Cryptanalysis of an ergodic chaotic encryption algorithm

被引:0
|
作者
王兴元 [1 ]
谢旖欣 [1 ]
秦学 [1 ]
机构
[1] Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China
基金
中国国家自然科学基金;
关键词
chaos; cryptanalysis; encryption; block-cipher;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密]; O415.5 [混沌理论];
学科分类号
070201 ; 0839 ; 1402 ;
摘要
In this paper, we present the results for the security and the possible attacks on a new symmetric key encryption algorithm based on the ergodicity property of a logistic map. After analysis, we use mathematical induction to prove that the algorithm can be attacked by a chosen plaintext attack successfully and give an example to show how to attack it. According to the cryptanalysis of the original algorithm, we improve the original algorithm, and make a brief cryptanalysis. Compared with the original algorithm, the improved algorithm is able to resist a chosen plaintext attack and retain a considerable number of advantages of the original algorithm such as encryption speed, sensitive dependence on the key, strong anti-attack capability, and so on.
引用
收藏
页码:163 / 169
页数:7
相关论文
共 50 条
  • [21] Cryptanalysis of the cellular message encryption algorithm
    Wagner, D
    Schneier, B
    Kelsey, J
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 526 - 537
  • [22] On the cryptanalysis of Fridrich's chaotic image encryption scheme
    Xie, Eric Yong
    Li, Chengqing
    Yu, Simin
    Lu, Jinhu
    SIGNAL PROCESSING, 2017, 132 : 150 - 154
  • [23] Integral Cryptanalysis of ACE Encryption Algorithm
    Ye Tao
    Wei Yongzhuang
    Li Lingchen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (04) : 908 - 914
  • [24] χ2 cryptanalysis of the SEAL encryption algorithm
    Handschuh, H
    Gilbert, P
    FAST SOFTWARE ENCRYPTION, 1997, 1267 : 1 - 12
  • [25] Correlation Based Cryptanalysis on A Chaotic Encryption of JPEG Image
    Li, Weihai
    2014 7TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP 2014), 2014, : 628 - 632
  • [26] Differential cryptanalysis of the ICE encryption algorithm
    Van Rompay, B
    Knudsen, LR
    Rijmen, V
    FAST SOFTWARE ENCRYPTION, 1998, 1372 : 270 - 283
  • [27] Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation
    Sharma, Pankaj Kumar
    Ahmad, Musheer
    Khan, Parvez Mahmood
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 173 - 181
  • [28] Cryptanalysis of a discrete-time synchronous chaotic encryption system
    Arroyo, David
    Alvarez, Gonzalo
    Li, Shujun
    Li, Chengqing
    Nunez, Juana
    PHYSICS LETTERS A, 2008, 372 (07) : 1034 - 1039
  • [29] Cryptanalysis of the public key encryption based on multiple chaotic systems
    Zhang, Linhua
    CHAOS SOLITONS & FRACTALS, 2008, 37 (03) : 669 - 674
  • [30] Cryptanalysis of a chaotic neural network based multimedia encryption scheme
    Li, CQ
    Li, SJ
    Zhang, D
    Chen, GR
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2004, PT 3, PROCEEDINGS, 2004, 3333 : 418 - +