Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems

In recent years, a large amount of work on chaos-based cryptosystems have been published. However, many of the proposed schemes fail to explain or do not possess a number of features that are fundamentally important to all kind of cryptosystems. As a result, many proposed systems are difficult to implement in practice with a reasonable degree of security. Likewise, they are seldom accompanied by a thorough security analysis. Consequently, it is difficult for other researchers and end users to evaluate their security and performance. This work is intended to provide a common framework of basic guidelines that, if followed, could benefit every new cryptosystem. The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements. Meanwhile, several recommendations are made regarding some practical aspects of analog chaos-based secure communications, such as channel noise, limited bandwith and attenuation.

[1]  Hayes,et al.  Experimental control of chaos for communication. , 1994, Physical review letters.

[2]  D. R. Frey,et al.  Chaotic digital encoding: an approach to secure communication , 1993 .

[3]  Meng Zhan,et al.  Error function attack of chaos synchronization based encryption schemes. , 2003, Chaos.

[4]  Leon O. Chua,et al.  Spread Spectrum Communication Through Modulation of Chaos , 1993 .

[5]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[6]  A. Baranovsky,et al.  DESIGN OF ONE-DIMENSIONAL CHAOTIC MAPS WITH PRESCRIBED STATISTICAL PROPERTIES , 1995 .

[7]  Leon O. Chua,et al.  Spread spectrum Communication through modulation of Chaos in Chua's Circuit , 1993, Chua's Circuit.

[8]  Kevin M. Short,et al.  Steps Toward Unmasking Secure Communications , 1994 .

[9]  J. Cernák Digital generators of chaos , 1996 .

[10]  M. Baptista Cryptography with chaos , 1998 .

[11]  Alan V. Oppenheim,et al.  Synchronization of Lorenz-based chaotic circuits with applications to communications , 1993 .

[12]  Iwao Sasase,et al.  A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.

[13]  Ta-lun Yang,et al.  Breaking chaotic secure communication using a spectrogram , 1998 .

[14]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[15]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[16]  Bruce Schneier,et al.  Secrets and Lies: Digital Security in a Networked World , 2000 .

[17]  Marco Tomassini,et al.  Cryptography with cellular automata , 2001, Appl. Soft Comput..

[18]  U. Rajendra Acharya,et al.  Reliable and robust transmission and storage of medical images with patient information , 2004, 2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04..

[19]  Gelasio Salazar,et al.  A cryptosystem based on cellular automata. , 1998, Chaos.

[20]  Chao Tao,et al.  A New Approach to Breaking Down Chaotic Secure Communication , 2003, Int. J. Bifurc. Chaos.

[21]  G. Á. Marañón,et al.  Cryptanalysis of a novel cryptosystem based on chaotic oscillators and feedback inversion , 2003, nlin/0311042.

[22]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[23]  J. Yorke,et al.  Chaos: An Introduction to Dynamical Systems , 1997 .

[24]  Xiaowen Li,et al.  A new spatiotemporally chaotic cryptosystem and its security and performance analyses. , 2004, Chaos.

[25]  Kevin M. Short,et al.  Extraction of Signals from Chaotic Laser Data , 1999 .

[26]  G Alvarez,et al.  Estimating short-time period to break different types of chaotic modulation based secure communications , 2004, nlin/0406039.

[27]  P. G. Vaidya,et al.  Decoding chaotic cryptography without access to the superkey , 2003 .

[28]  Shujun Li,et al.  On the security of an image encryption method , 2002, Proceedings. International Conference on Image Processing.

[29]  C Zhou,et al.  Decoding information by following parameter modulation with parameter adaptive control. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[30]  Guanrong Chen,et al.  Chaos-Based Encryption for Digital Images and Videos , 2004 .

[31]  Leon O. Chua,et al.  Transmission of Digital signals by Chaotic Synchronization , 1992, Chua's Circuit.

[32]  K. Wong,et al.  A secure communication scheme based on the phase synchronization of chaotic systems. , 2003, Chaos.

[33]  Gonzalo Álvarez,et al.  Breaking network security based on synchronized chaos , 2004, Comput. Commun..

[34]  Gang Chen,et al.  Cryptanalysis of a New Signal Security System for Multimedia Data Transmission , 2005, EURASIP J. Adv. Signal Process..

[35]  Ute Feldmann,et al.  Communication by chaotic signals: the inverse system approach , 1995, Proceedings of ISCAS'95 - International Symposium on Circuits and Systems.

[36]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[37]  Martin Hasler,et al.  Synchronization of chaotic systems and transmission of information , 1998 .

[38]  Soo-Chang Pei,et al.  Generating Chaotic Stream Ciphers Using Chaotic Systems , 2003 .

[39]  U. Parlitz,et al.  A SIMPLE METHOD TO REVEAL THE PARAMETERS OF THE LORENZ SYSTEM , 1996 .

