Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers

The idea of using chaotic transformations in cryptography is explicit in the foundational papers of Shannon on secrecy systems (e.g., [96]). Although the word “chaos” was not minted till the 1970s [71], Shannon clearly refers to this very concept when he proposes the construction of secure ciphers by means of measure-preserving, mixing maps which depend ‘sensitively’ on their parameters. The implementation of Shannon’s intuitions had to wait till the development of Chaos Theory in the 1980s. Indeed, it was around 1990 when the first chaos-based ciphers were proposed (e.g., [78], [46]). Moreover, in 1990 chaos synchronization [91] entered the scene and shortly thereafter, the first applications to secure communications followed [56, 37]. The idea is remarkably simple: mask the message with a chaotic signal and use synchronization at the receiver to filter out the chaotic signal. The realization though had to overcome the desynchronization induced by the message itself. After this initial stage, the number of proposals which exploited the properties of chaotic maps for cryptographical purposes, grew in a spectacular way.

[1]  Maciej Ogorzalek,et al.  Identification of chaotic systems based on adaptive synchronization , 1997 .

[2]  Chao Tao,et al.  A New Approach to Breaking Down Chaotic Secure Communication , 2003, Int. J. Bifurc. Chaos.

[3]  Leon O. Chua,et al.  Transmission of Digital signals by Chaotic Synchronization , 1992, Chua's Circuit.

[4]  Gonzalo Alvarez,et al.  Cryptanalysis of a discrete-time synchronous chaotic encryption system , 2008 .

[5]  José M. Amigó,et al.  Chaos-Based Cryptography , 2009, Intelligent Computing Based on Chaos.

[6]  Gonzalo Alvarez,et al.  Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.

[7]  Shujun Li,et al.  Analyses and New Designs of Digital Chaotic Ciphers , 2003 .

[8]  Daolin Xu,et al.  Chaotic encryption using discrete-time synchronous chaos , 2006 .

[9]  Lingfeng Liu,et al.  Estimating system parameters of Chua's circuit from synchronizing signal , 2004 .

[10]  Ta-lun Yang,et al.  Breaking chaotic switching using generalized synchronization: examples , 1998 .

[11]  Zengqiang Chen,et al.  Image encryption based on a new total shuffling algorithm , 2008 .

[12]  Chao Tao,et al.  Theoretical and experimental studies of parameter estimation based on chaos feedback synchronization. , 2006, Chaos.

[13]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[14]  Gonzalo Alvarez,et al.  A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis , 2010, Communications in Nonlinear Science and Numerical Simulation.

[15]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[16]  S. Li,et al.  Breaking an encryption scheme based on chaotic baker map , 2004, Physics Letters.

[17]  Leon O. Chua,et al.  Cryptography based on chaotic systems , 1997 .

[18]  Gonzalo Alvarez,et al.  Keystream cryptanalysis of a chaotic cryptographic method , 2004 .

[19]  G. Álvarez,et al.  Breaking parameter modulated chaotic secure communication system , 2003, nlin/0311041.

[20]  S. V. Fomin,et al.  Ergodic Theory , 1982 .

[21]  Alan V. Oppenheim,et al.  Synchronization of Lorenz-based chaotic circuits with applications to communications , 1993 .

[22]  Donald W. Davies,et al.  Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.

[23]  Wolfgang A. Halang,et al.  Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm , 2007, ArXiv.

[24]  Massimo Alioto,et al.  A Class of Maximum-Period Nonlinear Congruential Generators Derived From the Rényi Chaotic Map , 2007, IEEE Transactions on Circuits and Systems I: Regular Papers.

[25]  U. Rajendra Acharya,et al.  Reliable and robust transmission and storage of medical images with patient information , 2004, 2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04..

[26]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[27]  Christian Storm,et al.  Detection and classification of nonlinear dynamic switching events. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[28]  Shujun Li,et al.  Determination of the Parameters for a Lorenz System and Application to Break the Security of Two-channel Chaotic Cryptosystems , 2008 .

[29]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[30]  Alexander L. Fradkov,et al.  Adaptive synchronization of chaotic systems based on speed gradient method and passification , 1997 .

[31]  Mohd. Salmi Md. Noorani,et al.  Modified Baptista type chaotic cryptosystem via matrix secret key , 2008 .

[32]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[33]  I. P. Cornfeld Ergodic theory / I.P. Cornfeld, S.V. Fomin, Ya.G. Sinai , 1982 .

