Applying triple data encryption algorithm to a chaotic systems: T-S fuzzy model-based approach

Feng Hsiag Hsiao*, Po Han Lin

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In the age of explosive growth in information exchanges, there is indeed for message security. Data Encryption Standard (DES) is one of the symmetric encryption algorithms which kept the dominant position in the area of data encryption over the last few decades. Nowadays, with a rapid development in the field of computer, the security of DES is too low when encountering the brute-force method for decryption. Therefore, 3DES applies the DES encryption algorithm three times to each data block to strengthen the complexity of the cryptosystem. Nevertheless, due to the meet-in-the-middle attack, it reduces the effective security of the ciphertext. Many studies have shown that most of the existing methods are unreliable in the aspect of security. Accordingly, this study proposes a double encryption using the 3DES and chaotic synchronization to increase the strength of the encryption. A design methodology for Takagi-Sugeno (T-S) fuzzy model-based secure communication in multiple time-delay chaotic (MTDC) systems is presented. The proposed encryption method produces a more secure communications system, while effectively protecting the encrypted message.

Original languageEnglish
Title of host publicationInformation Science and Applications 2018 - ICISA 2018
EditorsKuinam J. Kim, Kuinam J. Kim, Nakhoon Baek
PublisherSpringer Verlag
Pages53-66
Number of pages14
ISBN (Print)9789811310553
DOIs
StatePublished - 2019
Externally publishedYes
EventInternational Conference on Information Science and Applications, ICISA 2018 - Kowloon, Hong Kong
Duration: 25 06 201827 06 2018

Publication series

NameLecture Notes in Electrical Engineering
Volume514
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

ConferenceInternational Conference on Information Science and Applications, ICISA 2018
Country/TerritoryHong Kong
CityKowloon
Period25/06/1827/06/18

Bibliographical note

Publisher Copyright:
© 2019, Springer Nature Singapore Pte Ltd.

Keywords

  • Block encryption
  • Chaotic synchronization
  • Exponential synchronization
  • Improved genetic algorithm
  • Triple data encryption algorithm

Fingerprint

Dive into the research topics of 'Applying triple data encryption algorithm to a chaotic systems: T-S fuzzy model-based approach'. Together they form a unique fingerprint.

Cite this