SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
From MaRDI portal
Publication:3579255
Abstract: In recent years, a great amount of secure communications systems based on chaotic synchronization have been published. Most of the proposed schemes fail to explain a number of features of fundamental importance to all cryptosystems, such as key definition, characterization, and generation. As a consequence, the proposed ciphers are difficult to realize in practice with a reasonable degree of security. Likewise, they are seldom accompanied by a security analysis. Thus, it is hard for the reader to have a hint about their security. In this work we provide a set of guidelines that every new cryptosystems would benefit from adhering to. The proposed guidelines address these two main gaps, i.e., correct key management and security analysis, to help new cryptosystems be presented in a more rigorous cryptographic way. Also some recommendations are offered regarding some practical aspects of communications, such as channel noise, limited bandwith, and attenuation.
Recommendations
- SOME DESIGN RULES FOR CHAOS-BASED ENCRYPTION SYSTEMS
- Chaos-based cryptography. A possible solution for information security
- Chaos-based cryptography.
- Cryptography based on chaotic systems
- Chaos-Based Public-Key Cryptography
- FUNDAMENTALS OF A CLASSICAL CHAOS-BASED CRYPTOSYSTEM WITH SOME QUANTUM CRYPTOGRAPHY FEATURES
- PROBLEMS WITH A PROBABILISTIC ENCRYPTION SCHEME BASED ON CHAOTIC SYSTEMS
- Theory and practice of chaotic cryptography
- Analysis of some recently proposed chaos-based encryption algorithms
- A new chaotic cryptosystem
Cites work
- scientific article; zbMATH DE number 44378 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- A NOVEL FAST IMAGE ENCRYPTION SCHEME BASED ON 3D CHAOTIC BAKER MAPS
- A New Approach to Breaking Down Chaotic Secure Communication
- A PROBABILISTIC SYMMETRIC ENCRYPTION SCHEME FOR VERY FAST SECURE COMMUNICATION BASED ON CHAOTIC SYSTEMS OF DIFFERENCE EQUATIONS
- A SIMPLE WAY TO SYNCHRONIZE CHAOTIC SYSTEMS WITH APPLICATIONS TO SECURE COMMUNICATION SYSTEMS
- A modified chaotic cryptographic method
- A new chaotic secure communication scheme
- A new spatiotemporally chaotic cryptosystem and its security and performance analyses
- A novel method for designing S-boxes based on chaotic maps
- A simple method to reveal the parameters of the Lorenz system
- A symmetric image encryption scheme based on 3D chaotic cat maps
- Baptista-type chaotic cryptosystems: problems and countermeasures
- Breaking parameter modulated chaotic secure communication system
- Breaking projective chaos synchronization secure communication using filtering and generalized synchronization
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Communicating with noise: How chaos and noise combine to generate secure encryption keys
- Communication Theory of Secrecy Systems*
- Communication by chaotic signals: the inverse system approach
- Cryptanalysis of a chaotic encryption system
- Cryptanalysis of a chaotic secure communication system
- Cryptanalysis of a discrete chaotic cryptosystem using external key
- Cryptanalysis of a new signal security system for multimedia data transmission
- Cryptanalysis of a novel cryptosystem based on chaotic oscillators and feedback inversion
- Cryptanalysis of an ergodic chaotic cipher
- Cryptanalyzing a discrete-time chaos synchronization secure communication system
- Cryptographically secure substitutions based on the approximation of mixing maps
- Cryptography with chaos
- Cryptosystem using chaotic keys
- Cryptosystems with discretized chaotic maps
- DESIGN OF ONE-DIMENSIONAL CHAOTIC MAPS WITH PRESCRIBED STATISTICAL PROPERTIES
- Decoding Digital Information from the Cascaded Heterogeneous Chaotic Systems
- Decoding chaotic cryptography without access to the superkey.
