Cryptanalysis of a family of self-synchronizing chaotic stream ciphers

Saved in:
Bibliographic Details
Title: Cryptanalysis of a family of self-synchronizing chaotic stream ciphers
Authors: Arroyo, D, Alvarez, G, Amigo, JM, Li, SJ
Source: Communications in Nonlinear Science and Numerical Simulation. 16:805-813
Publication Status: Preprint
Publisher Information: Elsevier BV, 2011.
Publication Year: 2011
Subject Terms: Known-plaintext attack, 0103 physical sciences, Unimodal maps, Symbolic dynamics, Control parameter estimation, FOS: Physical sciences, Stream cipher, Chaotic Dynamics (nlin.CD), Nonlinear Sciences - Chaotic Dynamics, 01 natural sciences, Initial condition estimation
Description: Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map. In the present work a thorough analysis of the keystream is made which reveals the existence of some serious security problems
10 pages, 6 figures
Document Type: Article
File Description: text; application/pdf
Language: English
ISSN: 1007-5704
DOI: 10.1016/j.cnsns.2010.04.031
DOI: 10.48550/arxiv.0903.2928
Access URL: http://arxiv.org/pdf/0903.2928
http://arxiv.org/abs/0903.2928
http://kops.uni-konstanz.de/bitstream/123456789/6397/1/CNSNS2011a_12.pdf
https://arxiv.org/pdf/0903.2928v1
https://www.sciencedirect.com/science/article/pii/S1007570410002194
https://kops.uni-konstanz.de/handle/123456789/6397
https://ui.adsabs.harvard.edu/abs/2011CNSNS..16..805A/abstract
https://epubs.surrey.ac.uk/532419/1/CNSNS2011a.pdf
https://surrey.eprints-hosting.org/532419/
http://nbn-resolving.de/urn:nbn:de:bsz:352-opus-126542
Rights: Elsevier TDM
arXiv Non-Exclusive Distribution
Accession Number: edsair.doi.dedup.....649ab7a39abacb457869151c1df8beb9
Database: OpenAIRE
Description
Abstract:Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map. In the present work a thorough analysis of the keystream is made which reveals the existence of some serious security problems<br />10 pages, 6 figures
ISSN:10075704
DOI:10.1016/j.cnsns.2010.04.031