On the security of the Yi-Tan-Siew chaotic cipher
Li, SJ, Chen, GR and Mou, XQ (2004) On the security of the Yi-Tan-Siew chaotic cipher IEEE Transactions on Circuits and Systems. Part 2: Express Briefs, 51 (12). pp. 665-669.
IEEETCASII2004.pdf - Accepted version Manuscript
Available under License : See the attached licence file.
This paper presents a comprehensive analysis on the security of the Yi-Tan-Siew chaotic cipher. A differential chosen-plaintext attack and a differential chosen-ciphertext attack are suggested to break the sub-key K, under the assumption that the time stamp can be altered by the attacker, which is reasonable in such attacks. Also, some security problems about the sub-keys α and β are clarified, from both theoretical and experimental points of view. Further analysis shows that the security of this cipher is independent of the use of the chaotic tent map, once the sub-key K is removed via the proposed suggested differential chosen-plaintext attack.
|Divisions :||Faculty of Engineering and Physical Sciences > Computing Science|
|Identification Number :||https://doi.org/10.1109/TCSII.2004.838657|
|Related URLs :|
|Additional Information :||
Copyright 2004 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
|Depositing User :||Symplectic Elements|
|Date Deposited :||11 May 2012 12:56|
|Last Modified :||23 Sep 2013 19:27|
Actions (login required)
Downloads per month over past year