- Design of a novel cryptosystem based on chaotic oscillators and feedback inversion
- Digital generators of chaos
- Discrete chaotic cryptography using external key
- EXPERIMENTAL DEMONSTRATION OF SECURE COMMUNICATIONS VIA CHAOTIC SYNCHRONIZATION
- Estimating system parameters of Chua's circuit from synchronizing signal
- Extracting information masked by chaos and contaminated with noise: some considerations on the security of communication approaches using chaos.
- Modern Statistical, Systems, and GPSS Simulation
- ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS
- On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision
- Reconstructing the keystream from a chaotic encryption scheme
- Recovery of digital signals from chaotic switching
- SPREAD SPECTRUM COMMUNICATION THROUGH MODULATION OF CHAOS
- STEPS TOWARD UNMASKING SECURE COMMUNICATIONS
- Signal Extraction from Chaotic Communications
- Stability analysis for the synchronization of chaotic systems with different order: application to secure communications
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- Synchronization in chaotic systems
- Synchronization of Chaotic Systems and Transmission of Information
- TRANSMISSION OF DIGITAL SIGNALS BY CHAOTIC SYNCHRONIZATION
- The synchronization of chaotic systems
- UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME
Cited in
(only showing first 100 items - show all)- Breaking a novel image encryption scheme based on improved hyperchaotic sequences
- A new reduced-order observer for the synchronization of nonlinear chaotic systems: an application to secure communications
- Bit cyclic shift method to reinforce digital chaotic maps and its application in pseudorandom number generator
- Impulsive synchronization of coupled delayed neural networks with actuator saturation and its application to image encryption
- A chaotic image encryption scheme owning temp-value feedback
- An efficient self-adaptive model for chaotic image encryption algorithm
- Pseudo-random number generator based on mixing of three chaotic maps
- Design of image cipher using block-based scrambling and image filtering
- Drive-response asymptotic shape synchronization for a class of two-dimensional chaotic systems and its application in image encryption
- Image encryption using random bit sequence based on chaotic maps
- Robust forecasting using predictive generalized synchronization in reservoir computing
- Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- On the security of a spatiotemporal chaotic cryptosystem
- Breaking a chaotic image encryption algorithm based on perceptron model
- Randomness improvement of chaotic maps for image encryption in a wireless communication scheme using PIC-microcontroller via ZigBee channels
- Noise-robust and secure communication protocol for industrial networked control systems
- SKC-CCCO: an encryption algorithm for quantum group signature
- An encryption protocol for NEQR images based on one-particle quantum walks on a circle
- Chaos based efficient selective image encryption
- A new one-dimensional chaotic system with applications in image encryption
- SOME DESIGN RULES FOR CHAOS-BASED ENCRYPTION SYSTEMS
- Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption
- Quantum-chaotic key distribution in optical networks: from secrecy to implementation with logistic map
- An effective approach for constructing a class of 4D multicluster conservative chaotic systems without external excitation
- Discrete Chaotification of a Modulated Logistic System
- Synchronization of the unified chaotic system and application in secure communication
- Quantum image encryption algorithm based on Fisher-Yates algorithm and logistic mapping
- A three-dimensional bit-level image encryption algorithm with Rubik's cube method
- A novel batch image encryption algorithm using parallel computing
- Self-synchronizing stream ciphers and dynamical systems: state of the art and open issues
- FURTHER RESULTS ON MASTER-SLAVE SYNCHRONIZATION OF GENERAL LUR'E SYSTEMS WITH TIME-VARYING DELAY
- Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation
- FUNDAMENTALS OF A CLASSICAL CHAOS-BASED CRYPTOSYSTEM WITH SOME QUANTUM CRYPTOGRAPHY FEATURES
- Comment on ``Image encryption with chaotically coupled chaotic maps
- DIGITAL SECURE-COMMUNICATION USING ROBUST HYPER-CHAOTIC SYSTEMS
- A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme
- Mehrab maps: one-dimensional piecewise nonlinear chaotic maps
- Cycle lengths and correlation properties of finite precision chaotic maps
- A New Image Encryption Algorithm with Cantor Diagonal Scrambling Based on the PUMCML System
- Implementation of an encrypted-compressed image wireless transmission scheme based on chaotic fractional-order systems
- BREAKING AN IMAGE ENCRYPTION ALGORITHM BASED ON CHAOS
- A new fractional one dimensional chaotic map and its application in high-speed image encryption
- A chaotic image encryption scheme based on Hénon-Chebyshev modulation map and genetic operations
- Message embedded chaotic masking synchronization scheme based on the generalized Lorenz system and its security analysis
- Pseudo-Random Bit Generation Based on 2D Chaotic Maps of Logistic Type and Its Applications in Chaotic Cryptography
- A quantum image encryption algorithm based on the Feistel structure
- Construction of one-way hash functions with increased key space using adaptive chaotic maps
- Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem and its improved version
- Can hyperchaotic maps with high complexity produce multistability?
