861 research outputs found
Error Function Attack of chaos synchronization based encryption schemes
Different chaos synchronization based encryption schemes are reviewed and
compared from the practical point of view. As an efficient cryptanalysis tool
for chaos encryption, a proposal based on the Error Function Attack is
presented systematically and used to evaluate system security. We define a
quantitative measure (Quality Factor) of the effective applicability of a chaos
encryption scheme, which takes into account the security, the encryption speed,
and the robustness against channel noise. A comparison is made of several
encryption schemes and it is found that a scheme based on one-way coupled
chaotic map lattices performs outstandingly well, as judged from Quality
Factor
Some hints for the design of digital chaos-based cryptosystems: lessons learned from cryptanalysis
In this work we comment some conclusions derived from the analysis of recent
proposals on the field of chaos-based cryptography. These observations remark
the main problems detected in some of those schemes under examination.
Therefore, this paper is a list of what to avoid when considering chaos as
source of new strategies to conceal and protect information
Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
Recently, an image scrambling encryption algorithm of pixel bit based on
chaos map was proposed. Considering the algorithm as a typical binary image
scrambling/permutation algorithm exerting on plaintext of size ,
this paper proposes a novel optimal method to break it with some
known/chosen-plaintexts. The spatial complexity and computational complexity of
the attack are only and respectively,
where is the number of known/chosen-plaintexts used. The method can be
easily extended to break any permutation-only encryption scheme exerting on
plaintext of size and with different levels of values. The
corresponding spatial complexity and computational complexity are only
and respectively. In addition, some
specific remarks on the performance of the image scrambling encryption
algorithm are presented.Comment: 11 pages, 6 figure
- …