2 research outputs found
Return-Map Cryptanalysis Revisited
As a powerful cryptanalysis tool, the method of return-map attacks can be
used to extract secret messages masked by chaos in secure communication
schemes. Recently, a simple defensive mechanism was presented to enhance the
security of chaotic parameter modulation schemes against return-map attacks.
Two techniques are combined in the proposed defensive mechanism: multistep
parameter modulation and alternative driving of two different transmitter
variables. This paper re-studies the security of this proposed defensive
mechanism against return-map attacks, and points out that the security was much
over-estimated in the original publication for both ciphertext-only attack and
known/chosen-plaintext attacks. It is found that a deterministic relationship
exists between the shape of the return map and the modulated parameter, and
that such a relationship can be used to dramatically enhance return-map attacks
thereby making them quite easy to break the defensive mechanism.Comment: 11 pages, 7 figure
Fuzzy Model-Based Approach to Chaotic Encryption using Synchronization
[[abstract]]This paper proposes a fuzzy model-based chaotic encryption approach using synchronization. The cryptosystem uses T–S fuzzy models to exactly represent discrete-time chaotic systems into separate linear systems. Then the synchronization problem is solved using linear matrix inequalities. The advantages of this approach are: the general and systematic T–S fuzzy model design methodology suitable for well-known Luré type discrete-time chaotic systems; flexibility in selection of chaotic signals for cryptosystem secure key generator; and multiuser capabilities. Especially taking a chaotic superincreasing sequence as an encryption key enhances the chaotic communication structure to a higher-level of security compared to traditional masking methods. In addition, numerical simulations and DSP-based experiments are carried out to verify the validity of theoretical results.[[notice]]補正完