Advanced Search
Volume 25 Issue 11
Nov.  2003
Turn off MathJax
Article Contents
Peng Jun, Liao Xiao-Feng, Okamoto Eiji, Zhang Wei, Li Xue-Ming. A Block Encryption Algorithm Combined with the Discrete Chaotic Map and Feistel Network[J]. Journal of Electronics & Information Technology, 2006, 28(4): 707-711.
Citation: Hu Guojie, Feng Zhengjin. Security property of a class of digital chaotic encryption system[J]. Journal of Electronics & Information Technology, 2003, 25(11): 1514-1518.

Security property of a class of digital chaotic encryption system

  • Received Date: 2002-05-24
  • Rev Recd Date: 2002-10-14
  • Publish Date: 2003-11-19
  • Under Kirchhoff principle, the security property of digital chaotic encryption system is discussed using chosen-ciphertext attacking. The key of the encryption system can be got by chosen-ciphertext attacking. The digital chaotic encryption system based on digital filter does not have high privacy.
  • [1]L.O. Chua, T. Lin, Chaos in digital filters, IEEE Trans. on CAS., 1988, CAS-35(6), 648-658.
    [2]T. Lin, L. O. Chua, On chaos of digital filters in the real world, IEEE Trans. on CAS., 1991,CAS-38(10), 557-558.
    [3]D.R. Frey, Chaotic digital coding: an approach to secure communication, IEEE Trans. on CAS.Ⅱ, 1993, CAS-Ⅱ-41(10), 660-666.
    [4]T. Aislam, J. A. Edwards, Secure communications using chaotic digital encoding, Electron. Lett.,1996, 32(3), 190-191.
    [5]M.J. Werter, An improved chaotic digital encoder, IEEE Trans. on CAS. Ⅱ, 1998, CAS-Ⅱ-45(2),227-229.
    [6]W.G. Chambers, Comments on Chaotic digital encoding: an approach to secure communication,IEEE Trans. on CAS Ⅱ, 1999, CAS-Ⅱ-46(11), 1445-1447.
    [7]M. Gotz, K. Kelber, W. Schwarz, Discrete-time chaotic encryption systems-Part Ⅰ: Statistical design approach, IEEE Trans. on CAS. I, 1997, CAS-I-44(10), 963-970.
    [8]Li-Hui Zhou, Zheng-Jin Feng, A new idea of using one-dimensional PWL map in digital secure communications-Dual-resolution approach, IEEE Trans. on CAS. Ⅱ, 2000, CAS-Ⅱ-47(10), 1107-1111.
    [9]B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York:Wiley, 1996, 162-163.
    [10]A. Baranousky, D. Daems, Design of one-dimensional chaotic maps with prescribed statistical properties, Int’l J. of Bifur. Chaos., 1995, 5(6), 1585-1598.
    [11]周红,凌燮亭,有限精度混沌系统的m序列扰动实现,电子学报,1997,25(7),95-97.
  • Cited by

    Periodical cited type(4)

    1. 詹珩艺,李亚超,武春风,宋炫,张廷豪. 弹载双基前视成像雷达解析-迭代定位方法. 系统工程与电子技术. 2023(01): 71-78 .
    2. 尹奎英,黄冠,黄照悠. 基于广义伪距定位的SAR景象匹配导航方法. 雷达科学与技术. 2021(05): 589-597 .
    3. 黄照悠,尹奎英. 一种基于广义伪距定位的SAR载机平台位置解算方法. 电子测量技术. 2020(18): 64-68 .
    4. 梁毅,李晴晴,孙昆,党彦锋,丁金闪. 利用SAR图像匹配的弹体定位新方法. 西安电子科技大学学报. 2018(06): 1-6 .

    Other cited types(10)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2135) PDF downloads(678) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return