Breaking a chaos-based secure communication scheme designed by an improved modulation method

被引:60
作者
Li, SJ [1 ]
Alvarez, G
Chen, GR
机构
[1] City Univ Hong Kong, Dept Elect Engn, Kowloon, Hong Kong, Peoples R China
[2] CSIC, Inst Fis Aplicada, E-28006 Madrid, Spain
关键词
D O I
10.1016/j.chaos.2004.09.077
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Recently Bu and Wang [Bu S, Wang B-H. Chaos, Solitons & Fractals 2004;19(4):919-24] proposed a simple modulation method aiming to improve the security of chaos-based secure communications against return-map-based attacks. Soon this modulation method was independently cryptanalyzed by Chee et al. [Chee CY, Xu D, Bishop SR. Chaos, Solitons & Fractals 2004;21(5):1129-34], Wu et al. [Wu X, Hu H, Zhang B. Chaos, Solitons & Fractals 2004;22(2):367-73], and Alvarez et al. [Alvarez G, Montoya F, Romera M, Pastor G. Chaos, Solitons & Fractals, in press, arXiv:nlin/0406065] via different attacks. As an enhancement to the Bu-Wang method, an improving scheme was suggested by Wu et al. by removing the relationship between the modulating function and the zero-points. The present paper points out that the improved scheme proposed by Wu et al. is still insecure against a new attack. Compared with the existing attacks, the proposed attack is more powerful and can also break the original Bu-Wang scheme. Furthermore, it is pointed out that the security of the modulation-based schemes proposed by Wu et al. is not so satisfactory from a pure cryptographical point of view. The synchronization performance of this class of modulation-based schemes is also discussed. (c) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:109 / 120
页数:12
相关论文
共 40 条
[21]  
PECORA LM, 1990, PHYS REV LETT, V64, P8
[22]   EXTRACTING MESSAGES MASKED BY CHAOS [J].
PEREZ, G ;
CERDEIRA, HA .
PHYSICAL REVIEW LETTERS, 1995, 74 (11) :1970-1973
[23]  
Schatzman M., 2002, Numerical Analysis: A Mathematical Introduction
[24]  
Schneier B, 1996, APPL CRYPTOGRAPHY
[25]   Shock-wave synthesis of intermetallic compounds Ti3Al, TiAl and analysis of heterophase structure formation [J].
Shorokhov, EV ;
Greenberg, BA ;
Boyarshinova, TS ;
Sudareva, SV ;
Buzanov, VI ;
Antonova, OV ;
Panova, EV .
JOURNAL DE PHYSIQUE IV, 1997, 7 (C3) :7-12
[26]   Unmasking a hyperchaotic communication scheme [J].
Short, KM ;
Parker, AT .
PHYSICAL REVIEW E, 1998, 58 (01) :1159-1162
[27]   A simple method to reveal the parameters of the Lorenz system [J].
Stojanovski, T ;
Kocarev, L ;
Parlitz, U .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1996, 6 (12B) :2645-2652
[28]   Decoding digital information from the cascaded heterogeneous chaotic systems [J].
Tao, C ;
Du, CH ;
Zhang, Y .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2003, 13 (06) :1599-1608
[29]   Decoding chaotic cryptography without access to the superkey [J].
Vaidya, PG ;
Angadi, S .
CHAOS SOLITONS & FRACTALS, 2003, 17 (2-3) :379-386
[30]   Analyzing and improving a chaotic encryption method [J].
Wu, XG ;
Hu, HP ;
Zhang, BL .
CHAOS SOLITONS & FRACTALS, 2004, 22 (02) :367-373