Recently a chaotic cryptographic scheme based on composition maps was proposed. This paper studies the security of the scheme and reports the following problems: (1) the scheme can be broken by a differential attack with 6 + log L(MN)⌉ chosen plaintexts, where MN is the size of the plaintext and L is the number of different elements in plaintext; (2)the two composition maps both do not work as a secure and efficient source of random numbers; (3)the scheme is not sensitive to the changes of the plaintext.Department of Electronic and Information Engineerin
Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this pape...
Abstract A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
Recently, an image encryption scheme based on chaotic standard and logistic maps was proposed by Pat...
Recently, a new chaotic image encryption technique was proposed based on multiple discrete dynamic m...
AbstractIn this paper, two fatal flaws of the cryptosystem which are based on the logistic map and p...
A potential security vulnerability of embedding compression in a chaos-based cryptography is studied...
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaoti...
Zhou et al. have proposed a chaotic encryption scheme, which is based on a kind of computerized piec...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic...
Chaos systems have been widely used in image encryption algorithms. In this article, we introduce an...
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaoti...
Abstract A chaotic map has sensitivity to changes in the initial conditions and parameters, and a lo...
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any m...
Wang and Guo (Nonlinear Dyn 76(4):1943–1950, 2014) proposed a new image alternate encryption algorit...
Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this pape...
Abstract A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
Recently, an image encryption scheme based on chaotic standard and logistic maps was proposed by Pat...
Recently, a new chaotic image encryption technique was proposed based on multiple discrete dynamic m...
AbstractIn this paper, two fatal flaws of the cryptosystem which are based on the logistic map and p...
A potential security vulnerability of embedding compression in a chaos-based cryptography is studied...
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaoti...
Zhou et al. have proposed a chaotic encryption scheme, which is based on a kind of computerized piec...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic...
Chaos systems have been widely used in image encryption algorithms. In this article, we introduce an...
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaoti...
Abstract A chaotic map has sensitivity to changes in the initial conditions and parameters, and a lo...
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any m...
Wang and Guo (Nonlinear Dyn 76(4):1943–1950, 2014) proposed a new image alternate encryption algorit...
Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this pape...
Abstract A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
Recently, an image encryption scheme based on chaotic standard and logistic maps was proposed by Pat...