- Joint compression and encryption using chaotically mutated Huffman trees
- Secure image encryption algorithm design using a novel chaos based S-Box
- Self-shrinking chaotic stream ciphers
- Application of Gray codes to the study of the theory of symbolic dynamics of unimodal maps
- Desynchronization chaos shift keying method based on the error second derivative and its security analysis
- An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach
- Cryptanalysis of a DNA-based image encryption scheme
- High-order sliding mode-based synchronisation of fractional-order chaotic systems subject to output delay and unknown disturbance
- Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table
- Cryptanalysis of multiplicative coupled cryptosystems based on the Chebyshev polynomials
- Observer-based synchronization of memristive neural networks under DoS attacks and actuator saturation and its application to image encryption
- Deciphering an image cipher based on mixed transformed logistic maps
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Cryptanalysis of a computer cryptography scheme based on a filter bank
- An efficient algorithm deciding chaos for linear cellular automata over \((\mathbb{Z}/m\mathbb{Z})^n\) with applications to data encryption
- Security problems for a pseudorandom sequence generator based on the Chen chaotic system
- A competitive searching-based chaotic cipher
- A novel image encryption algorithm based on DNA strand exchange and diffusion
- The complete bifurcation analysis of buck converter under current mode control
- Design and Test of Pseudorandom Number Generator Using a Star Network of Lorenz Oscillators
- A robust bit-level image encryption based on Bessel map
- A fingerprint image encryption scheme based on hyperchaotic Rössler map
- A fast digital chaotic generator for secure communication
- 2D non-adjacent coupled map lattice with q and its applications in image encryption
- OCML-based colour image encryption
- A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity
- Theory and practice of chaotic cryptography
- Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion
- Chaos synchronization in generalized Lorenz systems and an application to image encryption
- A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme
- Dynamic substitution based encryption algorithm for highly correlated data
- Secure communication systems based on the synchronization of chaotic systems
- Quantum image encryption algorithm based on image correlation decomposition
- PSIS-based blind watermarking scheme (PSISBW) with tamper detection
- Enhanced cryptography by multiple chaotic dynamics
- Novel image encryption/decryption based on quantum Fourier transform and double phase encoding
- Deciphering an image cipher based on 3-cell chaotic map and biological operations
- Real-time image encryption using a low-complexity discrete 3D dual chaotic cipher
- Pseudo-random bit generator based on multi-modal maps
- A new oscillator with mega-stability and its Hamilton energy: Infinite coexisting hidden and self-excited attractors
- A secure communication design based on the chaotic logistic map: an experimental realization using Arduino microcontrollers
- An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem
- Chaos and ergodicity are decidable for linear cellular automata over \((\mathbb{Z}/m\mathbb{Z})^n\)
- Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme
- A parallel encryption algorithm based on piecewise linear chaotic map
- Improving the pseudo-randomness properties of chaotic maps using deep-zoom
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- A novel image encryption algorithm based on chaotic billiards
- Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
- Secure image encryption scheme based on a new robust chaotic map and strong S-box
This page was built for publication: SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3579255)