SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
From MaRDI portal
Publication:3579255
Abstract: In recent years, a great amount of secure communications systems based on chaotic synchronization have been published. Most of the proposed schemes fail to explain a number of features of fundamental importance to all cryptosystems, such as key definition, characterization, and generation. As a consequence, the proposed ciphers are difficult to realize in practice with a reasonable degree of security. Likewise, they are seldom accompanied by a security analysis. Thus, it is hard for the reader to have a hint about their security. In this work we provide a set of guidelines that every new cryptosystems would benefit from adhering to. The proposed guidelines address these two main gaps, i.e., correct key management and security analysis, to help new cryptosystems be presented in a more rigorous cryptographic way. Also some recommendations are offered regarding some practical aspects of communications, such as channel noise, limited bandwith, and attenuation.
Recommendations
- SOME DESIGN RULES FOR CHAOS-BASED ENCRYPTION SYSTEMS
- Chaos-based cryptography. A possible solution for information security
- Chaos-based cryptography.
- Cryptography based on chaotic systems
- Chaos-Based Public-Key Cryptography
- FUNDAMENTALS OF A CLASSICAL CHAOS-BASED CRYPTOSYSTEM WITH SOME QUANTUM CRYPTOGRAPHY FEATURES
- PROBLEMS WITH A PROBABILISTIC ENCRYPTION SCHEME BASED ON CHAOTIC SYSTEMS
- Theory and practice of chaotic cryptography
- Analysis of some recently proposed chaos-based encryption algorithms
- A new chaotic cryptosystem
Cites work
- scientific article; zbMATH DE number 44378 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- A NOVEL FAST IMAGE ENCRYPTION SCHEME BASED ON 3D CHAOTIC BAKER MAPS
- A New Approach to Breaking Down Chaotic Secure Communication
- A PROBABILISTIC SYMMETRIC ENCRYPTION SCHEME FOR VERY FAST SECURE COMMUNICATION BASED ON CHAOTIC SYSTEMS OF DIFFERENCE EQUATIONS
- A SIMPLE WAY TO SYNCHRONIZE CHAOTIC SYSTEMS WITH APPLICATIONS TO SECURE COMMUNICATION SYSTEMS
- A modified chaotic cryptographic method
- A new chaotic secure communication scheme
- A new spatiotemporally chaotic cryptosystem and its security and performance analyses
- A novel method for designing S-boxes based on chaotic maps
- A simple method to reveal the parameters of the Lorenz system
- A symmetric image encryption scheme based on 3D chaotic cat maps
- Baptista-type chaotic cryptosystems: problems and countermeasures
- Breaking parameter modulated chaotic secure communication system
- Breaking projective chaos synchronization secure communication using filtering and generalized synchronization
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Communicating with noise: How chaos and noise combine to generate secure encryption keys
- Communication Theory of Secrecy Systems*
- Communication by chaotic signals: the inverse system approach
- Cryptanalysis of a chaotic encryption system
- Cryptanalysis of a chaotic secure communication system
- Cryptanalysis of a discrete chaotic cryptosystem using external key
- Cryptanalysis of a new signal security system for multimedia data transmission
- Cryptanalysis of a novel cryptosystem based on chaotic oscillators and feedback inversion
- Cryptanalysis of an ergodic chaotic cipher
- Cryptanalyzing a discrete-time chaos synchronization secure communication system
- Cryptographically secure substitutions based on the approximation of mixing maps
- Cryptography with chaos
- Cryptosystem using chaotic keys
- Cryptosystems with discretized chaotic maps
- DESIGN OF ONE-DIMENSIONAL CHAOTIC MAPS WITH PRESCRIBED STATISTICAL PROPERTIES
- Decoding Digital Information from the Cascaded Heterogeneous Chaotic Systems
- Decoding chaotic cryptography without access to the superkey.
- Design of a novel cryptosystem based on chaotic oscillators and feedback inversion
- Digital generators of chaos
- Discrete chaotic cryptography using external key
- EXPERIMENTAL DEMONSTRATION OF SECURE COMMUNICATIONS VIA CHAOTIC SYNCHRONIZATION
- Estimating system parameters of Chua's circuit from synchronizing signal
- Extracting information masked by chaos and contaminated with noise: some considerations on the security of communication approaches using chaos.
