期刊文献+

时空混沌自同步流密码系统的选择密文攻击 被引量:1

Chosen-ciphertext Attack for Chaotic Self-synchronizing Stream Cryptosystem
下载PDF
导出
摘要 密码系统是否保密在于它能否抵御所有已知的攻击方法,如果利用所有的攻击方法获取系统密钥所花的代价都不比穷尽搜索攻击方法所花的代价低,而实际的计算资源和可用来计算的时间又不可能承受穷索密钥的任务,那么这个密码系统是实际保密的.我们用分类中最强的选择密文攻击对时空混沌自同步流密码系统进行了分析,结果表明,即使在最弱密钥条件下,选择系统抵抗力最弱的常数密文驱动攻击所花的计算代价仍然远远高于穷尽搜索攻击的代价,因此,本时空混沌密码系统是一个具有实际保密性的密码系统. The security of the cryptosystem is based on against all known attacks.A cryptosystem is called the practical security if the cost of obtaining secret keys used by any other attacks is larger than that of obtaining secret keys used by the searching attack(brute force attack),on the other hand,the practical calculative sources and calculative time can not bear this searching attack.It is found that the cost for our cryptosystem analyzed by the chosen-ciphertext attack with selected weakest secret keys and selected weakest constant ciphertext is still larger than that by the searching attack.Hence,the high practical security of chaotic self-synchronizing stream cryptosystem is demonstrated.
出处 《徐州师范大学学报(自然科学版)》 CAS 2006年第4期56-59,共4页 Journal of Xuzhou Normal University(Natural Science Edition)
基金 江苏省高校自然科学基金资助项目(06KJB140110) 徐州师范大学科研启动基金资助项目(KY200428)
关键词 时空混沌 自同步流密码 保密性 选择密文攻击 spatiotemporal chaos self-synchronizing stream cryptosystem security chosen-ciphertext attack
  • 相关文献

参考文献11

  • 1[1]Short K M.Steps toward unmasking secure communications[J].Int J Bifurcation & Chaos,1994,4(4):959.
  • 2[2]Short K M.Unmasking a modulated chaotic communications scheme[J].Int J Bifurcation & Chaos,1996,6(2):367.
  • 3[3]Perez G,Cerdeira H.Extracting message masked by chaos[J].Phys Rev Lett,1995,74(11):1970.
  • 4[4]Short K M,Parker A T.Unmasking a hyperchaotic communication scheme[J].Phys Rev(E),1998,58:1159.
  • 5[5]Parker A T,Short K M.Reconstructing the keystream from a chaotic encryption scheme[J].IEEE Trans Circuits Syst(I),2001,48(5):624.
  • 6[6]Zhou Ch S,Lai C H.Extracting messages masked by chaotic signals of time-delay systems[J].Phys Rev(E),1999,60:320.
  • 7[7]Alvarez G,Montoya F,Romera M.Cryptanalysis of a chaotic encryption system[J].Phys Lett(A),2000,276:191.
  • 8[8]Ponomarenko V I,Prokhorov D.Extracting information masked by the chaotic signal of a time-delay system[J].Phys Rev(E),2002,66:026215.
  • 9[9]Wu C W,Chua L O.A simple way to synchronize chaotic systems with applications to secure communication systems[J].Int J Bifurcation & Chaos,1993,3(6):1619.
  • 10[10]Hu G J,Feng Zh,Meng R L.Chosen ciphertext attack on chaos communication based on chaotic synchronization[J].IEEE Trans Circuits Syst(I),2003,50(2):275.

同被引文献22

  • 1Lorenz E N.Deterministic nonperiodic flow[J].J Atoms Sci,1963,20:130.
  • 2Ott E,Grebogi C,Yorke J A.Controlling chaos[J].Phys Rev Lett,1990,64(11):1196.
  • 3Pecora L M,Carroll T L.Synchronization in chaotic systems[J].Phys Rev Lett,1990,64(8):821.
  • 4Kocarev L,Halle K S,Eckert K,et al.Experimental demonstration of secure communications via chaotic synchronization[J].Int J Bifurcation Chaos,1992,2(3):709.
  • 5Cuomo L M,Oppenheim A V.Circuit implementation of synchronized chaos with applications to communications[J].Phys Rev Lett,1993,71(1):65.
  • 6Kocarev L,Parlitz U.General approach for chaotic synchronization with applicatons to communication[J].Phys Rev Lett,1995,74(25):5028.
  • 7Baptista M S.Cryptography with chaos[J].Phys Lett A,1998,240:50.
  • 8Xiao Jinhua,Hu Gang.Synchronization of spatiotemporal chaos and its application to multichannel spread spectrum communization[J].Phys Rev Lett,1996,77(20):4162.
  • 9Hu Gang,Xiao Jinhua,et al.Synchronization of spatiotemporal chaos and its applications[J].Phys Rev E,1997,56(3):2738.
  • 10Sundar S,Minai A A.Synchronization of randomly multiplexed chaotic systems with application to communication[J].Phys Rev Lett,2000,85(25):5456.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部