Breaking network security based on synchronized chaos
Álvarez, G and Li, SJ (2004) Breaking network security based on synchronized chaos Computer Communications, 27 (16). pp. 1679-1681.
Available under License : See the attached licence file.
Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possible and that the proposed encryption approach can be used to secure communications over Internet, we prove that these claims are unfounded, breaking the cryptosystem in different ways.
|Divisions :||Faculty of Engineering and Physical Sciences > Computing Science|
|Date :||15 October 2004|
|Identification Number :||https://doi.org/10.1016/j.comcom.2004.05.007|
|Related URLs :|
|Additional Information :||NOTICE: this is the preprint version of a work that was submitted and subsequently accepted for publication in Computer Communications. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computer Communications, 27(16), October 2004, DOI 10.1016/j.comcom.2004.05.007.|
|Depositing User :||Symplectic Elements|
|Date Deposited :||19 Feb 2013 15:13|
|Last Modified :||23 Sep 2013 19:27|
Actions (login required)
Downloads per month over past year