2004
DOI: 10.1063/1.1633492
|View full text |Cite
|
Sign up to set email alerts
|

Error function attack of chaos synchronization based encryption schemes

Abstract: Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the Error Function Attack is presented systematically and used to evaluate system security. We define a quantitative measure (Quality Factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(42 citation statements)
references
References 52 publications
0
42
0
Order By: Relevance
“…Compared with traditional cryptosystems [9], the ones based on chaos are easier to be realized, which makes it more suitable for large-scale data encryption such as images, videos or audio data. However, there is still not a model for security analysis that is suitable for most chaos-based cryptosystems, which makes that chaotic cryptosystems are seldom accompanied by detailed security analysis [10][11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…Compared with traditional cryptosystems [9], the ones based on chaos are easier to be realized, which makes it more suitable for large-scale data encryption such as images, videos or audio data. However, there is still not a model for security analysis that is suitable for most chaos-based cryptosystems, which makes that chaotic cryptosystems are seldom accompanied by detailed security analysis [10][11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…The low sensitivity is a necessary requirement for real implementations of any analog chaos-based cryptosystem because it is impossible to ensure exact matching of the master and slave systems. Unavoidable noise and manufactural component deviation involved in chaotic circuits are the two main factors causing this security problem [107,116].…”
Section: Master Systemmentioning
confidence: 99%
“…With the requirement of public-structure and chosen-cipher, EFA can be used for evaluating the system's key sensitivity [12]. …”
Section: Security Analysis and Numerical Simulationmentioning
confidence: 99%
“…A large number of chaos-based secure communication schemes have been proposed in last decade [2][3][4][5][6][7][8]. However, most of them are fundamentally flowed by a lack of security, and various attacks such as nonlinear forecasting, return map, adaptive parameter estimation, error function attack (EFA), and inverse computation based chosen cipher attack, can succeed in extracting the secret keys or recovering the messages encoded by the chaotic waves directly [9][10][11][12][13]. Recently, a class of spatiotemporally chaotic systems with high security and efficiency by applying some algebraic operations into the one-way coupled map lattice (OCML) system has been provided [5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%