[40]  Zhen Ji,et al.  Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems , 2003, Int. J. Bifurc. Chaos.

[41]  Tamar Frankel [The theory and the practice...]. , 2001, Tijdschrift voor diergeneeskunde.

[42]  G. Álvarez,et al.  Cryptanalysis of a chaotic encryption system , 2000 .

[43]  Xuanqin Mou,et al.  Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.

[44]  Gonzalo Alvarez,et al.  Keystream cryptanalysis of a chaotic cryptographic method , 2004 .

[45]  Xiaofeng Liao,et al.  A novel method for designing S-boxes based on chaotic maps , 2005 .

[46]  M. Bernhard Introduction to Chaotic Dynamical Systems , 1992 .

[47]  Shujun Li,et al.  Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher , 2004, ISNN.

[48]  Michael Peter Kennedy,et al.  Chaos shift keying : modulation and demodulation of a chaotic carrier using self-sychronizing chua"s circuits , 1993 .

[49]  Miguel Romera,et al.  Cryptanalyzing a discrete-time chaos synchronization secure communication system , 2003, nlin/0311046.

[50]  Kenneth D. Lawrence,et al.  Modern Statistical Systems and GPSS Simulation , 1992 .

[51]  Kwok-Wo Wong,et al.  An efficient entire chaos-based scheme for deniable authentication , 2005 .

[52]  Eli Biham,et al.  Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.

[53]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[54]  Guanrong Chen,et al.  Cryptanalysis of RCES/RSES Image Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..

[55]  G. Álvarez,et al.  Cryptanalyzing an improved security modulated chaotic encryption scheme using ciphertext absolute value , 2004, nlin/0406065.

[56]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[57]  S. M. Shahruz,et al.  Design of a novel cryptosystem based on chaotic oscillators and feedback inversion , 2002, Proceedings of the 2003 American Control Conference, 2003..

[58]  Leon O. Chua,et al.  Secure communication via chaotic parameter modulation , 1996 .

[59]  Ta-lun Yang,et al.  Breaking chaotic switching using generalized synchronization: examples , 1998 .

[60]  Tao Yang,et al.  Recovery of digital signals from chaotic switching , 1995, Int. J. Circuit Theory Appl..

[61]  Leon O. Chua,et al.  Experimental Demonstration of Secure Communications via Chaotic Synchronization , 1992, Chua's Circuit.

[62]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[63]  Li-Hai Zhou,et al.  A new idea of using one-dimensional PWL map in digital secure communications-dual-resolution approach , 2000 .

[64]  Eli Biham,et al.  Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91 , 1991, EUROCRYPT.

[65]  A. M. Young,et al.  Introduction to chaos-based communications and signal processing , 2000, 2000 IEEE Aerospace Conference. Proceedings (Cat. No.00TH8484).

[66]  Feng Bao,et al.  Cryptanalysis of a New Cellular Automata Cryptosystem , 2003, ACISP.

[67]  Maciej Ogorzalek,et al.  Identification of chaotic systems based on adaptive synchronization , 1997 .

[68]  K. Wong,et al.  A Modified Chaotic Cryptographic Method , 2001, Communications and Multimedia Security.

[69]  Kevin M. Short,et al.  Signal Extraction from Chaotic Communications , 1997 .

[70]  Ying-Cheng Lai,et al.  Communicating with chaos using two-dimensional symbolic dynamics , 1999 .

[71]  Yu Zhang,et al.  Decoding Digital Information from the Cascaded Heterogeneous Chaotic Systems , 2003, Int. J. Bifurc. Chaos.

[72]  G Alvarez,et al.  Breaking a secure communication scheme based on the phase synchronization of chaotic systems. , 2003, Chaos.

[73]  Grebogi,et al.  Communicating with chaos. , 1993, Physical review letters.

[74]  Chang-song Zhou,et al.  Extracting information masked by chaos and contaminated with noise: Some considerations on the security of communication approaches using chaos , 1997 .

[75]  Tao Yang,et al.  A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .

[76]  G. Álvarez,et al.  Cryptanalysis of an ergodic chaotic cipher , 2003 .

[77]  Chai Wah Wu,et al.  A Simple Way to Synchronize Chaotic Systems with Applications to , 1993 .

[78]  Ali A. Minai,et al.  Communicating with noise: How chaos and noise combine to generate secure encryption keys. , 1998, Chaos.

[79]  S. Li,et al.  Breaking an encryption scheme based on chaotic baker map , 2004, Physics Letters.

[80]  Guanrong Chen,et al.  Cryptanalysis of a multistage encryption system , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[81]  Cuomo,et al.  Circuit implementation of synchronized chaos with applications to communications. , 1993, Physical review letters.

[82]  L. Tsimring,et al.  Generalized synchronization of chaos in directionally coupled chaotic systems. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[83]  P. García,et al.  Communication through chaotic map systems , 2002 .

[84]  X. Mou,et al.  On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .

