Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
DOI10.1016/J.PHYSLETA.2007.04.023zbMATH Open1209.94044arXivnlin/0611017OpenAlexW2166809149WikidataQ121161344 ScholiaQ121161344MaRDI QIDQ715909FDOQ715909
Authors: Shujun Li, Gonzalo A. Álvarez, K.-T. Lo, Cheng-Qing Li, Guanrong Chen
Publication date: 19 April 2011
Published in: Physics Letters. A (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/nlin/0611017
Recommendations
- An improved chaotic cryptosystem based on circular bit shift and XOR operations
- Cryptanalysis of Chaotic Ciphers
- Cryptanalysis of a chaotic encryption system
- Cryptanalysis of a chaotic stream cipher and its improved scheme
- Analysis of some recently proposed chaos-based encryption algorithms
- Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps
- Cryptanalysis of an ergodic chaotic cipher
- CRYPTANALYSIS OF A NEW CHAOTIC CRYPTOSYSTEM BASED ON ERGODICITY
- On the cryptanalysis of a bit-level image chaotic encryption algorithm
chaoscryptanalysisdifferential cryptanalysisencryptionchosen-plaintext attackknown-plaintext attackdelayed chaotic neural network
Cites Work
- Solving ODEs and DDEs with residual control
- Title not available (Why is that?)
- Chaotic attractors in delayed neural networks
- A novel block cryptosystem based on iterating a chaotic map
- Title not available (Why is that?)
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Use of chaotic dynamical systems in cryptography
- Cryptography based on delayed chaotic neural networks
- Synchronization of Chaotic Systems and Transmission of Information
- Cryptography with cycling chaos
Cited In (21)
- A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation
- Breaking a chaotic image encryption algorithm based on perceptron model
- Controlled henon system and its cryptographic applications
- Quantum deniable authentication protocol
- BREAKING AN IMAGE ENCRYPTION ALGORITHM BASED ON CHAOS
- Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem and its improved version
- Revisiting quantum authentication scheme based on entanglement swapping
- Deciphering an image cipher based on mixed transformed logistic maps
- Cryptanalysis of the Double-Feedback XOR-Chain Scheme Proposed in Indocrypt 2013
- A DESIGN OF PSEUDO-RANDOM BIT GENERATOR BASED ON SINGLE CHAOTIC SYSTEM
- An improved secure and efficient password and chaos-based two-party key agreement protocol
- An anonymous key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
- Secure multiparty quantum secret sharing with the collective eavesdropping-check character
- Lessons learnt from the cryptanalysis of chaos-based ciphers
- Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps
- An improved chaotic cryptosystem based on circular bit shift and XOR operations
- Breaking a chaotic cryptographic scheme based on composition maps
- Quantum conference
- Cryptanalysis of an image encryption scheme based on the hill cipher
Uses Software
This page was built for publication: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q715909)