2003
DOI: 10.1016/s0960-0779(02)00377-6
|View full text |Cite
|
Sign up to set email alerts
|

Decoding chaotic cryptography without access to the superkey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(19 citation statements)
references
References 3 publications
0
19
0
Order By: Relevance
“…In addition to methods based on adaptive synchronization, there are also other ways one can use to estimate the secret parameters (i.e., the key) of chaos-based cryptosystems. For instance, due to the nature of Lorenz and Chua Chaotic Systems, the secret parameters can be determined from the driving signal and its derivatives (mainly differentials of different orders) [32,105,74]. For some specific schemes, it is also possible to derive part of the secret parameters by analyzing the return maps of the master systems [65].…”
Section: Problems With the Encryption Architecturementioning
confidence: 99%
“…In addition to methods based on adaptive synchronization, there are also other ways one can use to estimate the secret parameters (i.e., the key) of chaos-based cryptosystems. For instance, due to the nature of Lorenz and Chua Chaotic Systems, the secret parameters can be determined from the driving signal and its derivatives (mainly differentials of different orders) [32,105,74]. For some specific schemes, it is also possible to derive part of the secret parameters by analyzing the return maps of the master systems [65].…”
Section: Problems With the Encryption Architecturementioning
confidence: 99%
“…In the receiver equation (17), the input is s = x+m(t), and the output is x 1 . A chosen-ciphertext attack is adopted to analyze the parameters in [10].…”
Section: B the Security Against Chosen Ciphertext Attackmentioning
confidence: 99%
“…Now, we use system (4) to construct system (16) and (17), that is, let σ 1 = σ 2 . We prove that the chosen ciphertext attack can not determine the parameter vector.…”
Section: B the Security Against Chosen Ciphertext Attackmentioning
confidence: 99%
“…Attacker can use this method break the chaos-based secure communication system [12,13]. However, it is impossible to reconstruct the hyper chaotic map.…”
Section: Introductionmentioning
confidence: 99%