{"title":"Cryptanalysis of a chaos-based encryption algorithm for distributed systems","authors":"D. Caragata, Karim Tabia, M. Luduena","doi":"10.1109/ICITST.2013.6750157","DOIUrl":null,"url":null,"abstract":"This paper analyses the security of a recently proposed chaos based cryptosystem. It shows that the cryptosystem under study has weak diffusion and presents a cryptanalysis that allows the attacker to decrypt any encrypted image. More precisely, it proposes a divide-and-conquer attack that allows an attacker to recover the internal states of the cryptosystem and to use them in order to encrypt or decrypt any image. Experimental results demonstrate the effectiveness of the attack and the lack of diffusion of the cryptosystem. Finally, a solution is proposed that can increment the security of the cryptosystem and render the cryptanalysis ineffective.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2013.6750157","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper analyses the security of a recently proposed chaos based cryptosystem. It shows that the cryptosystem under study has weak diffusion and presents a cryptanalysis that allows the attacker to decrypt any encrypted image. More precisely, it proposes a divide-and-conquer attack that allows an attacker to recover the internal states of the cryptosystem and to use them in order to encrypt or decrypt any image. Experimental results demonstrate the effectiveness of the attack and the lack of diffusion of the cryptosystem. Finally, a solution is proposed that can increment the security of the cryptosystem and render the cryptanalysis ineffective.