Computing Reviews

Cryptology transmitted message protection :from deterministic chaos up to optical vortices
Izmailov I., Poizner B., Romanov I., Smolskiy S., Springer International Publishing,New York, NY,2016. 327 pp.Type:Book
Date Reviewed: 11/23/16

In the book now presented, the authors describe their experience of the theoretical investigation of the properties of the deterministic chaos generators in radio and optical range for the protected communication systems based on them, as well as the models of generators and communication devices for the radio range.

This is a fair summary of the text written by three people associated with the Tomsk State University (Russia) and a fourth collaborator from the Moscow Power Engineering Institute.

Chapter 1 is a brief introduction to information protection and chaos theory, but it is narrow. While it is perhaps decent mathematically, it discusses neither computer theory nor software. Chapter 2 discusses “Radiophysical and Optical Chaotic Oscillators,” and chapter 3 “Radio Electronic System for Data Transmission on the Base of the Chaotic Oscillator with Nonlinearity in the Form of Parabola Composition.” From there, we go on to “Single and Double Circuit Nonlinear Ring Interferometer as a Cipherer in Optical Systems of Synchronous Chaotic Communications,” “Optical Vortices in Ring and Non-Ring Interferometers and a Model of the Digital Communication System,” and “Variety of Nonlinear Type in the Chaotic Oscillator and Structure Organization of the Chaotic Communication System as a Way to Increase the Confidence Degree.”

Given that these are the chapter titles, you have an idea of the readability of the contents. There is much math that seems generally correct and plausible, but it is hard to assess the degree to which it is evidence based. References to hardware circuits seem to be theoretical, in that few references to specific commercially available chip sets are given.

It is clear throughout that English is not the native language of the authors, and that the editors did not bother to correct the frequent grammatical errors. Approximately half of the references are in Russian, and the vast majority of the balance, in English or German, are published in Russian publications that may be difficult for readers of Computing Reviews (CR) to access. The authors are physicists or radio engineers, not computer scientists. There are no software references, nor does coding, software, or the like appear in the index. Useful ”Western“ references (such as [1,2]) are neither cited nor discussed. This book will be of little use to most readers of CR.


1)

Schneier, B. Applied cryptography: protocols, algorithms and source code in C. Wiley, New York, NY, 2015.


2)

Ferguson, N. Cryptography engineering: design principles and practical applications. Wiley, New York, NY, 2010.

Reviewer:  David Bellin Review #: CR144942 (1702-0091)

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy