On the cryptanalysis of two cryptographic algorithms that utilize chaotic neural networks (Q1665747): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Chaos and randomness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography with chaos / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of a chaotic encryption system / rank
 
Normal rank
Property / cites work
 
Property / cites work: Keyed hash function based on a chaotic map / rank
 
Normal rank
Property / cites work
 
Property / cites work: A novel image encryption algorithm based on a 3D chaotic map / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chaos-based random number generators-part I: analysis [cryptography] / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the design of chaos-based secure communication systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3063552 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography based on delayed chaotic neural networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mathematical Systems Theory I / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chaotic attractors in delayed neural networks / rank
 
Normal rank

Latest revision as of 11:51, 16 July 2024

scientific article
Language Label Description Also known as
English
On the cryptanalysis of two cryptographic algorithms that utilize chaotic neural networks
scientific article

    Statements

    On the cryptanalysis of two cryptographic algorithms that utilize chaotic neural networks (English)
    0 references
    0 references
    0 references
    0 references
    27 August 2018
    0 references
    Summary: This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with relative ease, demonstrating that its potential as a hash function is flawed. Similarly, we show that the DCBE is also not secure since it is not capable of resisting known plaintext, chosen plaintext, and chosen ciphertext attacks. Furthermore, unfortunately, both schemes are not efficient either, because of the large number of iteration steps involved in their respective implementations.
    0 references
    0 references
    0 references
    0 references