z-logo
open-access-imgOpen Access
Security of chaos-based secure communications in a large community
Author(s) -
Kai Wang,
Wei Pei,
Jiantao Zhou,
Yifeng Zhang,
Siyuan Zhou
Publication year - 2011
Publication title -
wuli xuebao
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.199
H-Index - 47
ISSN - 1000-3290
DOI - 10.7498/aps.60.070503
Subject(s) - cryptosystem , computer science , chaos (operating system) , chaotic , secure communication , dependency (uml) , constant (computer programming) , scheme (mathematics) , simple (philosophy) , key (lock) , cryptography , encryption , theoretical computer science , algorithm , computer security , mathematics , artificial intelligence , mathematical analysis , philosophy , epistemology , programming language
In this paper, we present an attack on a cryptosystem designed by using a spatiotemporal chaotic system. We show that the decryption system proposed in (Phys. Rev. E 66, 065202 (2002)) degenerates to the one-dimensional map under the constant input, and it is insensitive to the slight perturbations to input in specially selected intervals. Consequently, the attacker can use a very simple optimization algorithm to obtain the proper input value within only hundreds of iterations. Furthermore, we prove that there exits a linear dependency between the secret key and the obtained input value, so that the attacker can break this spatiotemporal chaos-based secure communication scheme easily. Both theoretical and experimental results show that the lack of security discourages the use of these cryptosystems for practical application.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here