Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cryptology transmitted message protection : from deterministic chaos up to optical vortices
Izmailov I., Poizner B., Romanov I., Smolskiy S., Springer International Publishing, New York, NY, 2016. 327 pp. Type: Book (978-3-319301-23-5)
Date Reviewed: Nov 23 2016

In the book now presented, the authors describe their experience of the theoretical investigation of the properties of the deterministic chaos generators in radio and optical range for the protected communication systems based on them, as well as the models of generators and communication devices for the radio range.

This is a fair summary of the text written by three people associated with the Tomsk State University (Russia) and a fourth collaborator from the Moscow Power Engineering Institute.

Chapter 1 is a brief introduction to information protection and chaos theory, but it is narrow. While it is perhaps decent mathematically, it discusses neither computer theory nor software. Chapter 2 discusses “Radiophysical and Optical Chaotic Oscillators,” and chapter 3 “Radio Electronic System for Data Transmission on the Base of the Chaotic Oscillator with Nonlinearity in the Form of Parabola Composition.” From there, we go on to “Single and Double Circuit Nonlinear Ring Interferometer as a Cipherer in Optical Systems of Synchronous Chaotic Communications,” “Optical Vortices in Ring and Non-Ring Interferometers and a Model of the Digital Communication System,” and “Variety of Nonlinear Type in the Chaotic Oscillator and Structure Organization of the Chaotic Communication System as a Way to Increase the Confidence Degree.”

Given that these are the chapter titles, you have an idea of the readability of the contents. There is much math that seems generally correct and plausible, but it is hard to assess the degree to which it is evidence based. References to hardware circuits seem to be theoretical, in that few references to specific commercially available chip sets are given.

It is clear throughout that English is not the native language of the authors, and that the editors did not bother to correct the frequent grammatical errors. Approximately half of the references are in Russian, and the vast majority of the balance, in English or German, are published in Russian publications that may be difficult for readers of Computing Reviews (CR) to access. The authors are physicists or radio engineers, not computer scientists. There are no software references, nor does coding, software, or the like appear in the index. Useful ”Western“ references (such as [1,2]) are neither cited nor discussed. This book will be of little use to most readers of CR.

Reviewer:  David Bellin Review #: CR144942 (1702-0091)
1) Schneier, B. Applied cryptography: protocols, algorithms and source code in C. Wiley, New York, NY, 2015.
2) Ferguson, N. Cryptography engineering: design principles and practical applications. Wiley, New York, NY, 2010.
Bookmark and Share
  Featured Reviewer  
 
Data Encryption (E.3 )
 
 
Number-Theoretic Computations (F.2.1 ... )
 
 
Numerical Algorithms And Problems (F.2.1 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy