884 research outputs found
Breaking a chaos-based secure communication scheme designed by an improved modulation method
Recently Bu and Wang [Chaos, Solitons & Fractals 19 (2004) 919] proposed a
simple modulation method aiming to improve the security of chaos-based secure
communications against return-map-based attacks. Soon this modulation method
was independently cryptanalyzed by Chee et al. [Chaos, Solitons & Fractals 21
(2004) 1129], Wu et al. [Chaos, Solitons & Fractals 22 (2004) 367], and
\'{A}lvarez et al. [Chaos, Solitons & Fractals, accepted (2004),
arXiv:nlin.CD/0406065] via different attacks. As an enhancement to the Bu-Wang
method, an improving scheme was suggested by Wu et al. by removing the
relationship between the modulating function and the zero-points. The present
paper points out that the improved scheme proposed by Wu et al. is still
insecure against a new attack. Compared with the existing attacks, the proposed
attack is more powerful and can also break the original Bu-Wang scheme.
Furthermore, it is pointed out that the security of the modulation-based
schemes is not so satisfactory from a pure cryptographical point of view. The
synchronization performance of this class of modulation-based schemes is also
discussed.Comment: elsart.cls, 18 pages, 9 figure
On the Security of the Yi-Tan-Siew Chaos-Based Cipher
This paper presents a comprehensive analysis on the security of the
Yi-Tan-Siew chaotic cipher proposed in [IEEE TCAS-I 49(12):1826-1829 (2002)]. A
differential chosen-plaintext attack and a differential chosen-ciphertext
attack are suggested to break the sub-key K, under the assumption that the time
stamp can be altered by the attacker, which is reasonable in such attacks.
Also, some security Problems about the sub-keys and are
clarified, from both theoretical and experimental points of view. Further
analysis shows that the security of this cipher is independent of the use of
the chaotic tent map, once the sub-key is removed via the proposed
suggested differential chosen-plaintext attack.Comment: 5 pages, 3 figures, IEEEtrans.cls v 1.
Cryptanalysis of an Encryption Scheme Based on Blind Source Separation
Recently Lin et al. proposed a method of using the underdetermined BSS (blind
source separation) problem to realize image and speech encryption. In this
paper, we give a cryptanalysis of this BSS-based encryption and point out that
it is not secure against known/chosen-plaintext attack and chosen-ciphertext
attack. In addition, there exist some other security defects: low sensitivity
to part of the key and the plaintext, a ciphertext-only differential attack,
divide-and-conquer (DAC) attack on part of the key. We also discuss the role of
BSS in Lin et al.'s efforts towards cryptographically secure ciphers.Comment: 8 pages, 10 figures, IEEE forma
On the Design of Perceptual MPEG-Video Encryption Algorithms
In this paper, some existing perceptual encryption algorithms of MPEG videos
are reviewed and some problems, especially security defects of two recently
proposed MPEG-video perceptual encryption schemes, are pointed out. Then, a
simpler and more effective design is suggested, which selectively encrypts
fixed-length codewords (FLC) in MPEG-video bitstreams under the control of
three perceptibility factors. The proposed design is actually an encryption
configuration that can work with any stream cipher or block cipher. Compared
with the previously-proposed schemes, the new design provides more useful
features, such as strict size-preservation, on-the-fly encryption and multiple
perceptibility, which make it possible to support more applications with
different requirements. In addition, four different measures are suggested to
provide better security against known/chosen-plaintext attacks.Comment: 10 pages, 5 figures, IEEEtran.cl
Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence
Recently, an image encryption scheme based on a compound chaotic sequence was
proposed. In this paper, the security of the scheme is studied and the
following problems are found: (1) a differential chosen-plaintext attack can
break the scheme with only three chosen plain-images; (2) there is a number of
weak keys and some equivalent keys for encryption; (3) the scheme is not
sensitive to the changes of plain-images; and (4) the compound chaotic sequence
does not work as a good random number resource.Comment: 11 pages, 2 figure
Breaking a chaos-noise-based secure communication scheme
This paper studies the security of a secure communication scheme based on two
discrete-time intermittently-chaotic systems synchronized via a common random
driving signal. Some security defects of the scheme are revealed: 1) the key
space can be remarkably reduced; 2) the decryption is insensitive to the
mismatch of the secret key; 3) the key-generation process is insecure against
known/chosen-plaintext attacks. The first two defects mean that the scheme is
not secure enough against brute-force attacks, and the third one means that an
attacker can easily break the cryptosystem by approximately estimating the
secret key once he has a chance to access a fragment of the generated
keystream. Yet it remains to be clarified if intermittent chaos could be used
for designing secure chaotic cryptosystems.Comment: RevTeX4, 11 pages, 15 figure
- …