2017
DOI: 10.1142/s0218127417500043
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a Classical Chaos-Based Cryptosystem with Some Quantum Cryptography Features

Abstract: The application of synchronization theory to build up new cryptosystems has been a hot topic during the last two decades. In this paper we analyze a recent proposal in this field. We pinpoint the main limitations of the software implementation of chaos-based systems designed on the grounds of synchronization theory. In addition, we show that the cryptosystem under evaluation possesses serious security problems that imply a clear reduction of the key space.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…For example, the average variance of the cipher image of Lena (256 × 256) was 229, but it was 81,231 for the plain Lena image. The given comparison also shows that for the majority of test images, the histogram variances of images encrypted by the proposed algorithm were lower than those in [41,43]. On the basis of this comparison, we can say that our proposed algorithm has the ability to make the encryption algorithm more secure.…”
Section: Histogram Analysismentioning
confidence: 72%
See 1 more Smart Citation
“…For example, the average variance of the cipher image of Lena (256 × 256) was 229, but it was 81,231 for the plain Lena image. The given comparison also shows that for the majority of test images, the histogram variances of images encrypted by the proposed algorithm were lower than those in [41,43]. On the basis of this comparison, we can say that our proposed algorithm has the ability to make the encryption algorithm more secure.…”
Section: Histogram Analysismentioning
confidence: 72%
“…Secondly, the key must be tremendously sensitive to bit changes. If the key is not subtle enough, then a similar key may also be able to decrypt the cipher image [42,43].…”
Section: Key Space and Key Sensitivitymentioning
confidence: 99%
“…Tremendously sensitive toward any change in the secret key is one of the key requirements of an image encryption algorithm. If the encryption algorithm will not have high sensitivity toward a slight change in the secret key or if it will not be subtle enough, then a similar key may also be able to decrypt the cipher image 57,58 . Thus, to test the key sensitivity, we have inspected the number of bit change rate ( X NBCR ) 59 .…”
Section: Results and Security Analysismentioning
confidence: 99%
“…If the encryption algorithm will not have high sensitivity toward a slight change in the secret key or if it will not be subtle enough, then a similar key may also be able to decrypt the cipher image. 57,58 Thus, to test the key sensitivity, we have inspected the number of bit change rate (X NBCR ). 59 The X NBCRs of the two images P img1 and P img2 can be defined as,…”
Section: Key Sensitivitymentioning
confidence: 99%
“…The main advantage of this method is what it allows to produce a more accurate research of the behaviour of solutions of dynamical systems in very large time segments. Let us note that the FGBFI-method can be used in the encryption system, constructed by means of continuous-time chaotic systems [47], and also for verification of approximate periodic solutions of continuous nonlinear dynamical systems [48,49].…”
Section: Introductionmentioning
confidence: 99%