Results 1  10
of
98
CRYPTANALYSIS OF FRIDRICH’S CHAOTIC IMAGE ENCRYPTION
, 2009
"... We cryptanalyze Fridrich’s chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against chosenciphertext attacks. We propose an attack that reveals the secret permutation that is used to shuffle the pixels of a round input. We demonstrate the ..."
Abstract

Cited by 13 (0 self)
 Add to MetaCart
(Show Context)
We cryptanalyze Fridrich’s chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against chosenciphertext attacks. We propose an attack that reveals the secret permutation that is used to shuffle the pixels of a round input. We demonstrate the effectiveness of our attack with examples and simulation results. We also show that our proposed attack can be generalized to other wellknown chaotic image encryption algorithms.
Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
, 2007
"... ..."
A prototype System for
 High Precision 3D Measurement Based on Grating Method,” Proc. SPIE 6834, 683442
, 2007
"... NOTICE: This is the author’s version of a work that was accepted to Journal of Systems and Software in 2009. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Ch ..."
Abstract

Cited by 10 (1 self)
 Add to MetaCart
(Show Context)
NOTICE: This is the author’s version of a work that was accepted to Journal of Systems and Software in 2009. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication.
Cryptanalysis of a computer cryptography scheme based on a filter bank
 CHAOS, SOLITONS & FRACTALS
, 2009
"... ..."
Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
 CHAOS, SOLITONS & FRACTALS, VOL. 41, NO. 5, PP. 26132616
, 2009
"... ..."
Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption
"... NOTICE: This is the author’s version of a work that was accepted by Communications in Nonlinear ..."
Abstract

Cited by 6 (0 self)
 Add to MetaCart
(Show Context)
NOTICE: This is the author’s version of a work that was accepted by Communications in Nonlinear
A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing
, 2008
"... During last one and half decade an interesting relationship between chaos and cryptography has been developed, according to which many properties of chaotic systems such as: ergodicity, sensitivity to initial conditions/system parameters, mixing property, deterministic dynamics and structural comple ..."
Abstract

Cited by 6 (0 self)
 Add to MetaCart
(Show Context)
During last one and half decade an interesting relationship between chaos and cryptography has been developed, according to which many properties of chaotic systems such as: ergodicity, sensitivity to initial conditions/system parameters, mixing property, deterministic dynamics and structural complexity can be considered analogous to the confusion, diffusion with small change in plaintext/secret key, diffusion with a small change within one block of the plaintext, deterministic pseudo randomness and algorithmic complexity properties of traditional cryptosystems. As a result of this close relationship several chaosbased cryptosystems have been put forward since 1990. In one of the stages of the development of chaotic stream ciphers, the application of discrete chaotic dynamical systems in pseudo random bit generation has been widely studied recently. In this communication, we propose a novel pseudo random bit generator (PRBG) based on two chaotic logistic maps running sidebyside and starting from random independent initial conditions. The pseudo random bit sequence is generated by comparing the outputs of both the chaotic logistic maps. We discuss the suitability of the logistic map by highlighting some of its interesting statistical properties, which make it a perfect choice for such random bit generation. Finally, we present the detailed results of the statistical testing on generated bit sequences, done by the most stringent tests of randomness: the NIST suite tests, to detect the specific characteristics expected of truly random sequences. Povzetek: Predstavljen je psevdo naključni generator bitov na osnovi kaotičnega pristopa. 1
R.Lozi, “Dynamical Analysis of a new statistically highly performant deterministic function for chaotic signals generation
 International Conf. on Physics and Control (PhysCon
, 2009
"... In some engineering applications, such as chaotic encryption, chaotic maps have to exhibit required spectral and statistical properties close to those of random signals [1] [2]. In order to evaluate the latter features, statistical tests developed for random number generators (RNG) can also be appli ..."
Abstract

Cited by 5 (5 self)
 Add to MetaCart
(Show Context)
In some engineering applications, such as chaotic encryption, chaotic maps have to exhibit required spectral and statistical properties close to those of random signals [1] [2]. In order to evaluate the latter features, statistical tests developed for random number generators (RNG) can also be applied to chaotic maps, in order to gather evidence that the map generates ”good ” chaotic signals,
Analog chaosbased secure communications and cryptanalysis: A brief survey
, 2007
"... A large number of analog chaosbased secure communication systems have been proposed since the early 1990s exploiting the technique of chaos synchronization. A brief survey of these chaosbased cryptosystems and of related cryptanalytic results is given. Some recently proposed countermeasures agains ..."
Abstract

Cited by 5 (3 self)
 Add to MetaCart
(Show Context)
A large number of analog chaosbased secure communication systems have been proposed since the early 1990s exploiting the technique of chaos synchronization. A brief survey of these chaosbased cryptosystems and of related cryptanalytic results is given. Some recently proposed countermeasures against known attacks are also introduced.
CRYPTANALYSIS OF A NEW CHAOTIC CRYPTOSYSTEM BASED ON ERGODICITY
 INTERNATIONAL JOURNAL OF MODERN PHYSICS B
, 2009
"... This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosenciphertext attack. Some other design weaknesses are also shown. ..."
Abstract

Cited by 5 (4 self)
 Add to MetaCart
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosenciphertext attack. Some other design weaknesses are also shown.