Some basic cryptographic requirements for chaos-based cryptosystems

被引:1475
作者
Alvarez, Gonzalo
Li, Shujun
机构
[1] CSIC, Inst Fis Aplicada, E-28006 Madrid, Spain
[2] Hong Kong Polytech Univ, Dept Elect & Informat Engn, Kowloon, Hong Kong, Peoples R China
来源
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS | 2006年 / 16卷 / 08期
关键词
chaos; cryptography; design guidelines;
D O I
10.1142/S0218127406015970
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In recent years, a large amount of work on chaos-based cryptosystems have been published. However, many of the proposed schemes fail to explain or do not possess a number of features that are fundamentally important to all kind of cryptosystems. As a result, many proposed systems are difficult to implement in practice with a reasonable degree of security. Likewise, they are seldom accompanied by a thorough security analysis. Consequently, it is difficult for other researchers and end users to evaluate their security and performance. This work is intended to provide a common framework of basic guidelines that, if followed, could benefit every new cryptosystem. The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements. Meanwhile, several recommendations are made regarding some practical aspects of analog chaos-based secure communications, such as channel noise, limited bandwith and attenuation.
引用
收藏
页码:2129 / 2151
页数:23
相关论文
共 134 条
[1]   Transmission and storage of medical images with patient information [J].
Acharya, R ;
Bhat, PS ;
Kumar, S ;
Min, LC .
COMPUTERS IN BIOLOGY AND MEDICINE, 2003, 33 (04) :303-310
[2]   New approach to chaotic encryption [J].
Alvarez, E ;
Fernández, A ;
García, P ;
Jiménez, J ;
Marcano, A .
PHYSICS LETTERS A, 1999, 263 (4-6) :373-375
[3]   Cryptanalysis of a chaotic encryption system [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
PHYSICS LETTERS A, 2000, 276 (1-4) :191-196
[4]   Breaking projective chaos synchronization secure communication using filtering and generalized synchronization [J].
Alvarez, G ;
Li, SJ ;
Montoya, F ;
Pastor, G ;
Romera, M .
CHAOS SOLITONS & FRACTALS, 2005, 24 (03) :775-783
[5]   Cryptanalyzing an improved security modulated chaotic encryption scheme using ciphertext absolute value [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
CHAOS SOLITONS & FRACTALS, 2005, 23 (05) :1749-1756
[6]   Breaking two secure communication systems based on chaotic masking [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2004, 51 (10) :505-506
[7]   Breaking network security based on synchronized chaos [J].
Alvarez, G ;
Li, SJ .
COMPUTER COMMUNICATIONS, 2004, 27 (16) :1679-1681
[8]   Breaking a secure communication scheme based on the phase synchronization of chaotic systems [J].
Alvarez, G ;
Montoya, F ;
Pastor, G ;
Romera, M .
CHAOS, 2004, 14 (02) :274-278
[9]   Cryptanalyzing a discrete-time chaos synchronization secure communication system [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :689-694
[10]   Breaking parameter modulated chaotic secure communication system [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
CHAOS SOLITONS & FRACTALS, 2004, 21 (04) :783-787