메뉴 건너뛰기




Volumn 20, Issue 8, 2010, Pages 2561-2568

Breaking a chaotic cryptographic scheme based on composition MAPS

Author keywords

Chaos; cryptanalysis; differential attack; encryption; image

Indexed keywords

BIFURCATION (MATHEMATICS); CHAOS THEORY; MATHEMATICAL TECHNIQUES;

EID: 78549249597     PISSN: 02181274     EISSN: None     Source Type: Journal    
DOI: 10.1142/S0218127410027192     Document Type: Article
Times cited : (45)

References (29)
  • 1
    • 33845255587 scopus 로고    scopus 로고
    • A new image encryption algorithm based on onedimensional polynomial chaotic maps
    • Akhavan, A., Mahmodi, H. & Akhshani, A. [2006] "A new image encryption algorithm based on onedimensional polynomial chaotic maps", Lecture Notes in Computer Science 4263, 963-971.
    • (2006) Lecture Notes in Computer Science , vol.4263 , pp. 963-971
    • Akhavan, A.1    Mahmodi, H.2    Akhshani, A.3
  • 2
    • 52149098630 scopus 로고    scopus 로고
    • A novel block cipher based on hierarchy of onedimensional composition chaotic maps
    • Akhshani, A., Mahmodi, H. & Akhavan, A. [2006] "A novel block cipher based on hierarchy of onedimensional composition chaotic maps", IEEE Int. Conf. Image Processing, pp. 1993-1996.
    • (2006) IEEE Int. Conf. Image Processing , pp. 1993-1996
    • Akhshani, A.1    Mahmodi, H.2    Akhavan, A.3
  • 3
    • 2442662577 scopus 로고    scopus 로고
    • Cryptanalysis of dynamic look-up table based chaotic cryptosystems
    • Álvarez, G., Montoya, F., Romera, M. & Pastor, G. [2004] "Cryptanalysis of dynamic look-up table based chaotic cryptosystems", Phys. Lett. A 326, 211-218.
    • (2004) Phys. Lett. A , vol.326 , pp. 211-218
    • Álvarez, G.1    Montoya, F.2    Romera, M.3    Pastor, G.4
  • 4
    • 33344455991 scopus 로고    scopus 로고
    • Breaking an encryption scheme based on chaotic baker map
    • Álvarez, G. & Li, S. [2005] "Breaking an encryption scheme based on chaotic baker map", Phys. Lett. A 352, 78-82.
    • (2005) Phys. Lett. A , vol.352 , pp. 78-82
    • Álvarez, G.1    Li, S.2
  • 5
    • 33750542126 scopus 로고    scopus 로고
    • Some basic cryptographic requirements for chaos-based cryptosystems
    • Álvarez, G. & Li, S. [2006] "Some basic cryptographic requirements for chaos-based cryptosystems", Int. J. Bifurcation and Chaos 16, 2129-2151.
    • (2006) Int. J. Bifurcation and Chaos , vol.16 , pp. 2129-2151
    • Álvarez, G.1    Li, S.2
  • 6
    • 54749118164 scopus 로고    scopus 로고
    • On the security of a new image encryption scheme based on chaotic map lattices
    • article 033112
    • Arroyo, D., Rhouma, R., Álvarez, G., Li, S. & Fernandez, V. [2008] "On the security of a new image encryption scheme based on chaotic map lattices", Chaos 18, article 033112.
    • (2008) Chaos , vol.18
    • Arroyo, D.1    Rhouma, R.2    Álvarez, G.3    Li, S.4    Fernandez, V.5
  • 8
    • 1342306864 scopus 로고    scopus 로고
    • A symmetric image encryption scheme based on 3d chaotic cat maps
    • Chen, G., Mao, Y. & Chui, C. K. [2004] "A symmetric image encryption scheme based on 3d chaotic cat maps", Chaos Solit. Fract. 21, 749-761.
    • (2004) Chaos Solit. Fract. , vol.21 , pp. 749-761
    • Chen, G.1    Mao, Y.2    Chui, C.K.3
  • 11
    • 0032089417 scopus 로고    scopus 로고
    • Symmetric ciphers based on twodimensional chaotic maps
    • Fridrich, J. [1998] "Symmetric ciphers based on twodimensional chaotic maps", Int. J. Bifurcation and Chaos 8, 1259-1284.
    • (1998) Int. J. Bifurcation and Chaos , vol.8 , pp. 1259-1284
    • Fridrich, J.1
  • 12
    • 0012584447 scopus 로고    scopus 로고
    • Problems with a probabilistic encryption scheme based on chaotic systems
    • Li, S., Mou, X., Yang, B. L., Ji, Z. & Zhang, J. [2003] "Problems with a probabilistic encryption scheme based on chaotic systems", Int. J. Bifurcation and Chaos 13, 3063-3077.
    • (2003) Int. J. Bifurcation and Chaos , vol.13 , pp. 3063-3077
    • Li, S.1    Mou, X.2    Yang, B.L.3    Ji, Z.4    Zhang, J.5
  • 13
    • 10944267248 scopus 로고    scopus 로고
    • On the security of the yi-tan-siew chaotic cipher
    • Li, S., Chen, G. & Mou, X. [2004] "On the security of the yi-tan-siew chaotic cipher", IEEE Trans. Circuits Syst.-II 51, 665-669.
    • (2004) IEEE Trans. Circuits Syst.-II , vol.51 , pp. 665-669
    • Li, S.1    Chen, G.2    Mou, X.3
  • 14
    • 17744365628 scopus 로고    scopus 로고
    • Breaking a chaos-noise-based secure communication scheme
    • article 013703
    • Li, S., Álvarez, G., Chen, G. & Mou, X. [2005] "Breaking a chaos-noise-based secure communication scheme, Chaos 15, article 013703.
