On the security of a chaotic encryption scheme: Problems with computerized chaos in finite computing precision
Li, SJ, Mou, XQ, Cai, YL, Ji, Z and Zhang, JH (2003) On the security of a chaotic encryption scheme: Problems with computerized chaos in finite computing precision Computer Physics Communications, 153 (1). pp. 52-58.
Available under License : See the attached licence file.
Zhou et al. have proposed a chaotic encryption scheme, which is based on a kind of computerized piecewise linear chaotic map (PWLCM) realized in finite computing precision. In this paper, we point out that Zhou's encryption scheme is not secure enough from strict cryptographic viewpoint. The reason lies in the dynamical degradation of the computerized piecewise linear chaotic map employed by Zhou et al. The dynamical degradation of the computerized chaos induces many weak keys to cause large information leaking of the plaintext. In addition, we also discuss three simple countermeasures to enhance the security of Zhou's cryptosystem, but none of them can essentially enhance the security.
|Divisions :||Faculty of Engineering and Physical Sciences > Computing Science|
|Date :||1 June 2003|
|Identification Number :||https://doi.org/10.1016/S0010-4655(02)00875-5|
|Related URLs :|
|Additional Information :||NOTICE: this is the preprint version of a work that was submitted and subsequently accepted for publication in Computer Physics Communications. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in CComputer Physics Communications, 153(1), June 2003, DOI 10.1016/S0010-4655(02)00875-5.|
|Depositing User :||Symplectic Elements|
|Date Deposited :||19 Feb 2013 15:19|
|Last Modified :||23 Sep 2013 19:27|
Actions (login required)
Downloads per month over past year