期刊文献+

一种混沌映射密码算法的安全性分析

Cryptanalysis on the Cryptography of the Chaotic Maps
下载PDF
导出
摘要 近年来有许多基于迭代混沌映射的密码系统被提出,但它们中很少能抵抗选择明文攻击、选择密文攻击或者已知明文攻击。本文分析了参考文献[14]中存在的一些缺陷并且攻破它。参考文献[14]主要思想在于使用变长扩展密钥(最大128位)构造四个一维混沌映射的初值和迭代次数,获取初值和迭代次数的过程是有限整数问题,存在致命缺陷,不具抗攻击性,本文使用选择密文/明文攻击方法在很短时间内就能恢复变长扩展密钥。 Recently many chaotic cryptosystems based on the iterative equation have been proposed,but many of them can’t resist the chosen ciphertext attack,chosen plaintext attack and known plaintext attack.In this letter,we analyze the existing problems of cryptography using multiple one-dimensional chaotic maps [14] presented by Pareek et al.and break it.This cryptosystem uses an external secret key of variable length(maximum 128-bits)to obtain the initial condition and number of iterations of four one-dimensional chaotic maps,but this way exists weaknesses of deriving the initial condition by using finite integer problem allowing for attack.So,the external secret key of variable length can be recovered with a little time using the chosen ciphertext attack or chosen plaintext attack.
作者 钟黔川
机构地区 西昌学院
出处 《西昌学院学报(自然科学版)》 2011年第4期47-50,共4页 Journal of Xichang University(Natural Science Edition)
基金 国家自然科学基金资助项目(项目编号:60671033)
关键词 混沌加密 混沌映射 分组密码 Chaotic cryptosystem Chaotic map Block cipher
  • 相关文献

参考文献14

  • 1Baptista M S.Cryptography with chaos.Phys.Lett.A, 1998,240: 50-54.
  • 2Wong W K, Lee L P, Wong K W.A modified chaotic cryptographic method.Comput Phys Commun, 2000,138: 234-236.
  • 3Wong K W.A fast chaotic cryptography scheme with dynamic look-up table.Phys.Lett.A, 2002,298: 238-242.
  • 4Wong K W, Ho S W, Yung C K.A chaotic cryptography scheme for generating short ciphertext.Phys.Lett.A, 2003,310: 67-73.
  • 5Pareek N K, Patidar V, Sud K K.Discrete chaotic cryptography using external key.Phys.Lett.A, 2003,309:75-82.
  • 6Xiang T, Liao X F, Tang G P, Chen Y, Wong K W.A novel block cryptosystem based on iterating a chaotic map.Phys.Lett. A,2006,349:109-115.
  • 7Yu W W, Cao J D.Cryptography based on delayed chaotic neural networks.Phys.Lett.A, 2006,356: 333-338.
  • 8G.Alvarez, F.Montoya, M.Romera, G.Pastor.Cryptanalyzing an improved security modulated chaotic encryption scheme using ciphertext absolute value.Chaos, Solitons and Fractals, 2005,23: 1749-1756.
  • 9Yong Chen, Xiaofeng Liao.Cryptanalysis on a modified Baptista-type cryptosystemwith chaotic masking algofithm.Phys Lett.A,2005,342:389-396.
  • 10G.Alvarez,F.Montoya,M.Romera, G.Pastor.Cryptanalysis ofdynamiclook-up table based chaotic cryptosystems.Phys.Lett A,2004,326:211-218.

二级参考文献10

  • 1Xiang T,Liao X F,Tang G P,Chen Y,Wong K W 2006 Phys. Lett. A 349 109.
  • 2Yu W W, Cao J D 2006 Phys. Lett. A 356 333.
  • 3Baptista M S 1998 Phys. Lett. A 240 50.
  • 4WongW K,Lee LP,WongKW2001 Comp. Phys. Commun. 138 234.
  • 5Wong K W 2002 Phys. Lett. A 298 238.
  • 6Wong K W, Ho S W, Yung C K 2003 Phys. Lett. A 310 67.
  • 7Stinson D R 1995 Cryptography: Theory and Practice (Boca Patton: CRC Press).
  • 8Hopfild J J 1984 Proc. Natl. Acad. Sci. USA 81 3088.
  • 9Lu H T 2002 Phys. Lett. A 298 109.
  • 10Kohda T,Tsuneda A 1997 IEEE Trans. Inform. Theory 43 104.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部