Security on a cryptographic model based on chaos
The application of chaos in cryptography has attracted much attention,however,most of them were cracked soon after publications.To find why they are so weak under the attack to their chaotic signal streams,some chaotic cryptosystems were investigated.A mathematical model was then derived from these...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2008-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74653542/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537538143027200 |
---|---|
author | WEI Jun1 LIAO Xiao-feng2 YANG Ji-yun2 |
author_facet | WEI Jun1 LIAO Xiao-feng2 YANG Ji-yun2 |
author_sort | WEI Jun1 |
collection | DOAJ |
description | The application of chaos in cryptography has attracted much attention,however,most of them were cracked soon after publications.To find why they are so weak under the attack to their chaotic signal streams,some chaotic cryptosystems were investigated.A mathematical model was then derived from these cryptosystems.Attack and corre-sponding improvement were deployed based on the model.The research is validated with a cryptanalysis on a chaotic en-cryption scheme presented by LI S J in Physics Letters A. |
format | Article |
id | doaj-art-56cae5d913dd45c3bc17a568fce126ac |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2008-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-56cae5d913dd45c3bc17a568fce126ac2025-01-14T08:31:03ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-0113414074653542Security on a cryptographic model based on chaosWEI Jun1LIAO Xiao-feng2YANG Ji-yun2The application of chaos in cryptography has attracted much attention,however,most of them were cracked soon after publications.To find why they are so weak under the attack to their chaotic signal streams,some chaotic cryptosystems were investigated.A mathematical model was then derived from these cryptosystems.Attack and corre-sponding improvement were deployed based on the model.The research is validated with a cryptanalysis on a chaotic en-cryption scheme presented by LI S J in Physics Letters A.http://www.joconline.com.cn/zh/article/74653542/chaoscryptographyanalysismathematic model |
spellingShingle | WEI Jun1 LIAO Xiao-feng2 YANG Ji-yun2 Security on a cryptographic model based on chaos Tongxin xuebao chaos cryptography analysis mathematic model |
title | Security on a cryptographic model based on chaos |
title_full | Security on a cryptographic model based on chaos |
title_fullStr | Security on a cryptographic model based on chaos |
title_full_unstemmed | Security on a cryptographic model based on chaos |
title_short | Security on a cryptographic model based on chaos |
title_sort | security on a cryptographic model based on chaos |
topic | chaos cryptography analysis mathematic model |
url | http://www.joconline.com.cn/zh/article/74653542/ |
work_keys_str_mv | AT weijun1 securityonacryptographicmodelbasedonchaos AT liaoxiaofeng2 securityonacryptographicmodelbasedonchaos AT yangjiyun2 securityonacryptographicmodelbasedonchaos |