Browse Prior Art Database

Data Encryption and Decryption with Chaotic Wavelet System (CWS)

IP.com Disclosure Number: IPCOM000015203D
Original Publication Date: 2002-Mar-08
Included in the Prior Art Database: 2003-Jun-20

Publishing Venue

IBM

Abstract

Disclosed is a system that utilizes properties and features in chaotic and wavelet systems to provide an advanced mechanism for data encryption and decryption. This new method encrypts data with high-level of complexity for identification, authentication, and protection of information resources. In addition, this invention can be used to minimize threats that jeopardize the protection of sensitive information, and to guarantee security outside the bounds of a single processor. However, unlike existing cryptographic systems and methods, the cryptographic method employed in this invention is a unique data encryption decryption process. The encryption process consists of two phases: first, it transforms data from a one-dimensional domain to a 2-dimensional wavelet domain, then, the transformed data is modulated by a chaotic system to form a complex encrypted data sequence. As a result, the level of encryption complexity in this invention is very high, thus, the chances of breaking its code is minimized, virtually zero, and hence, the integrity of information is securely protected. By using both wavelet transform and chaos technologies, this invention attempts to exploit many advantages that both wavelet and chaos provide to information encryption technology, such as: Extremely High Level of Complexity: Since the input information presented to the system will be wavelet transformed, then integrated in a chaotic sequence, therefore, the resulting output is a very complex encrypted information. Hardware Realization: One of the most advantages that this system offers is that it can be hardware realization as a stand-alone cryptographic adapter, or personal security card, or a security interface unit. Wireless Application: The encoded information generated by CWS not only is securely transmitted electronically through communications networks, it can also be securely used in many wireless applications for transmitting/receiving signals.