2003
DOI: 10.1016/s0010-4655(02)00875-5
|View full text |Cite
|
Sign up to set email alerts
|

On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision

Abstract: H. Zhou et al. have proposed a chaotic encryption scheme, which is based on a kind of computerized piecewise linear chaotic map (PWLCM) realized in finite computing precision. In this paper, we point out that Zhou's encryption scheme is not secure enough from strict cryptographic viewpoint. The reason lies in the dynamical degradation of the computerized piecewise linear chaotic map employed by H. Zhou et al. The dynamical degradation of the computerized chaos induces many weak keys to cause large information … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
57
0
1

Year Published

2005
2005
2018
2018

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 147 publications
(58 citation statements)
references
References 34 publications
0
57
0
1
Order By: Relevance
“…When using chaos in digital ciphers, many researchers have found dynamical degradation of digital chaotic systems and such degradation reduces the security of the designed chaotic ciphers [Erdmann & Murphy, 1992;Li et al, 2001aLi et al, , 2003aMasuda & Aihara, 2002b;Sang et al, 1998a,b;Wheeler & Matthews, 1991;. Actually, motivated by various "strange" phenomena of chaos observed on digital computers and in numerical simulations, pathologies of digital chaotic systems have been observed and extensively studied in the field of chaos theory [Arrowsmith & Vivaldi, 1994;Beck & Roepstorff, 1987;Benettin et al, 1978;Binder, 1992;Binder & Jensen, 1986;Blank, 1994Blank, , 1997Borcherds & McCauley, 1993;Bosioand & Vivaldi, 2000;Chambers, 1999;Chirkikov & Vivaldi, 1999;Diamond et al, 1994Diamond et al, , 1995Earn & Tremaine, 1992;Fryska & Zohdy, 1992;Góra & Boyarsku, 1988;Grebogi et al, 1988;Hogg & Huberman, 1985;Huberman, 1986;Kaneko, 1988;Karney, 1983;Keating, 1991;Levy, 1982;Li et al, 2001a;Lowenstein & Vivaldi, 1998;Masuda & Aihara, 2002b;McCauley & Palmore, 1986;Palmore & Herring, 1990;Palmore & McCauley, 1987;…”
Section: Theoretical Work: Dynamical Degradation Of Digital Chaotic Smentioning
confidence: 99%
“…When using chaos in digital ciphers, many researchers have found dynamical degradation of digital chaotic systems and such degradation reduces the security of the designed chaotic ciphers [Erdmann & Murphy, 1992;Li et al, 2001aLi et al, , 2003aMasuda & Aihara, 2002b;Sang et al, 1998a,b;Wheeler & Matthews, 1991;. Actually, motivated by various "strange" phenomena of chaos observed on digital computers and in numerical simulations, pathologies of digital chaotic systems have been observed and extensively studied in the field of chaos theory [Arrowsmith & Vivaldi, 1994;Beck & Roepstorff, 1987;Benettin et al, 1978;Binder, 1992;Binder & Jensen, 1986;Blank, 1994Blank, , 1997Borcherds & McCauley, 1993;Bosioand & Vivaldi, 2000;Chambers, 1999;Chirkikov & Vivaldi, 1999;Diamond et al, 1994Diamond et al, , 1995Earn & Tremaine, 1992;Fryska & Zohdy, 1992;Góra & Boyarsku, 1988;Grebogi et al, 1988;Hogg & Huberman, 1985;Huberman, 1986;Kaneko, 1988;Karney, 1983;Keating, 1991;Levy, 1982;Li et al, 2001a;Lowenstein & Vivaldi, 1998;Masuda & Aihara, 2002b;McCauley & Palmore, 1986;Palmore & Herring, 1990;Palmore & McCauley, 1987;…”
Section: Theoretical Work: Dynamical Degradation Of Digital Chaotic Smentioning
confidence: 99%
“…This is very useful because we do not need to change the public key to have a new crypto dynamic, representing a good option to protect from the attack described in this section. The chaos degradation is a well-known problem for chaos-based cryptosystems [17]. In DDE, this problem is addressed by two means: (i) as the chaotic process is involved only in the simulation part, which happens off communication, algorithms of quality verification can be performed before using the data for the encryption; and (ii) also, as we are proposing when coupled maps from nature are used, there is information from the characterization of the phenomena that can indicate the degradation of the chaos, i.e., when the data is taken from an analog circuit.…”
Section: Cryptanalysismentioning
confidence: 99%
“…The first defect implies the difficulties of software and hardware implementation for a chaos-based image encryption method because round-off errors in real number quantizations may lead nonreversible functions for encryption and thus make the decryption process impossible [18]. The second defect implies a chaotic image encryption method could be completely nonchaotic and thus vulnerable to attacks [19]. The third defect shows these chaotic image encryption method may be broken using existing tools and methods after a long-term observation [20], [21].…”
Section: Introductionmentioning
confidence: 99%