2012
DOI: 10.1007/978-3-642-30111-7_17
|View full text |Cite
|
Sign up to set email alerts
|

A Chaotic Encryption Algorithm: Robustness against Brute-Force Attack

Abstract: Recent growth in the development of e-commerce and cloud Computing, SSL protocol is more and more widely deployed security protocol used in all kinds of network services. SSL protocol by providing end to end secure authentication, message encryption, data integrity check and other security mechanisms protects the security of the communication process over a computer network. In recent years, due to the development of cloud computing, the reliable connection security between the client and the cloud is also an … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…For an encryption algorithm, key sensitivity is one of the important evaluation criteria, that is, a small change in the key can cause sufficient changes in the ciphertext. From a statistical point of view, the rate of change of the ciphertext must close to 50% [11]. The Diffractive Encryption proposed in this paper, the intuitive embodiment of the change of the ciphertext, is the change of the result of each operation.…”
Section: Key Sensitivity Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…For an encryption algorithm, key sensitivity is one of the important evaluation criteria, that is, a small change in the key can cause sufficient changes in the ciphertext. From a statistical point of view, the rate of change of the ciphertext must close to 50% [11]. The Diffractive Encryption proposed in this paper, the intuitive embodiment of the change of the ciphertext, is the change of the result of each operation.…”
Section: Key Sensitivity Analysismentioning
confidence: 99%
“…Except for the first time, the average bit-change rate of ciphertext in last 8 times is calculated. The change rate of initial values and parameters of chaotic map is 10 −15 , which can fully deal with Brute-Force Attack [11]. The bit-change rate of each file is shown in Table 2.…”
Section: Key Sensitivity Analysismentioning
confidence: 99%
“…It is a well-known fact that a large keyspace is essential for an encryption algorithm to be resistant against a brute force attack [43]. The proposed algorithm uses the key at four different stages.…”
Section: Keyspace Analysismentioning
confidence: 99%
“…The length of the security key controls the size of the key space and which is one of the most key characteristics to estimate the strength of the cryptosystem against brute force attacks [63]. To prevent this attack, the size of key space must be at least 2 100 [64].…”
Section: Algorithm Simulation and Performance Analysis 431 Key Space ...mentioning
confidence: 99%