Search

Article

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

Cryptanalysis of multiple chaotic systems based public key encryption technique

Wang Kai Pei Wen-Jiang Zou Liu-Hua He Zhen-Ya

Citation:

Cryptanalysis of multiple chaotic systems based public key encryption technique

Wang Kai, Pei Wen-Jiang, Zou Liu-Hua, He Zhen-Ya
PDF
Get Citation

(PLEASE TRANSLATE TO ENGLISH

BY GOOGLE TRANSLATE IF NEEDED.)

  • A novel public key encryption technique based on multiple chaotic systems has been proposed. This scheme employs m-chaotic systems and a set of linear functions for key exchange over an insecure channel. The security of the proposed algorithm grows as (NP)m, where N, P are the size of the key and the computational complexity of the linear functions, respectively. In this paper, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the fact that any complex linear transformations on a vector will make the norm of the vector approximate linear growth, we present an attack that permits recovering the corresponding secret key from the public key and the initial value. Both theoretical and experimental results show that the attacker can access the secret key without any difficulty. The lack of security discourages the use of such algorithm for practical applications.
Metrics
  • Abstract views:  7216
  • PDF Downloads:  1355
  • Cited By: 0
Publishing process
  • Received Date:  08 April 2006
  • Accepted Date:  16 June 2006
  • Published Online:  05 June 2006

/

返回文章
返回