On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks

被引:1
|
作者
Qin, Ke [1 ]
Oommen, B. John [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
基金
中国国家自然科学基金; 加拿大自然科学与工程研究理事会;
关键词
ATTRACTORS;
D O I
10.1155/2015/468567
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with relative ease, demonstrating that its potential as a hash function is flawed. Similarly, we show that the DCBE is also not secure since it is not capable of resisting known plaintext, chosen plaintext, and chosen ciphertext attacks. Furthermore, unfortunately, both schemes are not efficient either, because of the large number of iteration steps involved in their respective implementations.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps
    Solak, Ercan
    Cokal, Cahit
    PHYSICS LETTERS A, 2008, 372 (46) : 6922 - 6924
  • [32] Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network
    Wang, Xiaomin
    Guo, Wei
    Zhang, Wenfang
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 515 - 524
  • [33] Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique
    Muhammad, Zahir Muhammed Ziad
    Ozkaynak, Fatih
    IEEE ACCESS, 2019, 7 : 99945 - 99953
  • [34] Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network
    Xiaomin Wang
    Wei Guo
    Wenfang Zhang
    Muhammad Khurram Khan
    Khaled Alghathbar
    Telecommunication Systems, 2013, 52 : 515 - 524
  • [35] Adaptive synchronization between two different chaotic neural networks with time delay
    Zhang, Huaguang
    Xie, Yinghui
    Wang, Zhiliang
    Zheng, Chengde
    IEEE TRANSACTIONS ON NEURAL NETWORKS, 2007, 18 (06): : 1841 - 1845
  • [36] Synchronization between Two Different Chaotic Neural Networks with Fully Unknown Parameters
    Xie, Yinghui
    Sun, Zengqi
    Wang, Fushan
    ADVANCES IN NEURAL NETWORKS - ISNN 2009, PT 2, PROCEEDINGS, 2009, 5552 : 1180 - +
  • [37] Specializing Neural Networks for Cryptographic Code Completion Applications
    Xiao, Ya
    Song, Wenjia
    Qi, Jingyuan
    Viswanath, Bimal
    McDaniel, Patrick
    Yao, Danfeng
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (06) : 3524 - 3535
  • [38] On the Learning Capabilities of Recurrent Neural Networks: A Cryptographic Perspective
    Srivastava, Shivin
    Bhatia, Ashutosh
    2018 9TH IEEE INTERNATIONAL CONFERENCE ON BIG KNOWLEDGE (ICBK), 2018, : 162 - 167
  • [39] A novel cryptographic scheme based on wavelet neural networks
    Chen, Guo
    Tan, Feng
    Yang, Degang
    ADVANCES IN NEURAL NETWORKS - ISNN 2006, PT 3, PROCEEDINGS, 2006, 3973 : 326 - 331
  • [40] An improvement of chaos-based hash function in cryptanalysis approach: An experience with chaotic neural networks and semi-collision attack
    W. Ghonaim
    Neveen I. Ghali
    Aboul Ella Hassanien
    Soumya Banerjee
    Memetic Computing, 2013, 5 : 179 - 185