1997
DOI: 10.1016/s0375-9601(97)00551-3
|View full text |Cite
|
Sign up to set email alerts
|

Extracting information masked by chaos and contaminated with noise: Some considerations on the security of communication approaches using chaos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

1999
1999
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(28 citation statements)
references
References 11 publications
0
28
0
Order By: Relevance
“…As discussed above, the decryption error is not sensitive to the mismatch of {a µ , b µ , A µ , B µ }, so the searching complexity will be small practically. Assuming that the range of the four secret parameters are a µ ∈ [12,50], b µ ∈ [2.5, 9.5], A µ ∈ [0.02, 0.1], B µ ∈ [0.5, 2], respectively, the searching steps are chosen as δ aµ = δ bµ = 1, δ Aµ = 0.01, δ Bµ = 0.1, respectively 5 . Note that the range and the searching step of b µ are intentionally chosen to make sure that the real value b µ = 5 cannot be visited in the current searching precision, which is common in real attacks since the real values of the secret parameters are all unknown.…”
Section: A Reduction Of the Key Spacementioning
confidence: 99%
“…As discussed above, the decryption error is not sensitive to the mismatch of {a µ , b µ , A µ , B µ }, so the searching complexity will be small practically. Assuming that the range of the four secret parameters are a µ ∈ [12,50], b µ ∈ [2.5, 9.5], A µ ∈ [0.02, 0.1], B µ ∈ [0.5, 2], respectively, the searching steps are chosen as δ aµ = δ bµ = 1, δ Aµ = 0.01, δ Bµ = 0.1, respectively 5 . Note that the range and the searching step of b µ are intentionally chosen to make sure that the real value b µ = 5 cannot be visited in the current searching precision, which is common in real attacks since the real values of the secret parameters are all unknown.…”
Section: A Reduction Of the Key Spacementioning
confidence: 99%
“…
The authors would like to thank Dr Shujun Li for pointing out to them References [1,2]. These show that the encryption scheme proposed in their above paper is insecure against some attacks, as discussed in References [1,2].
…”
mentioning
confidence: 79%
“…In [Zhou & Chen, 1997], the return map attack was also used to break a differential CSK scheme based on a discrete-time chaotic map [Parlitz & Ergezinger, 1994]. To facilitate the following discussion, without loss of generality, this paper will focus on the attack scheme of Pérez & Cerdeira on the Lorenz system thereby demonstrating how the return map is constructed and how the attack works to break a typical chaotic switching scheme proposed in [Cuomo & Openheim, 1993].…”
Section: Return-map Attacks and Related Countermeasuresmentioning
confidence: 99%