Steps towards Cryptanalysis of Chaotic Active/Passive Decomposition Encryption Schemes Using Average Dynamics Estimation

نویسندگان

  • Roy Tenny
  • Lev S. Tsimring
چکیده

We analyze the security of encryption schemes based on chaos synchronization and active/passive decomposition. The security is quantified by the number of transmitted samples that has to be acquired in order to reconstruct the transmitted message with an accuracy that may compromise the transmitted information. The dynamics is estimated as the average of dynamics of the observed data within a small neighborhood of the time delay embedding phase space. We examine the factors that affect the choice of embedding dimension and neighborhood size by the unauthorized receiver. We show that the security can be enhanced by mixing a large randomly modulated message component with a smaller chaotic component while keeping the message modulation fine grained. This result is in contrast to the common approach to ensure security by adding a small message component to a larger chaotic component. Further, we show that even when a low dimensional chaotic map is used, then the unauthorized receiver is required to use a reconstruction embedding dimension that can be made large by using chaotic dynamics with large conditional negative Lyapunov exponent. This result allows one to avoid the common restriction to use only high dimensional chaotic dynamics to maintain security. We also suggest guidelines for the design of efficient active passive/passive decomposition schemes in order to maintain low transmission power, fast synchronization, and yet preserve security. We demonstrate our analysis using a relatively simple encryption scheme based on a one-dimensional chaotic tent map.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations

Recently two encryption schemes were proposed by combining circular bit shift and XOR operations, under the control of a pseudorandom bit sequence (PRBS) generated from a chaotic system. This paper studies the security of these two encryption schemes and reports the following findings: 1) there exist some security defects in both schemes; 2) the underlying chaotic PRBS can be reconstructed as a...

متن کامل

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

Review on Chaotic Sequences Based Cryptography and Cryptanalysis

This literature review glances at the research that has been published in the area of chaos cryptography along with cryptanalysis of chaotic cryptosystem. It compares and contrasts the work done in different research papers towards the designing and cryptanalysis of chaotic cryptosystem for the validity of cryptosystems and improvement in encryption techniques. This review analyzes the role tha...

متن کامل

Cryptanalyzing an image encryption scheme based on logistic map

Chaotic behavior arising from very simple non-linear dynamical equation of logistic map makes it was used often in designing chaotic image encryption schemes. However, some properties of chaotic maps can also facilitate cryptanalysis especially when they are implemented in digital domain. Utilizing stable distribution of the chaotic states generated by iterating the logistic map, this paper pre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Bifurcation and Chaos

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2004