On the inadequacy of the logistic map for cryptographic applications

This paper analyzes the use of the logistic map for cryptographic applications. The most important characteristics of the logistic map are shown in order to prove the inconvenience of considering this map in the design of new chaotic cryptosystems.

[1]  Gonzalo Alvarez,et al.  Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.

[2]  Carroll,et al.  Synchronization in chaotic systems. , 1990, Physical review letters.

[3]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[4]  A. Pisarchik,et al.  Encryption and decryption of images with chaotic map lattices. , 2006, Chaos.

[5]  G. Álvarez,et al.  Cryptanalysis of a chaotic encryption system , 2000 .

[6]  Osvaldo A. Rosso,et al.  Generalized statistical complexity measures: Geometrical and analytical properties , 2006 .

[7]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[8]  G. Álvarez,et al.  Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  X. Liao,et al.  A novel chaotic encryption scheme based on arithmetic coding , 2008 .

[11]  X. Liao,et al.  A novel block cryptosystem based on iterating a chaotic map , 2006 .

[12]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[13]  L. Kocarev,et al.  Logistic map as a block encryption algorithm , 2001 .

[14]  Xiaogang Wu,et al.  Parameter estimation only from the symbolic sequences generated by chaos system , 2004 .

[15]  X. Liao,et al.  Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map , 2007 .

[16]  E. Alvarez,et al.  New approach to chaotic encryption , 1999 .

[17]  Zhi-Hong Guan,et al.  Cryptosystem using chaotic keys , 2005 .

[18]  L. P. L. D. Oliveira,et al.  Cryptography with chaotic mixing , 2008 .

[19]  Ljupco Kocarev,et al.  Analysis of some recently proposed chaos-based encryption algo-rithms , 2001 .

[20]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[21]  Shihong Wang,et al.  Chaos-based cryptograph incorporated with S-box algebraic operation , 2003 .

[22]  Vinod Patidar,et al.  Cryptography using multiple one-dimensional chaotic maps , 2005 .

[23]  X. Liao,et al.  Analysis and improvement for the performance of Baptista's cryptographic scheme , 2006 .

[24]  Tao Xiang,et al.  A novel symmetrical cryptosystem based on discretized two-dimensional chaotic map , 2007 .

[25]  S. Wiggins Introduction to Applied Nonlinear Dynamical Systems and Chaos , 1989 .

[26]  David Arroyo,et al.  Application of Gray code to the cryptanalysis of chaotic cryptosystems , 2007 .

[27]  Miguel Romera,et al.  A revision of the Lyapunov exponent in 1D quadratic maps , 1997 .

[28]  G. Álvarez,et al.  Cryptanalysis of an ergodic chaotic cipher , 2003 .

[29]  R. Steuer,et al.  Entropy and optimal partition for data analysis , 2001 .

[30]  X. Liao,et al.  A new chaotic cryptosystem , 2006 .

[31]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[32]  E. Basar,et al.  Wavelet entropy: a new tool for analysis of short duration brain electrical signals , 2001, Journal of Neuroscience Methods.

[33]  Nicholas C. Metropolis,et al.  On Finite Limit Sets for Transformations on the Unit Interval , 1973, J. Comb. Theory A.

[34]  Kwok-Wo Wong,et al.  Baptista-type chaotic cryptosystems: problems and countermeasures , 2004, Physics Letters A.