z-logo
open-access-imgOpen Access
Cryptanalysis of multiple chaotic systems based public key encryption technique
Author(s) -
Kai Wang,
Wei Pei,
Liuhua Zou,
Zhenya He
Publication year - 2006
Publication title -
wuli xuebao
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.199
H-Index - 47
ISSN - 1000-3290
DOI - 10.7498/aps.55.6243
Subject(s) - computer science , cryptosystem , cryptanalysis , key (lock) , key exchange , linear cryptanalysis , encryption , key generation , key space , chaotic , theoretical computer science , public key cryptography , key size , algorithm , computer security , artificial intelligence
A novel public key encryption technique based on multiple chaotic systems has been proposed. This scheme employs m-chaotic systems and a set of linear functions for key exchange over an insecure channel. The security of the proposed algorithm grows as (NP)m, where N, P are the size of the key and the computational complexity of the linear functions, respectively. In this paper, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the fact that any complex linear transformations on a vector will make the norm of the vector approximate linear growth, we present an attack that permits recovering the corresponding secret key from the public key and the initial value. Both theoretical and experimental results show that the attacker can access the secret key without any difficulty. The lack of security discourages the use of such algorithm for practical applications.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here