Application of Gray code to the cryptanalysis of chaotic cryptosystems
نویسندگان
چکیده
Gray codes have found many applications in engineering and mathematics. In this work we explain how to apply Gray codes to the determination of the control parameter and initial point of a chaotic orbit generated by the Mandelbrot map when the kneading sequence is known. Possible applications to the cryptanalysis of a certain type of cryptosystems based on Baptista’s algorithm are also discussed.
منابع مشابه
Cryptanalysis of a key agreement protocol based on chaotic Hash
With the rapid development of theory and application of chaos, more and more researchers are focusing on chaos based cryptosystems. Recently, Guo et al.’s [X. Guo, J. Zhang, Secure group key agreement protocol based on chaotic Hash, Information Sciences 180 (2010) 4069–4074] proposed a secure key agreement protocol based on chaotic Hash. They claimed that their scheme could withstand various at...
متن کاملCryptanalysis of Observer Based Discrete-Time Chaotic Encryption Schemes
This paper investigates the weaknesses of cryptosystems that use observer based synchronized chaotic systems. It is shown that known plaintext and chosen plaintext attacks can successfully be launched against such cryptosystems to recover the system parameters and subsequently eavesdrop on the message transmission. The methods employed rely only on the basic mathematical relations that exist be...
متن کاملReview on Chaotic Sequences Based Cryptography and Cryptanalysis
This literature review glances at the research that has been published in the area of chaos cryptography along with cryptanalysis of chaotic cryptosystem. It compares and contrasts the work done in different research papers towards the designing and cryptanalysis of chaotic cryptosystem for the validity of cryptosystems and improvement in encryption techniques. This review analyzes the role tha...
متن کاملCryptanalysis of Dynamic Look-up Table Based Chaotic Cryptosystems
In recent years many chaotic cryptosystems based on Baptista’s seminal work have been proposed. We analyze the security of two of the newest and most interesting ones, which use a dynamically updated look-up table and also work as stream ciphers. We provide different attack techniques to recover the keystream used by the algorithms. The knowledge of this keystream provides the attacker with the...
متن کاملA new method for accelerating impossible differential cryptanalysis and its application on LBlock
Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007