- Modern Statistical, Systems, and GPSS Simulation
- ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS
- On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision
- Reconstructing the keystream from a chaotic encryption scheme
- Recovery of digital signals from chaotic switching
- SPREAD SPECTRUM COMMUNICATION THROUGH MODULATION OF CHAOS
- STEPS TOWARD UNMASKING SECURE COMMUNICATIONS
- Signal Extraction from Chaotic Communications
- Stability analysis for the synchronization of chaotic systems with different order: application to secure communications
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- Synchronization in chaotic systems
- Synchronization of Chaotic Systems and Transmission of Information
- TRANSMISSION OF DIGITAL SIGNALS BY CHAOTIC SYNCHRONIZATION
- The synchronization of chaotic systems
- UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME
Cited in
(only showing first 100 items - show all)- Image encryption using \(q\)-deformed logistic map
- On the security of a spatiotemporal chaotic cryptosystem
- Image encryption using random bit sequence based on chaotic maps
- Pseudo-Random Bit Generation Based on 2D Chaotic Maps of Logistic Type and Its Applications in Chaotic Cryptography
- Self-synchronizing stream ciphers and dynamical systems: state of the art and open issues
- Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps
- Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Speech encryption algorithm based on nonorthogonal quantum state with hyperchaotic keystreams
- Cryptanalysis of a chaotic block cipher with external key and its improved version
- FURTHER RESULTS ON MASTER-SLAVE SYNCHRONIZATION OF GENERAL LUR'E SYSTEMS WITH TIME-VARYING DELAY
- IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS
- Chaotic image encryption design using Tompkins-Paige algorithm
- Image encryption scheme based on non-autonomous chaotic systems
- Self-shrinking chaotic stream ciphers
- Secure communications via synchronization of Liouvillian chaotic systems
- Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem and its improved version
- Cryptanalysis of a discrete-time synchronous chaotic encryption system
- Hyperchaotic encryption based on multi-scroll piecewise linear systems
- Enhanced cryptography by multiple chaotic dynamics
- BREAKING AN IMAGE ENCRYPTION ALGORITHM BASED ON CHAOS
- Novel image encryption/decryption based on quantum Fourier transform and double phase encoding
- Breaking a chaotic cryptographic scheme based on composition maps
- Cryptanalysis of Fridrich's chaotic image encryption
- Lessons learnt from the cryptanalysis of chaos-based ciphers
- Multiplexing of discrete chaotic signals in presence of noise
- Secure communication systems based on the synchronization of chaotic systems
- Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation
- A chaotic stream cipher and the usage in video protection
- A quantum image encryption algorithm based on the Feistel structure
- Cryptanalysis of hybrid cryptosystems
- A new reduced-order observer for the synchronization of nonlinear chaotic systems: an application to secure communications
- Quantum image encryption algorithm based on image correlation decomposition
- Breaking a chaotic image encryption algorithm based on perceptron model
- A chaotic image encryption scheme owning temp-value feedback
- An efficient self-adaptive model for chaotic image encryption algorithm
- Pseudo-random number generator based on mixing of three chaotic maps
- Cryptanalysis of a computer cryptography scheme based on a filter bank
- A new color image cryptosystem via hyperchaos synchronization
- Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
- CRYPTANALYSIS OF A NEW CHAOTIC CRYPTOSYSTEM BASED ON ERGODICITY
- Cryptanalysis of a family of self-synchronizing chaotic stream ciphers
- Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme
- An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach
- GLS coding based security solution to JPEG with the structure of aggregated compression and encryption
- Joint compression and encryption using chaotically mutated Huffman trees
- Synchronization of the unified chaotic system and application in secure communication
- A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis
- Image encryption using chaotic coupled map lattices with time-varying delays
- Modified Baptista type chaotic cryptosystem via matrix secret key
- Security problems for a pseudorandom sequence generator based on the Chen chaotic system
- Applications of tripled chaotic maps in cryptography
- OCML-based colour image encryption
- Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion
- Breaking a novel image encryption scheme based on improved hyperchaotic sequences
- Desynchronization chaos shift keying method based on the error second derivative and its security analysis
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
- A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity
- SOME DESIGN RULES FOR CHAOS-BASED ENCRYPTION SYSTEMS
- Deciphering an image cipher based on 3-cell chaotic map and biological operations
- Real-time image encryption using a low-complexity discrete 3D dual chaotic cipher
- Pseudo-random bit generator based on multi-modal maps
- A weak quantum blind signature with entanglement permutation
- Breaking an orbit-based symmetric cryptosystem
- Comments on ``Arithmetic coding as a non-linear dynamical system
- Theory and practice of chaotic cryptography
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- A parallel encryption algorithm based on piecewise linear chaotic map
- A parallel image encryption algorithm using intra bitplane scrambling
- Chaos and ergodicity are decidable for linear cellular automata over \((\mathbb{Z}/m\mathbb{Z})^n\)
- A new fractional one dimensional chaotic map and its application in high-speed image encryption
- A fingerprint image encryption scheme based on hyperchaotic Rössler map
- Observer-based synchronization of memristive neural networks under DoS attacks and actuator saturation and its application to image encryption
- A chaotic image encryption scheme based on Hénon-Chebyshev modulation map and genetic operations
- Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption
- An image encryption algorithm based on information hiding
- An effective approach for constructing a class of 4D multicluster conservative chaotic systems without external excitation
- 2D non-adjacent coupled map lattice with \(q\) and its applications in image encryption
- Multimedia security application of a ten-term chaotic system without equilibrium
- Adaptive chaotic maps and their application to pseudo-random numbers generation
- Generalized arithmetic coding using discrete chaotic maps
- Improving the pseudo-randomness properties of chaotic maps using deep-zoom
- Analysis of the time series generated by a new high-dimensional discrete chaotic system
- Cryptanalysis of a DNA-based image encryption scheme
- Cryptanalysis of an image encryption scheme based on the hill cipher
- Image encryption algorithm by fractional based chaotic system and framelet transform
- Quantum-chaotic key distribution in optical networks: from secrecy to implementation with logistic map
- Dynamics analysis and cryptographic application of fractional logistic map
- Implementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmetic
- Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer
- Fractal sorting matrix and its application on chaotic image encryption
- Secure image encryption algorithm design using a novel chaos based S-Box
- Impulsive synchronization of coupled delayed neural networks with actuator saturation and its application to image encryption
- Discrete Chaotification of a Modulated Logistic System
- An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem
- Digitally generating true orbits of binary shift chaotic maps and their conjugates
- Comment on ``Image encryption with chaotically coupled chaotic maps
- A three-dimensional bit-level image encryption algorithm with Rubik's cube method
- A novel batch image encryption algorithm using parallel computing
This page was built for publication: SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3579255)