For computer scientists, especially individuals within the security field, using chaos continues to be restricted to the computation of the small assortment of famous but unacceptable maps that provide no explanation of why chaos is pertinent within the considered contexts. Discrete Dynamical Systems and Chaotic Machines: Theory and Applications shows steps to make finite machines, for example computers, neural systems, and wireless sensor systems, work chaotically as defined inside a rigorous mathematical framework. Considering these machines must interact within the real life, the authors share their research results around the behaviors of discrete dynamical systems as well as their use within information technology.
Covering both theoretical and practical aspects, it presents:
- Key mathematical and physical ideas in chaos theory
- Information technology fundamentals, clearly creating that chaos qualities could be satisfied by finite condition machines
- Concrete applying chaotic machines in computer security, including pseudorandom number generators, hash functions, digital watermarking, and steganography
- Concrete applying chaotic machines in wireless sensor systems, including secure data aggregation and video surveillance
Before the authors’ recent research, the sensible implementation from the mathematical theory of chaos on finite machines elevated several issues. This self-contained book illustrates how chaos theory enables study regarding computer security problems, for example steganalysis, that otherwise couldn’t be tackled. Additionally, it explains the way the theory reinforces existing cryptographically secure tools and schemes.
Table of Contents
Introducing Chaos: Classical Examples by means of Introduction. The Mathematical Theory of Chaos: Definitions and Notations. Devaney’s Formulation of Chaos. Other Formulations of Chaos. From Theory to rehearse: A Simple Tool: the Chaotic Iterations. Theoretical Proofs of Chaotic Machines. Applying Chaos within the Information Technology Field: Information Security. Wireless Sensor Systems. Conclusion: Conclusion. Bibliography. Index.
Key:Discrete Dynamical Systems and Chaotic MachinesTheory and Applications