On the security of the Yi-Tan-Siew chaotic cipher

被引:21
作者
Li, SJ [1 ]
Chen, GR
Mou, XQ
机构
[1] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
[2] Xian Jiaotong Univ, Sch Elect & Informat Engn, Xian 710049, Shaanxi, Peoples R China
关键词
chaotic cryptography; chosen-ciphertext attack; chosen-plaintext attack; differential cryptanalysis; tent map;
D O I
10.1109/TCSII.2004.838657
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a comprehensive analysis on the security of the Yi-Tan-Siew chaotic cipher. A differential chosen-plaintext attack and a differential chosen-ciphertext attack are suggested to break the sub-key K, under the assumption that the time stamp can be altered by the attacker, which is reasonable in such attacks. Also, some security problems about the sub-keys alpha and beta are clarified, from both theoretical and experimental points of view. Further analysis shows that the security of this cipher is independent of, the use of the chaotic tent map, once the sub-key K is removed via the proposed suggested differential chosen-plaintext attack.
引用
收藏
页码:665 / 669
页数:5
相关论文
共 5 条
[1]  
ASHNEIER B, 1996, APPL CRYPTOGRAPHY PR
[2]   Design of one-dimensional chaotic maps with prescribed statistical properties [J].
Baranovsky, A ;
Daems, D .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1995, 5 (06) :1585-1598
[3]  
LI S, 2003, THESIS XIAN JIAOTONG
[4]  
Weisstein Eric W., GEOMETRIC DISTRIBUTI
[5]   A new block cipher based on chaotic tent maps [J].
Yi, X ;
Tan, CH ;
Siew, CK .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-FUNDAMENTAL THEORY AND APPLICATIONS, 2002, 49 (12) :1826-1829