23,073 research outputs found
Cryptanalysis of a computer cryptography scheme based on a filter bank
This paper analyzes the security of a recently-proposed signal encryption
scheme based on a filter bank. A very critical weakness of this new signal
encryption procedure is exploited in order to successfully recover the
associated secret key.Comment: 6 pages, 1 figur
Cryptanalysis of a new chaotic cryptosystem based on ergodicity
This paper analyzes the security of a recent cryptosystem based on the
ergodicity property of chaotic maps. It is shown how to obtain the secret key
using a chosen-ciphertext attack. Some other design weaknesses are also shown.Comment: 10 pages, 5 figure
Approximate Quantum Adders with Genetic Algorithms: An IBM Quantum Experience
It has been proven that quantum adders are forbidden by the laws of quantum
mechanics. We analyze theoretical proposals for the implementation of
approximate quantum adders and optimize them by means of genetic algorithms,
improving previous protocols in terms of efficiency and fidelity. Furthermore,
we experimentally realize a suitable approximate quantum adder with the cloud
quantum computing facilities provided by IBM Quantum Experience. The
development of approximate quantum adders enhances the toolbox of quantum
information protocols, paving the way for novel applications in quantum
technologies
Security analysis of communication system based on the synchronization of different order chaotic systems
This work analyzes the security weakness of a recently proposed communication
method based on chaotic modulation and masking using synchronization of two
chaotic systems with different orders. It is shown that its application to
secure communication is unsafe, because it can be broken in two different ways,
by high-pass filtering and by reduced order system synchronization, without
knowing neither the system parameter values nor the system key.Comment: 12 pages, 6 figures, LaTeX forma
- …