Skip to main content

Cryptanalysis of Chaotic Ciphers

  • Chapter
Chaos-Based Cryptography

Part of the book series: Studies in Computational Intelligence ((SCI,volume 354))

Introduction

Cryptanalysis is an integral part of any serious effort in designing secure encryption algorithms. Indeed, a cryptosystem is only as secure as the most powerful known attack that failed to break it. The situation is not different for chaos-based ciphers. Before attempting to design a new chaotic cipher, it is essential that the designers have a thorough grasp of the existing attacks and cryptanalysis tools.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Alvarez, G., Li, S.J.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcation Chaos 16(8), 2129–2151 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  • Amig, J.M., Kocarev, L., Szczepanski, J.: Theory and practice of chaotic cryptography. Physics Letters A 366(3), 211–216 (2007), ISSN 0375-9601

    Google Scholar 

  • Anstett, F., Millerioux, G., Bloch, G.: Chaotic cryptosystems: Cryptanalysis and identifiability. IEEE Tran. Circuits and Systems I-Regular Papers 53(12), 2673–2680 (2006), ISSN 1057-7122

    Article  MathSciNet  Google Scholar 

  • Çokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A 373(15), 1357–1360 (2009) ISSN 0375-9601

    Google Scholar 

  • Dachselt, F., Schwarz, W.: Chaos and cryptography. IEEE Tran. Circuits and Systems I - Fundamental Theory and Applications 48(12), 1498–1509 (2001), ISSN 1057-7122

    Article  MathSciNet  MATH  Google Scholar 

  • Fraleigh, J.B.: A First Course in Abstract Algebra. Addison Wesley, Reading (2002)

    Google Scholar 

  • Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8(6), 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  • Guan, Z.-H., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Physics Letters A 346(1-3), 153–157 (2005), ISSN 0375-9601, doi:10.1016/j.physleta.2005.08.006

    Google Scholar 

  • Huang, C.K., Nien, H.H.: Multi chaotic systems based pixel shuffle for image encryption. Optics Communications 282(11), 2123–2127 (2009), ISSN 0030-4018, doi:10.1016/j.optcom.2009.02.044

    Google Scholar 

  • Kocarev, L., Jakimoski, G.: Pseudorandom bits generated by chaotic maps. IEEE Tran. Circuits and Systems I - Fundamental Theory and Applications 50(1), 123–126 (2003), ISSN 1057-7122

    Article  MathSciNet  Google Scholar 

  • Li, S., Li, C., Chen, G., Bourbakis, N.G., Lo, K.-T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing: Image Communication 23(3), 212–223 (2008), ISSN 0923-5965, doi:10.1016/j.image.2008.01.003

    Google Scholar 

  • Lovasz, L.: Combinatorial Problems and Exercises. AMS, Providence (2007)

    MATH  Google Scholar 

  • Masuda, N., Jakimoski, G., Aihara, K., Kocarev, L.: Chaotic block ciphers: From theory to practical algorithms. IEEE Tran. Circuits and Systems I-Regular Papers 53(6), 1341–1352 (2006), ISSN 1057-7122

    Article  MathSciNet  Google Scholar 

  • Patidar, V., Pareek, N.K., Sud, K.K.: A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Communications in Nonlinear Science and Numerical Simulation 14(7), 3056–3075 (2009), ISSN 1007-5704, doi:10.1016/j.cnsns.2008.11.005

    Google Scholar 

  • Pisarchik, A.N., Flores-Carmona, N.J., Carpio-Valadez, M.: Encryption and decryption of images with chaotic map lattices. Chaos 16(3), 033118 (2006)

    Article  MathSciNet  Google Scholar 

  • Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Communications in Nonlinear Science and Numerical Simulation 15(7), 1887 (2010)

    Article  MathSciNet  Google Scholar 

  • Solak, E., Cokal, C., Yildiz, O.T., Biyikoglu, T.: Cryptanalysis of fridrich’s chaotic image encryption. Int. J. Bifurcation Chaos 20(5), 1405–1413 (2010a)

    Article  MathSciNet  MATH  Google Scholar 

  • Solak, E., Çokal, C.: Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps. Physics Letters A 372(46), 6922–6924 (2008)

    Article  MathSciNet  Google Scholar 

  • Solak, E., Çokal, C.: Algebraic break of a cryptosystem based on discretized two-dimensional chaotic maps. Physics Letters A 373(15), 1352–1356 (2009)

    Article  MathSciNet  Google Scholar 

  • Solak, E., \c{C}okal, C.: Algebraic break of image ciphers based on discretized chaotic map lattices. Information Sciences 181(1), 227–233 (2011)

    Article  MathSciNet  Google Scholar 

  • Solak, E., Rhouma, R., Belghith, S.: Cryptanalysis of a multi-chaotic systems based image cryptosystem. Optics Communications 283(2), 232–236 (2010b)

    Article  Google Scholar 

  • Xiang, T., Wong, K.-W., Liao, X.: A novel symmetrical cryptosystem based on discretized two-dimensional chaotic map. Physics Letters A 364(3-4), 252–258 (2007)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Solak, E. (2011). Cryptanalysis of Chaotic Ciphers. In: Kocarev, L., Lian, S. (eds) Chaos-Based Cryptography. Studies in Computational Intelligence, vol 354. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20542-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20542-2_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20541-5

  • Online ISBN: 978-3-642-20542-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics