Cryptanalyzing a discrete-time chaos synchronization secure communication system
From MaRDI portal
Abstract: This paper describes the security weakness of a recently proposed secure communication method based on discrete-time chaos synchronization. We show that the security is compromised even without precise knowledge of the chaotic system used. We also make many suggestions to improve its security in future versions.
Recommendations
- Breaking parameter modulated chaotic secure communication system
- Security analysis of communication system based on the synchronization of different order chaotic systems
- Breaking projective chaos synchronization secure communication using filtering and generalized synchronization
- Cryptanalysis of a chaotic secure communication system
- Applications of discrete chaotic systems in secure communication
Cites work
- scientific article; zbMATH DE number 774344 (Why is no real title available?)
- scientific article; zbMATH DE number 1406790 (Why is no real title available?)
- Cryptanalysis of a chaotic encryption system
- Cryptanalysis of a chaotic secure communication system
- Cryptanalysis of a discrete chaotic cryptosystem using external key
- Cryptanalysis of an ergodic chaotic cipher
- On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision
- STEPS TOWARD UNMASKING SECURE COMMUNICATIONS
- Secure digital communication using discrete-time chaos synchronization
- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding
- UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME
Cited in
(19)- Controlled henon system and its cryptographic applications
- Multi-switching combination synchronization of discrete-time hyperchaotic systems for encrypted audio communication
- A generalized chaos synchronization based encryption algorithm for sound signal communication
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- DIGITAL SECURE-COMMUNICATION USING ROBUST HYPER-CHAOTIC SYSTEMS
- Security of public key encryption technique based on multiple chaotic systems
- Cryptanalysis of a computer cryptography scheme based on a filter bank
- Security analysis of chaotic communication systems based on Volterra--Wiener--Korenberg model
- A Frequency Aliasing Approach to Chaos-Based Cryptosystems
- Cryptanalysis of a chaotic secure communication system
- Chaos control and synchronization in Bragg acousto-optic bistable systems driven by a separate chaotic system
- Breaking parameter modulated chaotic secure communication system
- Breaking projective chaos synchronization secure communication using filtering and generalized synchronization
- scientific article; zbMATH DE number 5584373 (Why is no real title available?)
- Secure digital communication using discrete-time chaos synchronization
- Quasi-synchronization of delayed chaotic systems with parameters mismatch and stochastic perturbation
- Cryptanalysis of a new signal security system for multimedia data transmission
- SECURE DATA TRANSMISSION BASED ON MULTI-INPUT MULTI-OUTPUT DELAYED CHAOTIC SYSTEM
- Security analysis of communication system based on the synchronization of different order chaotic systems
This page was built for publication: Cryptanalyzing a discrete-time chaos synchronization secure communication system
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1878240)