2009
DOI: 10.3182/20090622-3-uk-3004.00034
|View full text |Cite
|
Sign up to set email alerts
|

Some Hints for the Design of Digital Chaos-Based Cryptosystems: Lessons Learned from Cryptanalysis

Abstract: In this work we comment some conclusions derived from the analysis of recent proposals in the field of chaos-based cryptography. These observations remark a number of major problems detected in some of those schemes under examination. Therefore, this paper is a list of what to avoid and to pay special attention to when considering chaos as source of new strategies to conceal and protect information.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0
1

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 30 publications
0
2
0
1
Order By: Relevance
“…According to our experience in the field of the cryptanalysis of chaos-based cryptosystems, the most critical problems in chaotic cryptography arise from three elements: the selection of a chaotic system, the choice of an encryption architecture, and the implementation of the encryption. Next those problems are listed and discussed, according to our previous works in [67,24,21].…”
Section: Main Problems In Chaos-based Cryptographymentioning
confidence: 99%
“…According to our experience in the field of the cryptanalysis of chaos-based cryptosystems, the most critical problems in chaotic cryptography arise from three elements: the selection of a chaotic system, the choice of an encryption architecture, and the implementation of the encryption. Next those problems are listed and discussed, according to our previous works in [67,24,21].…”
Section: Main Problems In Chaos-based Cryptographymentioning
confidence: 99%
“…From the above discussion, we see clearly that cryptanalysis works are so important because they help revealing vulnerabilities in encryption schemes and facilitate the development of cryptography in general [24]. They can also prevent unsafe encryption algorithms from spreading and being applied to actual communications with real sensitive data.…”
Section: Introductionmentioning
confidence: 99%
“…Se han desarrollado otras aplicaciones de codificación para demostrar de forma experimental el proceso de sincronización de varios circuitos receptores, sin necesidad de acoplamiento alguno entre ellos (Núñez, 2012). En esta investigación se presenta un algoritmo de cifrado que utiliza las propiedades de los sistemas caóticos para codificar información, se toman en cuenta las recomendaciones de otras investigaciones de utilizar varias órbitas caóticas mezcladas o truncadas con la finalidad de que sea más difícil para un atacante detectarlas (Ranjan y Saumitr, 2006;Arroyo et al, 2008). A diferencia del algoritmo realizado por Pareek et al (2005) el sistema que se propone no se basa en el cifrado utilizando solo las propiedades de confusión y difusión que proporcionan los sistemas caóticos.…”
Section: Introductionunclassified