×

Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features. (English) Zbl 1358.94055

Summary: The application of synchronization theory to build new cryptosystems has been a hot topic during the last two decades. In this paper, we analyze a recent proposal in this field. We pinpoint the main limitations of the software implementation of chaos-based systems designed on the grounds of synchronization theory. In addition, we show that the cryptosystem under evaluation possesses serious security problems that imply a clear reduction of the key space.

MSC:

94A60 Cryptography
34D06 Synchronization of solutions to ordinary differential equations
81P94 Quantum cryptography (quantum-theoretic aspects)

References:

[1] Abad, A., Barrio, R., Blesa, F. & Rodríguez, M. [2012] “ Tides, a taylor series integrator for differential equations,” ACM Trans. Math. Softw. (TOMS)39, 5. · Zbl 1295.65138
[2] Alvarez, G., Amigó, J. M., Arroyo, D. & Li, S. [2011] “ Lessons learnt from the cryptanalysis of chaos-based ciphers,” Chaos-Based Cryptography, eds. Kocarev, L. & Lian, S. (Springer, Berlin, Heidelberg), pp. 257-295. · Zbl 1221.94039
[3] Arroyo, D., Alvarez, G., Li, S., Li, C. & Fernandez, V. [2009a] “ Cryptanalysis of a new chaotic cryptosystem based on ergodicity,” Int. J. Mod. Phys. B23, 651-659. · Zbl 1170.94323
[4] Arroyo, D., Li, C., Li, S., Alvarez, G. & Halang, W. A. [2009b] “ Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm,” Chaos Solit. Fract.41, 2613-2616. · Zbl 1198.94019
[5] Arroyo, D., Alvarez, G., Amigó, J. M. & Li, S. [2011] “ Cryptanalysis of a family of self-synchronizing chaotic stream ciphers,” Commun. Nonlin. Sci. Numer. Simul.16, 805-813. · Zbl 1221.94040
[6] Baptista, M. S. [1998] “ Cryptography with chaos,” Phys. Lett. A240, 50-54. · Zbl 0936.94013
[7] Čelikovskỳ, S. & Lynnyk, V. [2016] “ Message embedded chaotic masking synchronization scheme based on the generalized Lorenz system and its security analysis,” Int. J. Bifurcation and Chaos26, 1650140-1-15. · Zbl 1345.94050
[8] Chandre, C., Wiggins, S. & Uzer, T. [2003] “ Time-frequency analysis of chaotic systems,” Physica D181, 171-196. · Zbl 1027.70027
[9] Chen, G., Hsu, S.-B., Huang, Y. & Roque-Sol, M. A. [2011] “ The spectrum of chaotic time series (ii): Wavelet analysis,” Int. J. Bifurcation and Chaos21, 1457-1467. · Zbl 1248.37034
[10] García-Martínez, M., Denisenko, N., Soto, D., Arroyo, D., Orue, A. & Fernandez, V. [2013] “ High-speed free-space quantum key distribution system for urban daylight applications,” Appl. Opt.52, 3311-3317.
[11] Hu, H., Deng, Y. & Liu, L. [2014] “ Counteracting the dynamical degradation of digital chaos via hybrid control,” Commun. Nonlin. Sci. Numer. Simul.19, 1970-1984. · Zbl 1457.93007
[12] Li, S. [2003] “Analyses and new designs of digital chaotic ciphers,” PhD thesis, School of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an, China, available online at http://www.hook-lee.com/pub.html.
[13] Li, S., Alvarez, G., Li, Z. & Halang, W. [2007] “ Analog chaos-based secure communications and cryptanalysis: A brief survey,” 3rd Int. IEEE Scientific Conf. Physics and Control (PhysCon 2007), eds. Kurths, J., Fradkov, A. & Chen, G. (Potsdam, Germany), p. 92.
[14] Li, C., Liu, Y., Xie, T. & Chen, M. Z. Q. [2013] “ Breaking a novel image encryption scheme based on improved hyperchaotic sequences,” Nonlin. Dyn.73, 2083-2089. · Zbl 1281.68103
[15] Li, C. [2016] “ Cracking a hierarchical chaotic image encryption algorithm based on permutation,” Sign. Process.118, 203-210.
[16] Liu, Y., Fan, H., Xie, E. Y., Cheng, G. & Li, C. [2015] “ Deciphering an image cipher based on mixed transformed logistic maps,” Int. J. Bifurcation and Chaos25, 1550188-1-9. · Zbl 1330.94042
[17] Lozi, R. [2014] “ Designing chaotic mathematical circuits for solving practical problems,” Int. J. Automat. Comput.11, 588-597.
[18] Lozi, R. & Pchelintsev, A. N. [2015] “ A new reliable numerical method for computing chaotic solutions of dynamical systems: The Chen attractor case,” Int. J. Bifurcation and Chaos25, 1550187-1-10. · Zbl 1330.37069
[19] Menezes, A., van Oorschot, P. & Vanstone, S. [1997] Handbook of Applied Cryptography (CRC Press). · Zbl 0868.94001
[20] Orue, A., Fernandez, V., Alvarez, G., Pastor, G., Romera, M., Montoya, F. & Li, S. [2009] “ Breaking a SC-CNN-based chaotic masking secure communication system,” Int. J. Bifurcation and Chaos19, 1329-1338.
[21] Orue, A., Alvarez, G., Pastor, G., Romera, M., Montoya, F. & Li, S. [2010] “ A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis,” Commun. Nonlin. Sci. Numer. Simul.15, 3471-3483. · Zbl 1222.94037
[22] Shakiba, A., Hooshmandasl, M. R. & Meybodi, M. A. [2016] “ Cryptanalysis of multiplicative coupled cryptosystems based on the Chebyshev polynomials,” Int. J. Bifurcation and Chaos26, 1650112-1-11. · Zbl 1343.94081
[23] Shannon, C. [1949] “ Communication theory of secrecy systems,” Bell Syst. Tech. J.28, 656-715. · Zbl 1200.94005
[24] Sinai, Y. [1968] “ Construction of Markov partitions,” Funct. Anal. Appl.2, 245-253. · Zbl 0194.22602
[25] Torczon, V. [1997] “ On the convergence of pattern search algorithms,” SIAM J. Optimiz.7, 1-25. · Zbl 0884.65053
[26] Vidal, G. & Mancini, H. [2009] “ Hyperchaotic synchronization under square symmetry,” Int. J. Bifurcation and Chaos19, 719-726. · Zbl 1170.34338
[27] Vidal, G. [2011] “Sincronización y control de sistemas dinámicos en régimen de caos espacio-temporal,” PhD thesis, Universidad de Navarra, Spain, http://dadun.unav.edu/handle/10171/17003.
[28] Vidal, G., Baptista, M. S. & Mancini, H. [2012] “ Fundamentals of a classical chaos-based cryptosystem with some quantum cryptography features,” Int. J. Bifurcation and Chaos22, 1250243-1-14. · Zbl 1258.94042
[29] Wang, Q., Yu, S., Li, C., Lü, J., Fang, X., Guyeux, C. & Bahi, J. M. [2016] “ Theoretical design and FPGA-based implementation of higher-dimensional digital chaotic systems,” IEEE Trans. Circuits Syst.-I63, 401-412. · Zbl 1469.94118
[30] Xie, E. Y., Li, C., Yu, S. & Lü, J. [2017] “ On the cryptanalysis of Fridrich’s chaotic image encryption scheme,” Sign. Process.132, 150-154.
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.