Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
From MaRDI portal
(Redirected from Publication:715909)
Abstract: Recently two encryption schemes were proposed by combining circular bit shift and XOR operations, under the control of a pseudorandom bit sequence (PRBS) generated from a chaotic system. This paper studies the security of these two encryption schemes and reports the following findings: 1) there exist some security defects in both schemes; 2) the underlying chaotic PRBS can be reconstructed as an equivalent key by using only two chosen plaintexts; 3) most elements in the underlying chaotic PRBS can be obtained by a differential known-plaintext attack using only two known plaintexts. Experimental results are given to demonstrate the feasibility of the proposed attack.
Recommendations
- An improved chaotic cryptosystem based on circular bit shift and XOR operations
- Cryptanalysis of Chaotic Ciphers
- Cryptanalysis of a chaotic encryption system
- Cryptanalysis of a chaotic stream cipher and its improved scheme
- Analysis of some recently proposed chaos-based encryption algorithms
- Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps
- Cryptanalysis of an ergodic chaotic cipher
- CRYPTANALYSIS OF A NEW CHAOTIC CRYPTOSYSTEM BASED ON ERGODICITY
- On the cryptanalysis of a bit-level image chaotic encryption algorithm
Cites work
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- A novel block cryptosystem based on iterating a chaotic map
- Chaotic attractors in delayed neural networks
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Cryptography based on delayed chaotic neural networks
- Cryptography with cycling chaos
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- Solving ODEs and DDEs with residual control
- Synchronization of Chaotic Systems and Transmission of Information
- Use of chaotic dynamical systems in cryptography
Cited in
(21)- Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps
- Secure multiparty quantum secret sharing with the collective eavesdropping-check character
- Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem and its improved version
- A DESIGN OF PSEUDO-RANDOM BIT GENERATOR BASED ON SINGLE CHAOTIC SYSTEM
- BREAKING AN IMAGE ENCRYPTION ALGORITHM BASED ON CHAOS
- Cryptanalysis of an image encryption scheme based on the hill cipher
- Breaking a chaotic cryptographic scheme based on composition maps
- A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation
- Lessons learnt from the cryptanalysis of chaos-based ciphers
- Cryptanalysis of the Double-Feedback XOR-Chain Scheme Proposed in Indocrypt 2013
- Quantum conference
- An improved chaotic cryptosystem based on circular bit shift and XOR operations
- Breaking a chaotic image encryption algorithm based on perceptron model
- Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
- An anonymous key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- Deciphering an image cipher based on mixed transformed logistic maps
- An improved secure and efficient password and chaos-based two-party key agreement protocol
- Controlled henon system and its cryptographic applications
- Quantum deniable authentication protocol
- Revisiting quantum authentication scheme based on entanglement swapping
This page was built for publication: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q715909)