×

Cryptanalysis of the public key encryption based on multiple chaotic systems. (English) Zbl 1134.94371

Summary: Recently, Ranjan Bose [Phys. Rev. Lett. 95, 098702 (2005)] proposed a novel public key encryption technique based on multiple chaotic systems. Unfortunately, K. Wang et al. [Security of public key encryption technique based on multiple chaotic system. Phys Lett A, in press] soon gave a successful attack on its special case based on Parseval’s theorem. In this letter, we give an improved example which can avoid the attack and point out that Wang cannot find the essential drawback of the technique. However, further experimental result shows Ranjan’s encryption technique is inefficient, and detailed theoretic analysis shows that the complexity to break the cryptosystem is overestimated.

MSC:

94A60 Cryptography
37D99 Dynamical systems with hyperbolic behavior
Full Text: DOI

References:

[1] Lian, S. G.; Sun, J. S.; Wang, Z. Q., A block cipher based on a suitable use of the chaotic standard map, Chaos, Solitons & Fractals, 26, 117-129 (2005) · Zbl 1093.37504
[2] Lei, M.; Meng, G.; Feng, Z. J., Security analysis of chaotic communication systems based on Volterra-Wiener-Korenberg model, Chaos, Solitons & Fractals, 28, 264-270 (2006) · Zbl 1094.94033
[3] Khan, K. K.; Zhang, J. S.; Tian, L., Chaotic secure content-based hidden transmission of biometric templates, Chaos, Solitons and Fractals, 32, 1749-1759 (2007)
[4] Baptista, M. S., Cryptography with chaos, Phys Lett A, 240, 50-54 (1998) · Zbl 0936.94013
[5] Li, S. J.; Chen, G. R.; Wong, K. W., Baptista-type chaotic cryptosystems: problems and countermeasures, Phys Lett A, 332, 368-375 (2004) · Zbl 1123.81330
[6] Wong, K. W., A combined cryptographic and hashing scheme, Phys Lett A, 307, 292-298 (2003) · Zbl 1008.94018
[7] Álvarez, G.; Montoya, F.; Romera, M., Cryptanalysis of dynamic look-up table based chaotic cryptosystems, Phys Lett A, 326, 211-218 (2004) · Zbl 1138.94346
[8] Chen, Y.; Liao, X. F., Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm, Phys Lett A, 342, 389-396 (2005) · Zbl 1222.81149
[9] Tenny, R.; Tsimring, L., Additive mixing modulation for public key encryption based on distributed dynamics, IEEE Trans Circuits Syst I, 52, 672-679 (2005) · Zbl 1374.94805
[10] Kocarev L, Tasev Z. Public-key encryption based on Chebyshev maps. In: Proceedings of the 1-st international circuit and systems symposium, 2003, p. 25-8.; Kocarev L, Tasev Z. Public-key encryption based on Chebyshev maps. In: Proceedings of the 1-st international circuit and systems symposium, 2003, p. 25-8.
[11] Bergamo, P.; Arco, P., Security of public key cryptosystems based on Chebyshev polynomials, IEEE Trans Circuits Syst I, 52, 1382-1393 (2005) · Zbl 1374.94775
[12] Kocarev, L.; Sterjev, M., Public key encryption scheme with chaos, Chaos, 14, 1078-1081 (2004) · Zbl 1080.94010
[13] Ruanjan, B., Novel public key encryption technique based on multiple chaotic systems, Phys Rev Lett, 26, 098702 (2005)
[14] Wang K, Pei W, Zhou L, et al. Security of public key encryption technique based on multiple chaotic system. Phys Lett A, in press.; Wang K, Pei W, Zhou L, et al. Security of public key encryption technique based on multiple chaotic system. Phys Lett A, in press.
[15] Li SJ, Mou XQ, Cai Y. In: Proceedings of progress in cryptology: INDOCRYPT 2001, Lecture notes in computer science, vol. 2247, 2001. p. 316-29.; Li SJ, Mou XQ, Cai Y. In: Proceedings of progress in cryptology: INDOCRYPT 2001, Lecture notes in computer science, vol. 2247, 2001. p. 316-29.
[16] Menezes, A.; van Oorschot, P.; Vanstone, S., Handbook of applied Cryptography (1996), CRC Press · Zbl 0868.94001
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.