Zhou et al. have proposed a chaotic encryption scheme, which is based on a kind of computerized piecewise linear chaotic map (PWLCM) realized in finite computing precision. In this paper, we point out that Zhou's encryption scheme is not secure enough from strict cryptographic viewpoint. The reason lies in the dynamical degradation of the computerized piecewise linear chaotic map employed by Zhou et al. The dynamical degradation of the computerized chaos induces many weak keys to cause large information leaking of the plaintext. In addition, we also discuss three simple countermeasures to enhance the security of Zhou's cryptosystem, but none of them can essentially enhance the security
Includes bibliographical references (pages 59-60).The study of chaotic maps has become increasingly ...
Under finite precision implementation, one dimensional (1D) chaotic maps suffer from limited number ...
This paper studies the security of a secure communication scheme based on two discrete-time intermit...
Zhou et al. have proposed a chaotic encryption scheme, which is based on a kind of computerized piec...
In recent years, a growing number of cryptosystems based on chaos have been proposed, many of them f...
This paper points out that a class of chaotic stream ciphers proposed recently is not secure enough,...
When chaotic systems are realized with finite precisions in digital computers, their dynamical prope...
When chaotic systems are realized with finite precisions in digital computers, their dynamical prope...
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic...
Recently, the chaos based cryptographic algorithms have suggested some meaningful techniques to deve...
Recently S. Papadimitriou et al. have proposed a new probabilistic encryption scheme based on chaoti...
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any m...
A potential security vulnerability of embedding compression in a chaos-based cryptography is studied...
... this paper reports some findings on a new series of dynamical indicators, which can quantitativ...
Recently a chaotic cryptographic scheme based on composition maps was proposed. This paper studies t...
Includes bibliographical references (pages 59-60).The study of chaotic maps has become increasingly ...
Under finite precision implementation, one dimensional (1D) chaotic maps suffer from limited number ...
This paper studies the security of a secure communication scheme based on two discrete-time intermit...
Zhou et al. have proposed a chaotic encryption scheme, which is based on a kind of computerized piec...
In recent years, a growing number of cryptosystems based on chaos have been proposed, many of them f...
This paper points out that a class of chaotic stream ciphers proposed recently is not secure enough,...
When chaotic systems are realized with finite precisions in digital computers, their dynamical prope...
When chaotic systems are realized with finite precisions in digital computers, their dynamical prope...
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic...
Recently, the chaos based cryptographic algorithms have suggested some meaningful techniques to deve...
Recently S. Papadimitriou et al. have proposed a new probabilistic encryption scheme based on chaoti...
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any m...
A potential security vulnerability of embedding compression in a chaos-based cryptography is studied...
... this paper reports some findings on a new series of dynamical indicators, which can quantitativ...
Recently a chaotic cryptographic scheme based on composition maps was proposed. This paper studies t...
Includes bibliographical references (pages 59-60).The study of chaotic maps has become increasingly ...
Under finite precision implementation, one dimensional (1D) chaotic maps suffer from limited number ...
This paper studies the security of a secure communication scheme based on two discrete-time intermit...