2011
DOI: 10.1016/j.cnsns.2010.04.031
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a family of self-synchronizing chaotic stream ciphers

Abstract: Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map. In the present work a thorough analysis of the keystream is made which reveals the existence of some serious security problems.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
4

Relationship

3
5

Authors

Journals

citations
Cited by 38 publications
(15 citation statements)
references
References 27 publications
(31 reference statements)
0
15
0
Order By: Relevance
“…Although the work in this paper is focused on the class of functions F , it is possible to extend it to other class of functions considering the topological conjugacy of maps [10, p. 72]. This other class of functions is named F * and any f included in F * has the same properties as those in F with the exception of properties (3) and (6), since if f is in F * , then it possesses a minimum value in [a m , b m ] and is strictly decreasing in [a, a m ] and strictly increasing in…”
Section: Scenariomentioning
confidence: 99%
See 1 more Smart Citation
“…Although the work in this paper is focused on the class of functions F , it is possible to extend it to other class of functions considering the topological conjugacy of maps [10, p. 72]. This other class of functions is named F * and any f included in F * has the same properties as those in F with the exception of properties (3) and (6), since if f is in F * , then it possesses a minimum value in [a m , b m ] and is strictly decreasing in [a, a m ] and strictly increasing in…”
Section: Scenariomentioning
confidence: 99%
“…Nevertheless, there is no direct and explicit proof of this equivalence. One of the main applications of the concept of the GON is the estimation of the control parameter of unimodal maps for cryptanalysis [2,7,12,6]. The precise definition of the key space of a cryptosystem is a commitment in cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…The connection between the basic coordinates of cryptography and chaotic systems has paved the research on chaotic cryptography [2]. A lot of different methods have been proposed in the field of chaos-based cryptography [3][4][5][6][7][8], but many of them show very serious security flaws [9][10][11][12][13][14][15]. A very important family of chaotic cryptosystems is the one inheriting the characteristics of the Substitution Permutation Networks (SPNs), as it is explained in [16].…”
Section: Introductionmentioning
confidence: 99%
“…In order to control chaotic financial systems, synchronization of two chaotic financial systems has been studied. The classical synchronization of two chaotic systems refers to the variables of one system which achieve the consensus with the counterparts of the other system [2][3][4][5][6][7][8][9][10][11][12]. Besides the classical synchronization of two chaotic systems, antisynchronization can also be generated by two chaotic systems, which means the variables of one system achieve the consensus with the negative values of counterparts of the other system [13][14][15].…”
Section: Introductionmentioning
confidence: 99%