    • (2005) Chaos , vol.15
    • Li, S.1    Álvarez, G.2    Chen, G.3    Mou, X.4
  • 15
    • 32544436119 scopus 로고    scopus 로고
    • On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
    • Li, C., Li, S. & Lou, D.-C. [2006a] "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)", J. Syst. Softw. 79, 253-258.
    • (2006) J. Syst. Softw , vol.79 , pp. 253-258
    • Li, C.1    Li, S.2    Lou, D.-C.3
  • 16
    • 33645526435 scopus 로고    scopus 로고
    • Cryptanalysis of a data security protection scheme for VoIP
    • Li, C., Li, S., Zhang, D. & Chen, G. [2006b] "Cryptanalysis of a data security protection scheme for VoIP", IEE Proc.-Vis. Imag. Sign. Process. 153, 1-10.
    • (2006) IEE Proc.-Vis. Imag. Sign. Process , vol.153 , pp. 1-10
    • Li, C.1    Li, S.2    Zhang, D.3    Chen, G.4
  • 18
    • 34548361693 scopus 로고    scopus 로고
    • Cryptanalysis of two chaotic encryption schemes based on circular bit shift and xor operations
    • Li, C., Li, S., Alvarez, G., Chen, G. & Lo, K.-T. [2007] "Cryptanalysis of two chaotic encryption schemes based on circular bit shift and xor operations", Phys. Lett. A 369, 23-30.
    • (2007) Phys. Lett. A , vol.369 , pp. 23-30
    • Li, C.1    Li, S.2    Alvarez, G.3    Chen, G.4    Lo, K.-T.5
  • 19
    • 42049108003 scopus 로고    scopus 로고
    • A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
    • Li, S., Li, C., Chen, G., Bourbakis, N. G. & Lo, K.-T. [2008a] "A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks", Sign. Process.: Imag. Commun. 23, 212-223.
    • (2008) Sign. Process.: Imag. Commun. , vol.23 , pp. 212-223
    • Li, S.1    Li, C.2    Chen, G.3    Bourbakis, N.G.4    Lo, K.-T.5
  • 20
    • 44049097510 scopus 로고    scopus 로고
    • Cryptanalysis of the RCES/RSES image encryption scheme
    • Li, S., Li, C., Chen, G. & Lo, K.-T. [2008b] "Cryptanalysis of the RCES/RSES image encryption scheme", J. Syst. Softw. 81, 1130-1143.
    • (2008) J. Syst. Softw , vol.81 , pp. 1130-1143
    • Li, S.1    Li, C.2    Chen, G.3    Lo, K.-T.4
  • 22
    • 16344371432 scopus 로고    scopus 로고
    • Security analysis of a chaos-based image encryption algorithm
    • Lian, S., Sun, J. & Wang, Z. [2005] "Security analysis of a chaos-based image encryption algorithm", Physica A: Statis. Mech. Appl. 351, 645-661.
    • (2005) Physica A: Statis. Mech. Appl. , vol.351 , pp. 645-661
    • Lian, S.1    Sun, J.2    Wang, Z.3
  • 23
    • 1542316660 scopus 로고    scopus 로고
    • Image and video encryption using scan patterns
    • Maniccam, S. S. & Bourbakis, N. G. [2004] "Image and video encryption using scan patterns", Patt. Recogn. 37, 725-737.
    • (2004) Patt. Recogn , vol.37 , pp. 725-737
    • Maniccam, S.S.1    Bourbakis, N.G.2
  • 24
    • 33747058774 scopus 로고    scopus 로고
    • Image encryption using chaotic logistic map
    • Pareek, N., Patidar, V. & Sud, K. [2006] "Image encryption using chaotic logistic map", Imag. Vis. Comput. 24, 926-934.
    • (2006) Imag. Vis. Comput. , vol.24 , pp. 926-934
    • Pareek, N.1    Patidar, V.2    Sud, K.3
  • 26
    • 0000378191 scopus 로고    scopus 로고
    • Fast encryption of image data using chaotic Kolmogorov flows
    • Scharinger, J. [1998] "Fast encryption of image data using chaotic Kolmogorov flows", J. Electron. Imag. 7, 318-325.
    • (1998) J. Electron. Imag. , vol.7 , pp. 318-325
    • Scharinger, J.1
  • 27
    • 18644385641 scopus 로고    scopus 로고
    • Cryptanalysis of observer based discrete-time chaotic encryption schemes
    • Solak, E. [2005] "Cryptanalysis of observer based discrete-time chaotic encryption schemes", Int. J. Bifurcation and Chaos 15, 653-658.
    • (2005) Int. J. Bifurcation and Chaos , vol.15 , pp. 653-658
    • Solak, E.1
  • 28
    • 57949091424 scopus 로고    scopus 로고
    • Embedding compression in chaos-based cryptography
    • Wong, K.-W. & Yuen, C.-H. [2008] "Embedding compression in chaos-based cryptography", IEEE Trans. Circuits Syst.-II 55, 1193-1197.
    • (2008) IEEE Trans. Circuits Syst.-II , vol.55 , pp. 1193-1197
    • Wong, K.-W.1    Yuen, C.-H.2
  • 29
    • 34047165325 scopus 로고    scopus 로고
    • Improving the security of a dynamic look-up table based chaotic cryptosystem
    • Xiao, D., Liao, X. & Wong, K.-W. [2006] "Improving the security of a dynamic look-up table based chaotic cryptosystem", IEEE Trans. Circuits Syst.-II 53, 502-506.
    • (2006) IEEE Trans. Circuits Syst.-II , vol.53 , pp. 502-506
    • Xiao, D.1    Liao, X.2    Wong, K.-W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.