577,365 research outputs found
Breaking a secure communication scheme based on the phase synchronization of chaotic systems
A security analysis of a recently proposed secure communication scheme based
on the phase synchronization of chaotic systems is presented. It is shown that
the system parameters directly determine the ciphertext waveform, hence it can
be readily broken by parameter estimation of the ciphertext signal.Comment: 4 pages, 6 figure
Security analysis of communication system based on the synchronization of different order chaotic systems
This work analyzes the security weakness of a recently proposed communication
method based on chaotic modulation and masking using synchronization of two
chaotic systems with different orders. It is shown that its application to
secure communication is unsafe, because it can be broken in two different ways,
by high-pass filtering and by reduced order system synchronization, without
knowing neither the system parameter values nor the system key.Comment: 12 pages, 6 figures, LaTeX forma
Cryptanalysis of a chaotic block cipher with external key and its improved version
Recently, Pareek et al. proposed a symmetric key block cipher using multiple
one-dimensional chaotic maps. This paper reports some new findings on the
security problems of this kind of chaotic cipher: 1) a number of weak keys
exists; 2) some important intermediate data of the cipher are not sufficiently
random; 3) the whole secret key can be broken by a known-plaintext attack with
only 120 consecutive known plain-bytes in one known plaintext. In addition, it
is pointed out that an improved version of the chaotic cipher proposed by Wei
et al. still suffers from all the same security defects.Comment: 14 pages, 2 figures, 1 table, formatted with elsart.cl
Breaking an image encryption algorithm based on chaos
Recently, a chaos-based image encryption algorithm called MCKBA (Modified
Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of
MCKBA and finds that it can be broken with a differential attack, which
requires only four chosen plain-images. Performance of the attack is verified
by experimental results. In addition, some defects of MCKBA, including
insensitivity with respect to changes of plain-image/secret key, are reported.Comment: 10 pages, 4 figure
- …