Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
From MaRDI portal
Publication:715909
DOI10.1016/j.physleta.2007.04.023zbMath1209.94044arXivnlin/0611017OpenAlexW2166809149WikidataQ121161344 ScholiaQ121161344MaRDI QIDQ715909
Gonzalo Alvarez, Shujun Li, Kwok-Tung Lo, Guan-Rong Chen, Cheng-Qing Li
Publication date: 19 April 2011
Published in: Physics Letters. A (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/nlin/0611017
chaoscryptanalysisencryptiondifferential cryptanalysischosen-plaintext attackknown-plaintext attackdelayed chaotic neural network
Related Items (20)
BREAKING AN IMAGE ENCRYPTION ALGORITHM BASED ON CHAOS ⋮ Revisiting quantum authentication scheme based on entanglement swapping ⋮ An improved secure and efficient password and chaos-based two-party key agreement protocol ⋮ Breaking a chaotic image encryption algorithm based on perceptron model ⋮ An improved chaotic cryptosystem based on circular bit shift and XOR operations ⋮ Secure multiparty quantum secret sharing with the collective eavesdropping-check character ⋮ A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation ⋮ Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem and its improved version ⋮ Security improvement on an anonymous key agreement protocol based on chaotic maps ⋮ Quantum deniable authentication protocol ⋮ Cryptanalysis of an image encryption scheme based on the hill cipher ⋮ A DESIGN OF PSEUDO-RANDOM BIT GENERATOR BASED ON SINGLE CHAOTIC SYSTEM ⋮ Quantum conference ⋮ Deciphering an Image Cipher Based on Mixed Transformed Logistic Maps ⋮ Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks ⋮ Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps ⋮ An anonymous key agreement protocol based on chaotic maps ⋮ CONTROLLED HENON SYSTEM AND ITS CRYPTOGRAPHIC APPLICATIONS ⋮ BREAKING A CHAOTIC CRYPTOGRAPHIC SCHEME BASED ON COMPOSITION MAPS ⋮ Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Cryptography with cycling chaos
- Cryptography based on delayed chaotic neural networks
- Chaotic attractors in delayed neural networks
- Solving ODEs and DDEs with residual control
- A novel block cryptosystem based on iterating a chaotic map
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- Synchronization of Chaotic Systems and Transmission of Information
- Use of chaotic dynamical systems in cryptography
This page was built for publication: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations