An efficient cryptanalysis of a chaotic cryptosystem and its improvement

Recently, a new block encryption system has been proposed based on iterating a logistic map. This paper studies the security of the new encryption scheme and reports the following findings: (1) the sub-keys of any ciphertext can be obtained by using only two chosen ciphertexts; (2) the underlying chaotic key stream sequence can be reconstructed as an equivalent key by some chosen plaintext and ciphertext pairs. Experimental results are given to demonstrate the feasibility of the proposed attacks. Furthermore, a remedial improvement is suggested, which avoids the flaws while keeping all the merits of the original cryptosystem.

[1]  A. Palacios,et al.  Cryptography with cycling chaos , 2002 .

[2]  Rhouma Rhouma,et al.  Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem , 2008 .

[3]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[4]  Ljupco Kocarev,et al.  Analysis of some recently proposed chaos-based encryption algo-rithms , 2001 .

[5]  K. Wong,et al.  A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .

[6]  X. Liao,et al.  Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map , 2007 .

[7]  P. García,et al.  Communication through chaotic map systems , 2002 .

[8]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[9]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[10]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[11]  M. Baptista Cryptography with chaos , 1998 .

[12]  Gonzalo Alvarez,et al.  Keystream cryptanalysis of a chaotic cryptographic method , 2004 .

[13]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[14]  X. Liao,et al.  A novel block cryptosystem based on iterating a chaotic map , 2006 .

[15]  Gonzalo Alvarez,et al.  Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.

[16]  K. Wong,et al.  A Modified Chaotic Cryptographic Method , 2001, Communications and Multimedia Security.