Chosen ciphertext attack on chaos communication based on chaotic synchronization

被引:44
作者
Hu, GJ [1 ]
Feng, ZJ [1 ]
Meng, RL [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Mech Engn, Shanghai 200030, Peoples R China
来源
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-FUNDAMENTAL THEORY AND APPLICATIONS | 2003年 / 50卷 / 02期
关键词
chaos; chaotic synchronization; chosen-ciphertext attack; Kerckhoff principle; secure communication;
D O I
10.1109/TCSI.2002.808207
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this brief, we have analyzed the secure property of chaos-communication system based on chaotic synchronization using the chosen-ciphertext attack under Kerckhoff principle. We pointed out that secure communication system based on chaotic synchronization was not highly secure. We could resolve the parameters (keys) of secure communication system by chosen-ciphertext attack.
引用
收藏
页码:275 / 279
页数:5
相关论文
共 13 条
[1]   DESIGN OF HYPERCHAOTIC FLOWS [J].
BAIER, G ;
SAHLE, S .
PHYSICAL REVIEW E, 1995, 51 (04) :R2712-R2714
[2]   SYNCHRONIZING CHAOTIC CIRCUITS [J].
CARROLL, TL ;
PECORA, LM .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, 1991, 38 (04) :453-456
[3]   GENERAL-APPROACH FOR CHAOTIC SYNCHRONIZATION WITH APPLICATIONS TO COMMUNICATION [J].
KOCAREV, L ;
PARLITZ, U .
PHYSICAL REVIEW LETTERS, 1995, 74 (25) :5028-5031
[4]   TAMING CHAOS .1. SYNCHRONIZATION [J].
OGORZALEK, MJ .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 1993, 40 (10) :693-699
[5]   Using surrogate data analysis for unmasking chaotic communication systems [J].
Parlitz, U ;
Kocarev, L .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1997, 7 (02) :407-413
[6]   SYNCHRONIZATION IN CHAOTIC SYSTEMS [J].
PECORA, LM ;
CARROLL, TL .
PHYSICAL REVIEW LETTERS, 1990, 64 (08) :821-824
[7]   DRIVING SYSTEMS WITH CHAOTIC SIGNALS [J].
PECORA, LM ;
CARROLL, TL .
PHYSICAL REVIEW A, 1991, 44 (04) :2374-2383
[8]   Synchronizing hyperchaos with a scalar transmitted signal [J].
Peng, JH ;
Ding, EJ ;
Ding, M ;
Yang, W .
PHYSICAL REVIEW LETTERS, 1996, 76 (06) :904-907
[9]  
Schneier B, 1996, APPL CRYPTOGRAPHY
[10]   STEPS TOWARD UNMASKING SECURE COMMUNICATIONS [J].
SHORT, KM .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1994, 4 (04) :959-977