Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations

From MaRDI portal
Publication:715909

DOI10.1016/J.PHYSLETA.2007.04.023zbMATH Open1209.94044arXivnlin/0611017OpenAlexW2166809149WikidataQ121161344 ScholiaQ121161344MaRDI QIDQ715909FDOQ715909


Authors: Shujun Li, Gonzalo A. Álvarez, K.-T. Lo, Cheng-Qing Li, Guanrong Chen Edit this on Wikidata


Publication date: 19 April 2011

Published in: Physics Letters. A (Search for Journal in Brave)

Abstract: Recently two encryption schemes were proposed by combining circular bit shift and XOR operations, under the control of a pseudorandom bit sequence (PRBS) generated from a chaotic system. This paper studies the security of these two encryption schemes and reports the following findings: 1) there exist some security defects in both schemes; 2) the underlying chaotic PRBS can be reconstructed as an equivalent key by using only two chosen plaintexts; 3) most elements in the underlying chaotic PRBS can be obtained by a differential known-plaintext attack using only two known plaintexts. Experimental results are given to demonstrate the feasibility of the proposed attack.


Full work available at URL: https://arxiv.org/abs/nlin/0611017




Recommendations




Cites Work


Cited In (21)

Uses Software





This page was built for publication: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q715909)