高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一类混沌流密码的分析

李树钧 牟轩沁 纪震 张基宏

李树钧, 牟轩沁, 纪震, 张基宏. 一类混沌流密码的分析[J]. 电子与信息学报, 2003, 25(4): 473-478.
引用本文: 李树钧, 牟轩沁, 纪震, 张基宏. 一类混沌流密码的分析[J]. 电子与信息学报, 2003, 25(4): 473-478.
Li Shujun, Mou Xuanqin, Ji Zhen, Zhang Jihong. Cryptanalysis of a class of chaotic stream ciphers[J]. Journal of Electronics and Information Technology, 2003, 25(4): 473-478.
Citation: Li Shujun, Mou Xuanqin, Ji Zhen, Zhang Jihong. Cryptanalysis of a class of chaotic stream ciphers[J]. Journal of Electronics and Information Technology, 2003, 25(4): 473-478.

一类混沌流密码的分析

Cryptanalysis of a class of chaotic stream ciphers

  • 摘要: 该文指出一类基于数字化逐段线性混沌映射的混沌流密码方案是不够安全的。在有限数字精度下,分段线性混沌映射存在可度量的特征退化,这种退化由控制参数所在的参数空间子集唯一决定。由此可以推知,在已知明文的情况下,整个密钥空间可以分解为强度依次降低的弱密钥子空间。在此基础上可以导出一类多分辨率攻击方法,在密钥随机分配的情况下,该攻击方法从总体上可以把密钥嫡降低2bit,试验结果表明,该文提出的多分辨率攻击方法是实际可行的。该文还讨论了一些可能采取的改进措施及其效果。
  • 周红,俞军,凌燮亭,混沌前馈型流密码的设计,电子学报,1998,26(1),98-101.[2]Hong Zhou, Xie-Ting Ling, Problems with the chaotic inverse systems encryption approach, IEEE Trans. on Circuits and Systems-I, 1997, 44(3), 268-271.[3]周红,罗杰,凌燮亭,混沌非线性反馈密码序列的理论设计和有限精度实现,电子学报,1997,25(10),57-60[4]Zhou Hong, Ling Xieting, Generating chaotic secure sequences with desired statistical properties and high security, Int. J. Bifurcation Chaos, 1997, 7(1), 205-213.[5]桑涛,王汝笠,严义埙,一类新型混沌反馈密码序列的理论设计,电子学报,1999,27(7),47-50.[6]T. Habutsu, Y. Nishio, I. Sasase, S. Mori, A secret key cryptosystem by iterating a chaotic map,Advances in Cryptology-EuroCrypt91, Brighton, UK: 1991, Spinger-Verlag, 1991, Lecture Notes in Computer Science vol. 0547, 127-140.[7]G. Alvarez, F. Monotoya, G. Pastor, M. Romera, Chaotic cryptosystems, in Proc. 33nd Annual 1999 Int. Carnahan Conf. Security Technology, Madrid, Spain 1999, IEEE, 1999, 332-338.[8]E. Alvarez, A. Fernndez, P. Garcla, J. Jimnez, A. Marcano, New approach to chaotic encryption,Physics Letters A, 1999, 263(4-6), 373-375.[9]Shujun Li, Xuanqin Mou, Yuanlong Cai, Improving security of a chaotic encryption approach,Physics Letters A, 2001, 290(3/4), 127-133.[10]Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou, Yuanlong Cai, Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding, Cryptography and Coding-8th IMA Int. Conf., Cirencester, UK: 2001, Springer-Verlag, Lecture Notes in Computer Science vol. 2260, 205-221.[11]Maciej J. Ogorzatek, Herv Dedieu, Some tools for attacking secure communication systems employing chaotic carriers, Proc. Int. Symp. Circuits and Systems, Monterey, USA: 1998, IEEE,1998, vol.4, 522-525.[12]Eli Biham, Cryptoanalysis of the chaotic-map cryptosystem suggested at EuroCrypt91, Advances in Cryptology-EuroCrypt91, Brighton, UK: 1991, Spinger-Verlag, 1991, Lecture Notes in Computer Science vol.0547, 532-534.[13]Andrzej Lasota, Michael C. Mackey, Chaos, Fractals, and Noise-Stochastic Aspects of Dynamics,Second edition, New York: Springer-Verlag, 1997, Chapter 5-6.[14]A. Baranousky, D. Daems, Design of one-dimensional chaotic maps with prescribed statistical properties, Int. J.[J]. Bifurcation Chaos.1995,5(6):1585-[15]周红,凌燮亭,有限精度混沌系统的m序列扰动实现,电子学报,1997,25(7),95-97.
  • 加载中
计量
  • 文章访问数:  3024
  • HTML全文浏览量:  55
  • PDF下载量:  621
  • 被引次数: 0
出版历程
  • 收稿日期:  2001-12-17
  • 修回日期:  2002-07-29
  • 刊出日期:  2003-04-19

目录

    /

    返回文章
    返回

    官方微信,欢迎关注