Security on a cryptographic model based on chaos

The application of chaos in cryptography has attracted much attention,however,most of them were cracked soon after publications.To find why they are so weak under the attack to their chaotic signal streams,some chaotic cryptosystems were investigated.A mathematical model was then derived from these...

Full description

Saved in:
Bibliographic Details
Main Authors: WEI Jun1, LIAO Xiao-feng2, YANG Ji-yun2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2008-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74653542/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537538143027200
author WEI Jun1
LIAO Xiao-feng2
YANG Ji-yun2
author_facet WEI Jun1
LIAO Xiao-feng2
YANG Ji-yun2
author_sort WEI Jun1
collection DOAJ
description The application of chaos in cryptography has attracted much attention,however,most of them were cracked soon after publications.To find why they are so weak under the attack to their chaotic signal streams,some chaotic cryptosystems were investigated.A mathematical model was then derived from these cryptosystems.Attack and corre-sponding improvement were deployed based on the model.The research is validated with a cryptanalysis on a chaotic en-cryption scheme presented by LI S J in Physics Letters A.
format Article
id doaj-art-56cae5d913dd45c3bc17a568fce126ac
institution Kabale University
issn 1000-436X
language zho
publishDate 2008-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-56cae5d913dd45c3bc17a568fce126ac2025-01-14T08:31:03ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-0113414074653542Security on a cryptographic model based on chaosWEI Jun1LIAO Xiao-feng2YANG Ji-yun2The application of chaos in cryptography has attracted much attention,however,most of them were cracked soon after publications.To find why they are so weak under the attack to their chaotic signal streams,some chaotic cryptosystems were investigated.A mathematical model was then derived from these cryptosystems.Attack and corre-sponding improvement were deployed based on the model.The research is validated with a cryptanalysis on a chaotic en-cryption scheme presented by LI S J in Physics Letters A.http://www.joconline.com.cn/zh/article/74653542/chaoscryptographyanalysismathematic model
spellingShingle WEI Jun1
LIAO Xiao-feng2
YANG Ji-yun2
Security on a cryptographic model based on chaos
Tongxin xuebao
chaos
cryptography
analysis
mathematic model
title Security on a cryptographic model based on chaos
title_full Security on a cryptographic model based on chaos
title_fullStr Security on a cryptographic model based on chaos
title_full_unstemmed Security on a cryptographic model based on chaos
title_short Security on a cryptographic model based on chaos
title_sort security on a cryptographic model based on chaos
topic chaos
cryptography
analysis
mathematic model
url http://www.joconline.com.cn/zh/article/74653542/
work_keys_str_mv AT weijun1 securityonacryptographicmodelbasedonchaos
AT liaoxiaofeng2 securityonacryptographicmodelbasedonchaos
AT yangjiyun2 securityonacryptographicmodelbasedonchaos