On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks

被引:1
|
作者
Qin, Ke [1 ]
Oommen, B. John [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
基金
中国国家自然科学基金; 加拿大自然科学与工程研究理事会;
关键词
ATTRACTORS;
D O I
10.1155/2015/468567
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with relative ease, demonstrating that its potential as a hash function is flawed. Similarly, we show that the DCBE is also not secure since it is not capable of resisting known plaintext, chosen plaintext, and chosen ciphertext attacks. Furthermore, unfortunately, both schemes are not efficient either, because of the large number of iteration steps involved in their respective implementations.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Cryptanalysis of a Cryptographic Algorithm that Utilizes Chaotic Neural Networks
    Qin, Ke
    Oommen, B. J.
    INFORMATION SCIENCES AND SYSTEMS 2014, 2014, : 167 - 174
  • [2] Cryptanalysis of a cryptographic scheme based on delayed chaotic neural networks
    Yang, Jiyun
    Liao, Xiaofeng
    Yu, Wenwu
    Wong, Kwok-wo
    Wei, Jun
    CHAOS SOLITONS & FRACTALS, 2009, 40 (02) : 821 - 825
  • [3] Keystream cryptanalysis of a chaotic cryptographic method
    Alvarez, G
    Montoya, R
    Romera, M
    Pastor, G
    COMPUTER PHYSICS COMMUNICATIONS, 2004, 156 (02) : 205 - 207
  • [4] Reply to the comment "Keystream cryptanalysis of a chaotic cryptographic method"
    Wong, WK
    Lee, LP
    Wong, KW
    COMPUTER PHYSICS COMMUNICATIONS, 2004, 156 (02) : 208 - 208
  • [5] Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks
    Luo, Yuling
    Zhang, Shunsheng
    Liu, Junxiu
    Cao, Lvchen
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2020, 30 (15):
  • [6] CRYPTANALYSIS OF CHAOTIC STREAM CIPHER BY MEANS OF EVOLUTIONAL ALGORITHMS
    Behal, Ladislav
    Giesl, Jiri
    Vlcek, Karel
    16TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING MENDEL 2010, 2010, : 107 - 112
  • [7] Novel improved blind detection algorithms based on chaotic neural networks
    Yu Shu-Juan
    Huan Ru-Song
    Zhang Yun
    Feng Di
    ACTA PHYSICA SINICA, 2014, 63 (06)
  • [8] Research on elliptic curve cryptographic algorithms based on Chaotic System
    Liu, Ming-lai
    Wei, Guang-zheng
    Zhao, Geng
    Zhang, Shao-po
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 77 - 81
  • [9] Chaotic neural networks and chaotic annealing
    Zhou, CS
    Chen, TL
    NEUROCOMPUTING, 2000, 30 (1-4) : 293 - 300
  • [10] Evaluating Cryptographic Algorithms in IEC 61850 Networks
    Scarselli, Rafael B.
    Soares, Leonardo F.
    Moraes, Igor M.
    PROCEEDINGS OF THE 2019 10TH INTERNATIONAL CONFERENCE ON NETWORKS OF THE FUTURE (NOF 2019), 2019, : 9 - 16