Security problems with a chaos-based deniable authentication scheme

被引:42
作者
Alvarez, G [1 ]
机构
[1] CSIC, Inst Fis Aplicada, E-28006 Madrid, Spain
关键词
D O I
10.1016/j.chaos.2004.12.023
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Recently, a new scheme was proposed for deniable authentication. Its main originality lied on applying a chaos-based encryption-hash parallel algorithm and the semi-group property of the Chebyshev chaotic map. Although original and practicable, its insecurity and inefficiency are shown in this paper, thus rendering it inadequate for adoption in e-commerce. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:7 / 11
页数:5
相关论文
共 20 条
[1]   Cryptanalysis of dynamic look-up table based chaotic cryptosystems [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
PHYSICS LETTERS A, 2004, 326 (3-4) :211-218
[2]   Cryptanalysis of an ergodic chaotic cipher [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
PHYSICS LETTERS A, 2003, 311 (2-3) :172-179
[3]  
ALVAREZ G, 1999, 33 ANN 1999 INT CARN, P332
[4]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54
[5]  
BERGAMO P, UNPUB IEEE T CIRCUIT
[6]   Chaos and cryptography [J].
Dachselt, F ;
Schwarz, W .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2001, 48 (12) :1498-1509
[7]  
Dai W., SPEED COMP POPULAR C
[8]   Cryptosystem using chaotic keys [J].
Huang, FJ ;
Guan, ZH .
CHAOS SOLITONS & FRACTALS, 2005, 23 (03) :851-855
[9]   Analysis of some recently proposed chaos-based encryption algorithms [J].
Jakimoski, G ;
Kocarev, L .
PHYSICS LETTERS A, 2001, 291 (06) :381-384
[10]  
Katz J, 2003, LECT NOTES COMPUT SC, V2656, P211