Cryptography with chaotic mixing (Q2477303)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Cryptography with chaotic mixing
scientific article

    Statements

    Cryptography with chaotic mixing (English)
    0 references
    0 references
    0 references
    13 March 2008
    0 references
    The authors suggest using the chaotic map \(H=r_p^{-1}\circ T\circ r_p\) defined on the real interval \([0,10^p)\), with \(r_p(x)=\sqrt[p](x)\) (so that \(r_p^{-1}(x)=x^p\)), and \(T(x)=10x \bmod 10\) is the shift map. The secret key is a random real number \(x_0\in[0,10^p)\). A message to be encrypted is a sequence \(m_1,m_2,\dots\in\{0,\dots,10^p-1\}\), and the encrypted message is a list of natural numbers: \(c_1\) is the first number such that \(H^{c_1}(x_0)\in [m_1/10^p,(m_1+1)/10^p)\), \(c_2\) is the first number such that \(H^{c_2}(x_0)\in [m_2/10^p,(m_2+1)/10^p)\), etc. Note that the running time is large if \(p\) is not small enough. Some variants are also discussed. The authors argue, based on the chaotic nature of \(H\), that the system is secure against a brute-force attack which tries to guess \(x_0\) up to a small error. They refer the reader to other papers for cryptanalyses using known plaintext. To what extent is their analysis correct in the real-world case, where random real numbers cannot be chosen nor stored by computers with finite memory? This is not addressed in the paper.
    0 references
    0 references
    chaotic cryptosystem
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references