,“A hybrid fractal-wavelet data hiding technique”,In the Proc. Of National Radio Science Conference, NRSC 2008, ISBN: 978-977-5031-95-2 pp 1-9.
  2. Zolotavkin, Y. Lukichov et all ,“A novel approach to the security of data hidden in multimedia objects”, In the Proc. Of International Carnahan Conference on Security Technology, ICCST 2008, ISBN: 978-1-4244-1816-9 ,pp 23-28.
  3. Thiyagarajan.M, Geetha.G “Complex facets of Cryptography”, In the Proc. of International conference on Systemics, Cybernetics and Informatics, ICSCI 2007, pp 555 – 559.
  4. G.Geetha, Thiyagarajan M, “Quantum dots as a cryptographic tool, Presented in International Conference on nanomaterials, communication and broad casting systems, SASTRA, Thanjavur, 2007.
  5. G.Geetha, “Non-linearity in Ciphers”, In the Proc. of TISC 2007.
  6. Chin-Chen Chang et all ,“A DCT-domain system for hiding fractal compressed images”, In the Proc. Of Advanced Information Networking and Applications, AINA 2005, ISBN: 0-7695-2249-1, pp 83-86,vol.2.
  7. Hsien-Chu Wu et and Chin-Chen Chang, “Hiding digital watermarks using fractal compression technique”, In the Journal of Fundamenta Informaticae,ISSN 0169-2968, Volume 58, Number 2/2003.
  8. Hannes Hartenstein et all, “Region-based fractal image compression”, In the Proc. Of Image Processing, ISSN: 1057-7149,PP 1171-1184.
  9. Fisher, Y., 1995. Fractal Image Compression:Theory and Application. Springer-Verlag. NewYork, USA. ISBN: 0-387-94211-4, pp: 341.
  10. Shannon C.E, “Communication theory of Secrecy Systems”, Bell Sys.Tech. J., 28(4), pp 656-715, 1949
  11. Alwarez G, Monotoya E, Pastor G, Romera M, “Chaotic cryptosystems”, In Proc. IEEE Int. Carnaltan conf. Security technology, pp 332-338, IEEE 1999.
  12. Jiri Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps”, Int.J.Bifurcation and chaos, 8(6):1259-1284, 1998.
  13. Ljupco Kocarev, Goce Jakimoski, Tony Stojanovski and Ulrich Parlitz, “From Chaotic maps to encryption schemes”, In Proc. IEEE Int. Symposium circuits and Systems 98, Vol.4, pp514-517, IEEE 1998.
  14. Marco Gotz, Kristina Kelber, and Wolfgang Schwarz, “Discrete time Chaotic Encryption systems Part I: Statistical design approach”, IEEE Trans, Circuits and Systems-I, 44(10): pp963-970, 1997.
  15. Brown R and Chua L.o, “Clarifying Chaos Examples and counter examples”, Int.J.Bifurcation and chaos, 6(2)219-249, 1996.
  16. Shujun Li, Xuanqin Mou and Yuanlong Cai, “ Pseudo random bit generator based on couple chaotic systems and its application in stream ciphers cryptography”, In Progress in Cryptology – IndoCrypt 2001, LNCS vol.2247, pp 316-329, Springer-Verlag, Berlin, 2001.
  17. Ljupco Kocarev.Goce Jakimoski, “Logistic map of a block encryption algorithm”, Physics Letters A, 289(4.5), pp 199-206, 2001.
  18. Goce Jakimoski and Ljupco Kocarev, “Chaos and cryptography: Block encryption ciphers based on chaotic maps”, IEEE Circuits and Systems-I, 48(2): pp 163-169, 2001.
  19. Jesus Ufs, Edgardo Ugalde and Gelasio Salazar, “A cryptosystem based on cellular automata”, Chaos 8(4): pp 819-822, 1998.
  20. Shujun Li, Xuan Cheng, Xuanqin Mou and Yuanlong Cai, “Chaotic encryption scheme for real time digital video”, In Real-time Imaging VI, Proceedings of SPIE vol.4666, pp 149-160, 2002.
  21. Leong Y.K., “Stochastic approach to Matrices”, SIAM J Appl Math, Vol.47, pp 1094-1102, 1987.
Index Terms

Computer Science
Information Sciences

Keywords

Fractals Message Hiding Message Authentication Image (MAI) Message Authentication Code (MAC)