메뉴 건너뛰기




Volumn 27, Issue 16, 2004, Pages 1679-1681

Breaking network security based on synchronized chaos

Author keywords

Chaotic cryptosystems; Cryptanalysis; Network security

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER NETWORKS; COMPUTER SIMULATION; CRYPTOGRAPHY; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA;

EID: 4344645966     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2004.05.007     Document Type: Article
Times cited : (26)

References (13)
  • 2
    • 0011224204 scopus 로고
    • A simple way to synchronize chaotic systems with applications to secure communications systems
    • Wu C.W., Chua L.O. A simple way to synchronize chaotic systems with applications to secure communications systems. Int. J. Bifurc. Chaos. 3:1993;1619-1627.
    • (1993) Int. J. Bifurc. Chaos , vol.3 , pp. 1619-1627
    • Wu, C.W.1    Chua, L.O.2
  • 3
    • 0027682168 scopus 로고
    • Synchronization of lorenz-based chaotic circuits with applications to communications
    • Cuomo K.M., Openheim A.V., Strogatz S.H. Synchronization of lorenz-based chaotic circuits with applications to communications. IEEE Trans. Circuits Syst.-II. 40:1993;626-633.
    • (1993) IEEE Trans. Circuits Syst.-II , vol.40 , pp. 626-633
    • Cuomo, K.M.1    Openheim, A.V.2    Strogatz, S.H.3
  • 4
    • 12044251580 scopus 로고
    • Circuit implementation of synchronized chaos with applications to communications
    • Cuomo K.M., Openheim A.V. Circuit implementation of synchronized chaos with applications to communications. Phys. Rev. Lett. 71:1993;65-68.
    • (1993) Phys. Rev. Lett. , vol.71 , pp. 65-68
    • Cuomo, K.M.1    Openheim, A.V.2
  • 5
    • 0038222420 scopus 로고    scopus 로고
    • An adaptive chaos synchronization scheme applied to secure communication
    • Feki M. An adaptive chaos synchronization scheme applied to secure communication. Chaos, Solitons and Fractals. 18:2003;141-148.
    • (2003) Chaos, Solitons and Fractals , vol.18 , pp. 141-148
    • Feki, M.1
  • 6
    • 0033310588 scopus 로고    scopus 로고
    • An observer based approach for chaotic synchronization with application to secure communications
    • Liao T.L., Huang N.S. An observer based approach for chaotic synchronization with application to secure communications. IEEE Trans. Circuits Syst.-I. 46:1999;1144-1150.
    • (1999) IEEE Trans. Circuits Syst.-I , vol.46 , pp. 1144-1150
    • Liao, T.L.1    Huang, N.S.2
  • 7
    • 0036505160 scopus 로고    scopus 로고
    • Generalized state-space observers for chaotic syncronization and secure communication
    • Boutayeb M., Darouach M., Rafaralahy H. Generalized state-space observers for chaotic syncronization and secure communication. IEEE Trans. Circuits Syst.-I. 49:2002;345-349.
    • (2002) IEEE Trans. Circuits Syst.-I , vol.49 , pp. 345-349
    • Boutayeb, M.1    Darouach, M.2    Rafaralahy, H.3
  • 8
    • 4243997232 scopus 로고
    • Extracting messages masked by chaos
    • Pérez G., Cerdeira H.A. Extracting messages masked by chaos. Phys. Rev. Lett. 74:1995;1970-1973.
    • (1995) Phys. Rev. Lett. , vol.74 , pp. 1970-1973
    • Pérez, G.1    Cerdeira, H.A.2
  • 9
    • 0001580090 scopus 로고    scopus 로고
    • Unmasking a modulated chaotic communications scheme
    • Short K.M. Unmasking a modulated chaotic communications scheme. Int. J. Bifurc. Chaos. 6:1996;367-375.
    • (1996) Int. J. Bifurc. Chaos , vol.6 , pp. 367-375
    • Short, K.M.1
  • 10
    • 0041762753 scopus 로고    scopus 로고
    • Cryptanalyzing chaotic secure communications using return maps
    • Yang T., Yang L.B., Yang C.M. Cryptanalyzing chaotic secure communications using return maps. Phys. Lett. A. 245:1998;495-510.
    • (1998) Phys. Lett. A , vol.245 , pp. 495-510
    • Yang, T.1    Yang, L.B.2    Yang, C.M.3
  • 11
    • 0037302727 scopus 로고    scopus 로고
    • Chosen ciphertext attack on chaos communication based on chatotic synchronization
    • Hu G., Feng Z., Meng R. Chosen ciphertext attack on chaos communication based on chatotic synchronization. IEEE Trans. Circuits Syst.-I. 50:2003;275-279.
    • (2003) IEEE Trans. Circuits Syst.-I , vol.50 , pp. 275-279
    • Hu, G.1    Feng, Z.2    Meng, R.3
  • 13
    • 0242526007 scopus 로고    scopus 로고
    • Synchronized chaos for network security
    • Memon Q. Synchronized chaos for network security. Computer Communications. 26:2003;498-505.
    • (2003) Computer Communications , vol.26 , pp. 498-505
    • Memon, Q.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.