Advanced Search
Volume 25 Issue 4
Apr.  2003
Turn off MathJax
Article Contents
Li Shujun, Mou Xuanqin, Ji Zhen, Zhang Jihong. Cryptanalysis of a class of chaotic stream ciphers[J]. Journal of Electronics & Information Technology, 2003, 25(4): 473-478.
Citation: Li Shujun, Mou Xuanqin, Ji Zhen, Zhang Jihong. Cryptanalysis of a class of chaotic stream ciphers[J]. Journal of Electronics & Information Technology, 2003, 25(4): 473-478.

Cryptanalysis of a class of chaotic stream ciphers

  • Received Date: 2001-12-17
  • Rev Recd Date: 2002-07-29
  • Publish Date: 2003-04-19
  • This paper points out that a class of chaotic stream ciphers proposed recently is not secure enough, which is based on digital Piecewise Linear Chaotic Maps (PLCM). It has been known that digital PLCMs statistical properties have essential degradation when PLCMs are realized in finite computing precision, and that such degradation is determined by the resolution of the control parameter (i.e., determined by which digital subset the control parameter is in). Hence, for the studied chaotic stream ciphers, the whole key space can be divided into n- 1 sub-spaces with incremental weakness degree, and the weakness of any fixed key cannot be improved by using higher precision. Based on the above fact, a kind of multi-resolution cryptanalysis is presented to attack the chaotic ciphers. When secure key is selected randomly, the key entropy will decrease by 2bit as a whole. Experiments show that this cryptanalysis is feasible and efficient.
  • loading
  • 周红,俞军,凌燮亭,混沌前馈型流密码的设计,电子学报,1998,26(1),98-101.[2]Hong Zhou, Xie-Ting Ling, Problems with the chaotic inverse systems encryption approach, IEEE Trans. on Circuits and Systems-I, 1997, 44(3), 268-271.[3]周红,罗杰,凌燮亭,混沌非线性反馈密码序列的理论设计和有限精度实现,电子学报,1997,25(10),57-60[4]Zhou Hong, Ling Xieting, Generating chaotic secure sequences with desired statistical properties and high security, Int. J. Bifurcation Chaos, 1997, 7(1), 205-213.[5]桑涛,王汝笠,严义埙,一类新型混沌反馈密码序列的理论设计,电子学报,1999,27(7),47-50.[6]T. Habutsu, Y. Nishio, I. Sasase, S. Mori, A secret key cryptosystem by iterating a chaotic map,Advances in Cryptology-EuroCrypt91, Brighton, UK: 1991, Spinger-Verlag, 1991, Lecture Notes in Computer Science vol. 0547, 127-140.[7]G. Alvarez, F. Monotoya, G. Pastor, M. Romera, Chaotic cryptosystems, in Proc. 33nd Annual 1999 Int. Carnahan Conf. Security Technology, Madrid, Spain 1999, IEEE, 1999, 332-338.[8]E. Alvarez, A. Fernndez, P. Garcla, J. Jimnez, A. Marcano, New approach to chaotic encryption,Physics Letters A, 1999, 263(4-6), 373-375.[9]Shujun Li, Xuanqin Mou, Yuanlong Cai, Improving security of a chaotic encryption approach,Physics Letters A, 2001, 290(3/4), 127-133.[10]Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou, Yuanlong Cai, Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding, Cryptography and Coding-8th IMA Int. Conf., Cirencester, UK: 2001, Springer-Verlag, Lecture Notes in Computer Science vol. 2260, 205-221.[11]Maciej J. Ogorzatek, Herv Dedieu, Some tools for attacking secure communication systems employing chaotic carriers, Proc. Int. Symp. Circuits and Systems, Monterey, USA: 1998, IEEE,1998, vol.4, 522-525.[12]Eli Biham, Cryptoanalysis of the chaotic-map cryptosystem suggested at EuroCrypt91, Advances in Cryptology-EuroCrypt91, Brighton, UK: 1991, Spinger-Verlag, 1991, Lecture Notes in Computer Science vol.0547, 532-534.[13]Andrzej Lasota, Michael C. Mackey, Chaos, Fractals, and Noise-Stochastic Aspects of Dynamics,Second edition, New York: Springer-Verlag, 1997, Chapter 5-6.[14]A. Baranousky, D. Daems, Design of one-dimensional chaotic maps with prescribed statistical properties, Int. J.[J]. Bifurcation Chaos.1995,5(6):1585-[15]周红,凌燮亭,有限精度混沌系统的m序列扰动实现,电子学报,1997,25(7),95-97.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3362) PDF downloads(645) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return