Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations

Nonlinear Sciences – Chaotic Dynamics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

17 pages, 8 figures

Scientific paper

10.1016/j.physleta.2007.04.023

Recently two encryption schemes were proposed by combining circular bit shift and XOR operations, under the control of a pseudorandom bit sequence (PRBS) generated from a chaotic system. This paper studies the security of these two encryption schemes and reports the following findings: 1) there exist some security defects in both schemes; 2) the underlying chaotic PRBS can be reconstructed as an equivalent key by using only two chosen plaintexts; 3) most elements in the underlying chaotic PRBS can be obtained by a differential known-plaintext attack using only two known plaintexts. Experimental results are given to demonstrate the feasibility of the proposed attack.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-407942

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.