Journal
PHYSICS LETTERS A
Volume 372, Issue 46, Pages 6922-6924Publisher
ELSEVIER SCIENCE BV
DOI: 10.1016/j.physleta.2008.10.022
Keywords
Communication using chaos; Cryptanalysis
Categories
Funding
- Scientific and Technological Research Council of Turkey (TUBiTAK) [106E143]
Ask authors/readers for more resources
Recently, an encryption algorithm based on two-dimensional discretized chaotic maps was proposed [Xiang et al., Phys. Lett. A 364 (2007) 252]. In this Letter, we analyze the security weaknesses of the proposal. Using the algebraic dependencies among system parameters. we show that its effective key space can be shrunk. We demonstrate a chosen-ciphertext attack that reveals a portion of the key. (C) 2008 Elsevier B.V. All rights reserved.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available