Loading…

Chaotic Cryptosystems: Cryptanalysis and Identifiability

A general framework based on the identifiability concept for the cryptanalysis of a large class of chaotic cryptosystems is proposed. A systematic methodology is provided, in order to test, a priori, during the design stage, whether the parameters of a chaotic cryptosystem may play the role of the s...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on circuits and systems. 1, Fundamental theory and applications Fundamental theory and applications, 2006-12, Vol.53 (12), p.2673-2680
Main Authors: Anstett, F., Millerioux, G., Bloch, G.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:A general framework based on the identifiability concept for the cryptanalysis of a large class of chaotic cryptosystems is proposed. A systematic methodology is provided, in order to test, a priori, during the design stage, whether the parameters of a chaotic cryptosystem may play the role of the secret key or not. A connection between robustness against brute force attacks, uniqueness in the parameters and identifiability is pointed out. Two approaches, the outputs equality approach and the input/output relation approach, are presented to test the identifiability of the system parameters. The second approach is constructive in the sense that not only it allows to conclude on the identifiability of the parameters but it also provides a systematic technique, based on solving a set of algebraic equations, to retrieve the parameters in the context of a known plaintext attack. It turns out that cryptosystems involving polynomial nonlinearities, chaotic or not, are weak against such an attack, called algebraic attack
ISSN:1549-8328
1057-7122
1558-0806
DOI:10.1109/TCSI.2006.885979