{"title":"分布式系统中基于混沌的加密算法的密码分析","authors":"D. Caragata, Karim Tabia, M. Luduena","doi":"10.1109/ICITST.2013.6750157","DOIUrl":null,"url":null,"abstract":"This paper analyses the security of a recently proposed chaos based cryptosystem. It shows that the cryptosystem under study has weak diffusion and presents a cryptanalysis that allows the attacker to decrypt any encrypted image. More precisely, it proposes a divide-and-conquer attack that allows an attacker to recover the internal states of the cryptosystem and to use them in order to encrypt or decrypt any image. Experimental results demonstrate the effectiveness of the attack and the lack of diffusion of the cryptosystem. Finally, a solution is proposed that can increment the security of the cryptosystem and render the cryptanalysis ineffective.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cryptanalysis of a chaos-based encryption algorithm for distributed systems\",\"authors\":\"D. Caragata, Karim Tabia, M. Luduena\",\"doi\":\"10.1109/ICITST.2013.6750157\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper analyses the security of a recently proposed chaos based cryptosystem. It shows that the cryptosystem under study has weak diffusion and presents a cryptanalysis that allows the attacker to decrypt any encrypted image. More precisely, it proposes a divide-and-conquer attack that allows an attacker to recover the internal states of the cryptosystem and to use them in order to encrypt or decrypt any image. Experimental results demonstrate the effectiveness of the attack and the lack of diffusion of the cryptosystem. Finally, a solution is proposed that can increment the security of the cryptosystem and render the cryptanalysis ineffective.\",\"PeriodicalId\":246884,\"journal\":{\"name\":\"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITST.2013.6750157\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2013.6750157","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptanalysis of a chaos-based encryption algorithm for distributed systems
This paper analyses the security of a recently proposed chaos based cryptosystem. It shows that the cryptosystem under study has weak diffusion and presents a cryptanalysis that allows the attacker to decrypt any encrypted image. More precisely, it proposes a divide-and-conquer attack that allows an attacker to recover the internal states of the cryptosystem and to use them in order to encrypt or decrypt any image. Experimental results demonstrate the effectiveness of the attack and the lack of diffusion of the cryptosystem. Finally, a solution is proposed that can increment the security of the cryptosystem and render the cryptanalysis ineffective.