Breaking an encryption scheme based on chaotic baker map
From MaRDI portal
Abstract: In recent years, a growing number of cryptosystems based on chaos have been proposed, many of them fundamentally flawed by a lack of robustness and security. This paper describes the security weaknesses of a recently proposed cryptographic algorithm with chaos at the physical level. It is shown that the security is trivially compromised for practical implementations of the cryptosystem with finite computing precision and for the use of the iteration number n as the secret key. Some possible countermeasures to enhance the security of the chaos-based cryptographic algorithm are also discussed.
Recommendations
- Cryptanalysis of an ergodic chaotic cipher
- Cryptanalysis of a chaotic encryption system
- Breaking a chaotic cryptographic scheme based on composition maps
- Comment on ``Image encryption with chaotically coupled chaotic maps
- Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps
Cites work
Cited in
(11)- Cycle detection for secure chaos-based encryption
- Cryptanalysis of a discrete-time synchronous chaotic encryption system
- Chaotic behavior and dynamics of maps used in a method of scrambling signals
- Breaking a chaotic cryptographic scheme based on composition maps
- Lessons learnt from the cryptanalysis of chaos-based ciphers
- Comment on ``Image encryption with chaotically coupled chaotic maps
- Chaos-based cryptograph incorporated with \(S\)-box algebraic operation
- How to perturb Bernoulli shift map
- Quantum image encryption scheme using independent bit-plane permutation and Baker map
- Cryptanalysis of an ergodic chaotic cipher
- Periodic and chaotic orbits of a neuron model
This page was built for publication: Breaking an encryption scheme based on chaotic baker map
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q973548)