2009
DOI: 10.1016/j.chaos.2008.01.020
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a computer cryptography scheme based on a filter bank

Abstract: This paper analyzes the security of a recently-proposed signal encryption scheme based on a filter bank. A very critical weakness of this new signal encryption procedure is exploited in order to successfully recover the associated secret key.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…This problem is specially relevant when the design of the cryptosystem is based on a dynamical system with chaotic behavior only for a set of disjoint parts of the whole space of the control parameters. This is the case of the logistic map and the Hénon map, which have been used in [93,73,106] and in [34] respectively without a thorough analysis of their dynamics, as we have pinpointed in [29,27,25,26]. As a conclusion, it is highly advisable to use dynamical systems with chaotic behavior for all the values of the control parameter(s).…”
Section: Master Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…This problem is specially relevant when the design of the cryptosystem is based on a dynamical system with chaotic behavior only for a set of disjoint parts of the whole space of the control parameters. This is the case of the logistic map and the Hénon map, which have been used in [93,73,106] and in [34] respectively without a thorough analysis of their dynamics, as we have pinpointed in [29,27,25,26]. As a conclusion, it is highly advisable to use dynamical systems with chaotic behavior for all the values of the control parameter(s).…”
Section: Master Systemmentioning
confidence: 99%
“…This is the case of the cryptosystem proposed in [73], and which we have cryptanalyzed in [27]. Furthermore, if the invariant set of the chaotic map has a size dependent on the control parameters, even sampled versions of the orbits may allow the estimation of the control parameters through a ciphertext-only attack [10].…”
Section: Problems With the Encryption Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…(1) and, as a result, the ciphertext can not be the orbits of the map since it may allow the estimation of λ from N + 1 or a bit more consecutive units of ciphertext (see (Arroyo et al, 2008c)). If the invariant set of the chaotic map has a size dependent on the control parameter(s), even sampled versions of the orbits may allow the estimation of the control parameter(s).…”
Section: Problems With the Encryption Architecturementioning
confidence: 99%
“…1 the bifurcation diagram for the logistic map is shown identifying those inadequate values of µ. When considering a chaotic cryptosystem, the possibility of selecting those values of µ associated to a non-chaotic behavior implies a degradation of the performance of the cryptosystem and can be used by a cryptanalyst [4,5].…”
Section: Bifurcation Diagrammentioning
confidence: 99%