{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T23:56:49Z","timestamp":1648771009729},"reference-count":9,"publisher":"World Scientific Pub Co Pte Lt","issue":"07","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Bifurcation Chaos"],"published-print":{"date-parts":[[2016,6,30]]},"abstract":"<jats:p> The cipher block chaining (CBC) mode of operation was invented by IBM (International Business Machine) in 1976. It presents a very popular way of encrypting that is used in various applications. In this paper, we have mathematically proven that, under some conditions, the CBC mode of operation can admit a chaotic behavior according to Devaney. Some cases will be properly studied in order to provide evidence for this idea. <\/jats:p>","DOI":"10.1142\/s0218127416501133","type":"journal-article","created":{"date-parts":[[2016,7,15]],"date-time":"2016-07-15T10:00:50Z","timestamp":1468576850000},"page":"1650113","source":"Crossref","is-referenced-by-count":3,"title":["Proving Chaotic Behavior of CBC Mode of Operation"],"prefix":"10.1142","volume":"26","author":[{"given":"Abdessalem","family":"Abidi","sequence":"first","affiliation":[{"name":"Electronics and Microelectronics Laboratory, Faculty of Sciences of Monastir, University of Monastir, Tunisia"}]},{"given":"Qianxue","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Automation, Guangdong University of Technology, Guangzhou 510006, P. R. China"}]},{"given":"Belgacem","family":"Bouallegue","sequence":"additional","affiliation":[{"name":"Electronics and Microelectronics Laboratory, Faculty of Sciences of Monastir, University of Monastir, Tunisia"}]},{"given":"Mohsen","family":"Machhout","sequence":"additional","affiliation":[{"name":"Electronics and Microelectronics Laboratory, Faculty of Sciences of Monastir, University of Monastir, Tunisia"}]},{"given":"Christophe","family":"Guyeux","sequence":"additional","affiliation":[{"name":"FEMTO-ST Institute, UMR 6174 CNRS, DISC Computer Science Department, University of Franche-Comt\u00e9, 16, Route de Gray, 25000 Besan\u00e7on, France"}]}],"member":"219","published-online":{"date-parts":[[2016,7,15]]},"reference":[{"key":"S0218127416501133BIB001","doi-asserted-by":"publisher","DOI":"10.1260\/1748-3018.4.2.167"},{"key":"S0218127416501133BIB002","first-page":"118","volume":"4","author":"Bahi J.","year":"2011","journal-title":"Int. J. Adv. Securit."},{"key":"S0218127416501133BIB004","unstructured":"Bahi, J. &  Guyeux, C.  [2013]  Discrete Dynamical Systems and Chaotic Machines: Theory and Applications  (Chapman and Hall\/CRC),  212 p."},{"key":"S0218127416501133BIB005","doi-asserted-by":"publisher","DOI":"10.1080\/00029890.1992.11995856"},{"key":"S0218127416501133BIB006","volume-title":"An Introduction to Chaotic Dynamical Systems","author":"Devaney R. L.","year":"1989","edition":"2"},{"key":"S0218127416501133BIB008","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25237-2_5"},{"key":"S0218127416501133BIB009","first-page":"19","volume":"5","author":"Huang K.-T.","year":"2013","journal-title":"Int. J. Netw. Securit. Appl."},{"key":"S0218127416501133BIB010","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511626302"},{"key":"S0218127416501133BIB012","volume-title":"Security Requirements for Cryptographic Modules","author":"Vassilev A.","year":"2005"}],"container-title":["International Journal of Bifurcation and Chaos"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218127416501133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T04:32:47Z","timestamp":1565152367000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218127416501133"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,30]]},"references-count":9,"journal-issue":{"issue":"07","published-online":{"date-parts":[[2016,7,15]]},"published-print":{"date-parts":[[2016,6,30]]}},"alternative-id":["10.1142\/S0218127416501133"],"URL":"https:\/\/doi.org\/10.1142\/s0218127416501133","relation":{},"ISSN":["0218-1274","1793-6551"],"issn-type":[{"value":"0218-1274","type":"print"},{"value":"1793-6551","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,30]]}}}