Return-map cryptanalysis revisited
Li, SJ, Chen, G and Álvarez, G (2006) Return-map cryptanalysis revisited International Journal of Bifurcation and Chaos, 16 (5). 1557 - 1568. ISSN 0218-1274
Available under License : See the attached licence file.
Official URL: http://dx.doi.org/10.1142/S0218127406015507
As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes. Recently, a simple defensive mechanism was presented to enhance the security of chaotic parameter modulation schemes against return-map attacks. Two techniques are combined in the proposed defensive mechanism: multistep parameter modulation and alternative driving of two different transmitter variables. This paper re-studies the security of this proposed defensive mechanism against return-map attacks, and points out that the security was much over-estimated in the original publication for both ciphertext-only attack and known/chosen-plaintext attacks. It is found that a deterministic relationship exists between the shape of the return map and the modulated parameter, and that such a relationship can be used to dramatically enhance return-map attacks thereby making them quite easy to break the defensive mechanism.
|Additional Information:||This is an electronic version of an article published as International Journal of Bifurcation and Chaos, Volume 16, Issue 5, 2006, pp 1557-1568 DOI: 10.1142/S0218127406015507 © World Scientific Publishing Company. http://www.worldscinet.com/ijbc/ijbc.shtml|
|Divisions:||Faculty of Engineering and Physical Sciences > Computing Science|
|Deposited By:||Symplectic Elements|
|Deposited On:||12 Jun 2012 10:41|
|Last Modified:||28 Apr 2013 14:33|
Repository Staff Only: item control page