Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers
From MaRDI portal
Publication:3090973
DOI10.1007/978-3-642-20542-2_8zbMath1221.94039OpenAlexW1502839034MaRDI QIDQ3090973
Gonzalo Alvarez, David Arroyo, Shujun Li, José María Amigó
Publication date: 7 September 2011
Published in: Studies in Computational Intelligence (Search for Journal in Brave)
Full work available at URL: http://epubs.surrey.ac.uk/532425/1/ChaosCrypto_Bookchapter_2011.pdf
Related Items (7)
Security problems for a pseudorandom sequence generator based on the Chen chaotic system ⋮ Deciphering an image cipher based on 3-cell chaotic map and biological operations ⋮ New pseudo-random number generator based on improved discrete-space chaotic map ⋮ How to perturb Bernoulli shift map ⋮ Breaking a novel image encryption scheme based on improved hyperchaotic sequences ⋮ Cryptanalysis of a Classical Chaos-Based Cryptosystem with Some Quantum Cryptography Features ⋮ Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Approximation of a chaotic orbit as a cryptanalytical method on Baptista's cipher
- Cryptanalysis of a discrete-time synchronous chaotic encryption system
- Cryptanalysis of a computer cryptography scheme based on a filter bank
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
- Theory and practice of chaotic cryptography
- Modified Baptista type chaotic cryptosystem via matrix secret key
- Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Cryptanalysis of a family of self-synchronizing chaotic stream ciphers
- A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis
- A chaos-based approach to the design of cryptographically secure substitutions
- Image encryption based on a new total shuffling algorithm
- Breaking an encryption scheme based on chaotic baker map
- Cryptanalysis of a discrete chaotic cryptosystem using external key
- Decoding chaotic cryptography without access to the superkey.
- An adaptive chaos synchronization scheme applied to secure communication
- Breaking projective chaos synchronization secure communication using filtering and generalized synchronization
- An efficient entire chaos-based scheme for deniable authentication
- Discrete chaotic cryptography using external key
- Cryptanalysis of an ergodic chaotic cipher
- Breaking parameter modulated chaotic secure communication system
- Chaotic encryption using discrete-time synchronous chaos
- A revision of the Lyapunov exponent in \(1\)D quadratic maps
- Cryptography with chaos
- Estimating system parameters of Chua's circuit from synchronizing signal
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Breaking a chaos-based secure communication scheme designed by an improved modulation method
- Security problems with a chaos-based deniable authentication scheme
- Public-key encryption based on Chebyshev polynomials
- Cryptanalysis of a chaotic encryption system
- System identification in communication with chaotic systems
- Synchronization with message embedded for generalized Lorenz chaotic circuits and its error analysis
- A New Approach to Breaking Down Chaotic Secure Communication
- CRYPTANALYSIS OF A NEW CHAOTIC CRYPTOSYSTEM BASED ON ERGODICITY
- A QUALITATIVE ANALYSIS OF DECIPHERING ERRORS IN CHAOS SHIFT KEYING
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- RETURN-MAP CRYPTANALYSIS REVISITED
- Encryption and decryption of images with chaotic map lattices
- Theoretical and experimental studies of parameter estimation based on chaos feedback synchronization
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- CRYPTANALYSIS OF FRIDRICH'S CHAOTIC IMAGE ENCRYPTION
- Communication Theory of Secrecy Systems*
- A Secret Key Cryptosystem by Iterating a Chaotic Map
- Period Three Implies Chaos
- TRANSMISSION OF DIGITAL SIGNALS BY CHAOTIC SYNCHRONIZATION
- Communication by chaotic signals: the inverse system approach
- Recovery of digital signals from chaotic switching
- Cryptography based on chaotic systems
- A SIMPLE WAY TO SYNCHRONIZE CHAOTIC SYSTEMS WITH APPLICATIONS TO SECURE COMMUNICATION SYSTEMS
- The role of synchronization in digital communications using chaos. II. Chaotic modulation and chaotic synchronization
- YET ANOTHER CHAOTIC ATTRACTOR
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Reconstructing the keystream from a chaotic encryption scheme
- A Class of Maximum-Period Nonlinear Congruential Generators Derived From the Rényi Chaotic Map
- Cryptographically secure substitutions based on the approximation of mixing maps
- Discrete Chaos-I: Theory
- Chaotic block ciphers: from theory to practical algorithms
- Deterministic Nonperiodic Flow
- Approximations of Dynamical Systems and Their Applications to Cryptography
- UNKNOWN INPUT OBSERVERS FOR MESSAGE-EMBEDDED CHAOS SYNCHRONIZATION OF DISCRETE-TIME SYSTEMS
- Decoding Digital Information from the Cascaded Heterogeneous Chaotic Systems
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- Synchronization of Chaotic Systems and Transmission of Information
- Coding Scheme Based on Chaos Synchronization from Noninvertible Maps
- Synchronization in chaotic systems
- Estimation of the control parameter from symbolic sequences: Unimodal maps with variable critical point
- Chosen ciphertext attack on chaos communication based on chaotic synchronization
- Robust Chaos
- ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS
- Public-key encryption with chaos
This page was built for publication: Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers