Cryptanalysis of a Cryptographic Algorithm that Utilizes Chaotic Neural Networks

This paper deals with the security and efficiency issues of a cryptographic algorithm which utilizes the principles of Chaotic Neural Network (CNN). The algorithm that we consider is the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the Delayed CNN. Although the cryptographic algorithm has its own salient characteristics, our analysis show that, unfortunately, the DCBE is not secure since it is not capable of resisting known-plaintext, chosen-plaintext, and chosen-ciphertext attacks. Furthermore, unfortunately, the scheme is not efficient either, because of the large number of iteration steps involved in its implementation.

[1]  Ashraf A. Zaher,et al.  On the design of chaos-based secure communication systems , 2011 .

[2]  G. Álvarez,et al.  Cryptanalysis of a chaotic encryption system , 2000 .

[3]  Jian Xu,et al.  Chaotic and Hyperchaotic Attractors in Time-Delayed Neural Networks , 2009, Complex.

[4]  Ali Kanso,et al.  Keyed hash function based on a chaotic map , 2012, Inf. Sci..

[5]  Di Xiao,et al.  A novel Hash algorithm construction based on chaotic neural network , 2011, Neural Computing and Applications.

[6]  M. Baptista Cryptography with chaos , 1998 .

[7]  Ljupco Kocarev,et al.  Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[8]  Jinde Cao,et al.  Cryptography based on delayed chaotic neural networks , 2006 .

[9]  Gao Tiegang,et al.  One-way hash function based on hyper-chaotic cellular neural network , 2008 .

[10]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[11]  Sean Murphy,et al.  Henon stream cipher , 1992 .

[12]  Hongtao Lu Chaotic attractors in delayed neural networks , 2002 .

[13]  E. Alvarez,et al.  New approach to chaotic encryption , 1999 .

[14]  Liu Nai-qi,et al.  A novel group key management based on Jacobian Elliptic Chebyshev rational map , 2007 .

[15]  A. Kanso,et al.  A novel image encryption algorithm based on a 3D chaotic map , 2012 .

[16]  Wolfgang Kinzel,et al.  Public-channel cryptography using chaos synchronization. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[17]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[18]  Wang Zhi-quan,et al.  One-way Hash function based on chaotic neural network , 2006 .

[19]  L. Kocarev,et al.  Chaos-based random number generators-part I: analysis [cryptography] , 2001 .