University of Surrey

Test tubes in the lab Research in the ATI Dance Research

On the security of the Yi-Tan-Siew chaotic cipher

Li, SJ, Chen, GR and Mou, XQ (2004) On the security of the Yi-Tan-Siew chaotic cipher IEEE Transactions on Circuits and Systems. Part 2: Express Briefs, 51 (12). pp. 665-669.

IEEETCASII2004.pdf - Accepted version Manuscript
Available under License : See the attached licence file.

Download (295kB)
Text (licence)

Download (33kB)


This paper presents a comprehensive analysis on the security of the Yi-Tan-Siew chaotic cipher. A differential chosen-plaintext attack and a differential chosen-ciphertext attack are suggested to break the sub-key K, under the assumption that the time stamp can be altered by the attacker, which is reasonable in such attacks. Also, some security problems about the sub-keys α and β are clarified, from both theoretical and experimental points of view. Further analysis shows that the security of this cipher is independent of the use of the chaotic tent map, once the sub-key K is removed via the proposed suggested differential chosen-plaintext attack.

Item Type: Article
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
Li, SJ
Chen, GR
Mou, XQ
Date : 2004
DOI : 10.1109/TCSII.2004.838657
Related URLs :
Additional Information :

Copyright 2004 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Depositing User : Symplectic Elements
Date Deposited : 11 May 2012 12:56
Last Modified : 31 Oct 2017 14:35

Actions (login required)

View Item View Item


Downloads per month over past year

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800