Cryptanalysis of the public key encryption based on multiple chaotic systems

被引:256
作者
Zhang, Linhua [1 ]
机构
[1] Chongqing Normal Univ, Coll Mat & Comp, Chongqing 400047, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1016/j.chaos.2006.09.047
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Recently, Ranjan proposed a novel public key encryption technique based on multiple chaotic systems [Phys Lett 2005;95]. Unfortunately, Wang soon gave a successful attack on its special case based on Parseval's theorem [Wang K, Pei W, Zhou L, et al. Security of public key encryption technique based on multiple chaotic system. Phys Lett A, in press]. In this letter, we give an improved example which can avoid the attack and point out that Wang cannot find the essential drawback of the technique. However, further experimental result shows Ruanjan's encryption technique is inefficient, and detailed theoretic analysis shows that the complexity to break the cryptosystem is overestimated. (c) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:669 / 674
页数:6
相关论文
共 16 条
[1]   Cryptanalysis of dynamic look-up table based chaotic cryptosystems [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
PHYSICS LETTERS A, 2004, 326 (3-4) :211-218
[2]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54
[3]   Security of public-key cryptosystems based on Chebyshev polynomials [J].
Bergamo, P ;
D'Arco, P ;
De Santis, A ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) :1382-1393
[4]   Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm [J].
Chen, Y ;
Liao, XF .
PHYSICS LETTERS A, 2005, 342 (5-6) :389-396
[5]   Chaotic secure content-based hidden transmission of biometric templates [J].
Khan, Muhammad Khurram ;
Zhang, Jiashu ;
Tian, Lei .
CHAOS SOLITONS & FRACTALS, 2007, 32 (05) :1749-1759
[6]   Public-key encryption with chaos [J].
Kocarev, L ;
Sterjev, M ;
Fekete, A ;
Vattay, G .
CHAOS, 2004, 14 (04) :1078-1082
[7]  
KOCAREV L, 2003, P 1 INT CIRC SYST S, P25
[8]   Security analysis of chaotic communication systems based on Volterra-Wiener-Korenberg model [J].
Lei, M ;
Meng, G ;
Feng, ZJ .
CHAOS SOLITONS & FRACTALS, 2006, 28 (01) :264-270
[9]  
Li S. J., 2001, LECT NOTES COMPUTER, V2247, P316
[10]   Baptista-type chaotic cryptosystems: problems and countermeasures [J].
Li, SJ ;
Chen, GR ;
Wong, KW ;
Mou, XQ ;
Cai, YL .
PHYSICS LETTERS A, 2004, 332 (5-6) :368-375