Computer Science – Cryptography and Security
Scientific paper
2004-02-24
IEEE Trans. CAS-II, vol. 51, no. 12, pp. 665-669, 2004
Computer Science
Cryptography and Security
5 pages, 3 figures, IEEEtrans.cls v 1.6
Scientific paper
10.1109/TCSII.2004.838657
This paper presents a comprehensive analysis on the security of the Yi-Tan-Siew chaotic cipher proposed in [IEEE TCAS-I 49(12):1826-1829 (2002)]. A differential chosen-plaintext attack and a differential chosen-ciphertext attack are suggested to break the sub-key K, under the assumption that the time stamp can be altered by the attacker, which is reasonable in such attacks. Also, some security Problems about the sub-keys $\alpha$ and $\beta$ are clarified, from both theoretical and experimental points of view. Further analysis shows that the security of this cipher is independent of the use of the chaotic tent map, once the sub-key $K$ is removed via the proposed suggested differential chosen-plaintext attack.
Chen Guanrong
Li Shujun
Mou Xuanqin
No associations
LandOfFree
On the Security of the Yi-Tan-Siew Chaos-Based Cipher does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with On the Security of the Yi-Tan-Siew Chaos-Based Cipher, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and On the Security of the Yi-Tan-Siew Chaos-Based Cipher will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-352219