[85]  Guanrong Chen,et al.  Breaking a chaos-noise-based secure communication scheme. , 2004, Chaos.

[86]  Guanrong Chen,et al.  Breaking a chaos-based secure communication scheme designed by an improved modulation method , 2004, nlin/0411007.

[87]  Chun-Mei Yang,et al.  Cryptanalyzing chaotic secure communications using return maps , 1998 .

[88]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[89]  Gonzalo Alvarez,et al.  Chaotic cryptosystems , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[90]  Pérez,et al.  Extracting messages masked by chaos. , 1995, Physical review letters.

[91]  Ljupco Kocarev,et al.  Cryptographically secure substitutions based on the approximation of mixing maps , 2005, IEEE Transactions on Circuits and Systems I: Regular Papers.

[92]  Guanrong Chen,et al.  Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme , 2004, PCM.

[93]  S. Bowong Stability analysis for the synchronization of chaotic systems with different order: application to secure communications , 2004 .

[94]  M. Feki An adaptive chaos synchronization scheme applied to secure communication , 2003 .

[95]  G. Álvarez,et al.  Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .

[96]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[97]  Zhi-Hong Guan,et al.  Cryptosystem using chaotic keys , 2005 .

[98]  Kevin M. Short,et al.  UNMASKING A HYPERCHAOTIC COMMUNICATION SCHEME , 1998 .

[99]  Ö. Morgül,et al.  A chaotic masking scheme by using synchronized chaotic systems , 1999 .

[100]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[101]  Gonzalo Álvarez,et al.  Breaking two secure communication systems based on chaotic masking , 2004, IEEE Transactions on Circuits and Systems II: Express Briefs.

[102]  Changchun Hua,et al.  A new chaotic secure communication scheme , 2005 .

[103]  Donghui Guo,et al.  A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks , 2004, Applied Intelligence.

[104]  K. Aihara,et al.  Cryptosystems with discretized chaotic maps , 2002 .

[105]  Hu Guojie,et al.  Chosen ciphertext attack on chaos communication based on chaotic synchronization , 2003 .

[106]  Kevin M. Short,et al.  UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME , 1996 .

[107]  Debin Huang Synchronization-based estimation of all parameters of chaotic systems from time series. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[108]  Z. Ji,et al.  Cryptanalysis of a Class of Chaotic Stream Ciphers (一类混沌流密码的分析) , 2003 .

[109]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[110]  Gonzalo Álvarez,et al.  Breaking cryptography with chaos at the physical level , 2004 .

[111]  Qurban A. Memon Synchronized chaos for network security , 2003, Comput. Commun..

[112]  Kwok-Wo Wong,et al.  Baptista-type chaotic cryptosystems: problems and countermeasures , 2004, Physics Letters A.

[113]  Lingfeng Liu,et al.  Estimating system parameters of Chua's circuit from synchronizing signal , 2004 .

[114]  Sang Tao,et al.  Perturbance-based algorithm to expand cycle length of chaotic key stream , 1998 .

[115]  Z. Hong,et al.  Generating Chaotic Secure Sequences with Desired Statistical Properties and High Security , 1997 .

[116]  G. Álvarez,et al.  Breaking parameter modulated chaotic secure communication system , 2003, nlin/0311041.

[117]  E. Alvarez,et al.  New approach to chaotic encryption , 1999 .

[118]  Gonzalo Álvarez,et al.  Return-Map Cryptanalysis Revisited , 2005, Int. J. Bifurc. Chaos.

[119]  Guanrong Chen,et al.  On the security of the Yi-Tan-Siew chaotic cipher , 2004, IEEE Transactions on Circuits and Systems II: Express Briefs.

[120]  Ljupco Kocarev,et al.  From chaotic maps to encryption schemes , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).

[121]  Carlo Harpes,et al.  A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma , 1995, EUROCRYPT.

[122]  Thomas Beth,et al.  Cryptanalysis of Cryptosystems Based on Remote Chaos Replication , 1994, CRYPTO.

[123]  Kevin M. Short,et al.  Reconstructing the keystream from a chaotic encryption scheme , 2001 .

[124]  Hong Zhou,et al.  Problems with the chaotic inverse system encryption approach , 1997 .

[125]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[126]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[127]  Anastasios Bezerianos,et al.  A Probabilistic Symmetric Encryption Scheme for Very Fast Secure Communication Based on Chaotic Systems of difference equations , 2001, Int. J. Bifurc. Chaos.

[128]  David Thomas,et al.  The Art in Computer Programming , 2001 .

[129]  Gonzalo Alvarez,et al.  Cryptanalysis of a chaotic secure communication system , 2003 .

[130]  Gonzalo Alvarez,et al.  Security analysis of communication system based on the synchronization of different order chaotic systems , 2005, nlin/0506056.

[131]  Gonzalo Alvarez,et al.  Breaking projective chaos synchronization secure communication using filtering and generalized synchronization , 2004, Chaos, Solitons & Fractals.