[34]  Yu Zhang,et al.  Decoding Digital Information from the Cascaded Heterogeneous Chaotic Systems , 2003, Int. J. Bifurc. Chaos.

[35]  G Alvarez,et al.  Estimating short-time period to break different types of chaotic modulation based secure communications , 2004, nlin/0406039.

[36]  Ljupco Kocarev,et al.  Chaotic block ciphers: from theory to practical algorithms , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[37]  Ljupco Kocarev,et al.  Public-key encryption with chaos. , 2004, Chaos.

[38]  C. Mira,et al.  Coding Scheme Based on Chaos Synchronization from Noninvertible Maps , 1998 .

[39]  Ljupco Kocarev,et al.  Theory and practice of chaotic cryptography , 2007 .

[40]  Xingyuan Wang,et al.  A NEW CHAOTIC CRYPTOGRAPHY BASED ON ERGODICITY , 2008 .

[41]  David Brumley,et al.  Remote timing attacks are practical , 2003, Comput. Networks.

[42]  David Arroyo,et al.  Application of Gray code to the cryptanalysis of chaotic cryptosystems , 2007 .

[43]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[44]  Gonzalo Alvarez,et al.  Breaking projective chaos synchronization secure communication using filtering and generalized synchronization , 2004, Chaos, Solitons & Fractals.

[45]  Miguel Romera,et al.  A revision of the Lyapunov exponent in 1D quadratic maps , 1997 .

[46]  Gérard Gouesbet,et al.  Topological Characterization of Reconstructed Attractors Modding Out Symmetries , 1996 .

[47]  Kevin M. Short,et al.  UNMASKING A HYPERCHAOTIC COMMUNICATION SCHEME , 1998 .

[48]  Pérez,et al.  Extracting messages masked by chaos. , 1995, Physical review letters.

[49]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[50]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[51]  Daniele Fournier-Prunaret,et al.  A Qualitative Analysis of Deciphering Errors in Chaos Shift Keying , 2009, Int. J. Bifurc. Chaos.

[52]  Carroll,et al.  Synchronization in chaotic systems. , 1990, Physical review letters.

[53]  J. Yorke,et al.  Period Three Implies Chaos , 1975 .

[54]  Gonzalo Álvarez,et al.  Return-Map Cryptanalysis Revisited , 2005, Int. J. Bifurc. Chaos.

[55]  Enrico Del Re,et al.  Stream cipher system based on chaotic maps , 2000, SPIE Optics + Photonics.

[56]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[57]  Xuanqin Mou,et al.  Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.

[58]  M. Hirsch,et al.  Differential Equations, Dynamical Systems, and Linear Algebra , 1974 .

[59]  Wolfgang A. Halang,et al.  Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey , 2007, ArXiv.

[60]  Adrian Skrobek,et al.  Approximation of a chaotic orbit as a cryptanalytical method on Baptista's cipher , 2008 .

[61]  Soumitro Banerjee,et al.  Robust Chaos , 1998, chao-dyn/9803001.

[62]  David Arroyo Guardeño Framework for the analysis and design of encryption strategies based on discrete-time chaotic dynamical systems , 2009 .

[63]  Safya Belghith,et al.  Comment on Modified Baptista type chaotic cryptosystem via matrix secret key [Phys. Lett. A 372 (2008) 5427] , 2009 .

[64]  Jamal Daafouz,et al.  A connection between chaotic and conventional cryptography , 2008, IEEE Transactions on Circuits and Systems I: Regular Papers.

[65]  Meng Zhan,et al.  Error function attack of chaos synchronization based encryption schemes. , 2003, Chaos.

[66]  José María Amigó,et al.  Estimation of the control parameter from symbolic sequences: unimodal maps with variable critical point. , 2009, Chaos.

[67]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[68]  P. G. Vaidya,et al.  Decoding chaotic cryptography without access to the superkey , 2003 .

[69]  Mark Stamp,et al.  Applied Cryptanalysis: Breaking Ciphers in the Real World , 2007 .

[70]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[71]  Bingo Wing-Kuen Ling,et al.  Chaotic filter bank for computer cryptography , 2007 .

[72]  Ljupco Kocarev,et al.  Cryptographically secure substitutions based on the approximation of mixing maps , 2005, IEEE Transactions on Circuits and Systems I: Regular Papers.

[73]  M. Feki An adaptive chaos synchronization scheme applied to secure communication , 2003 .

[74]  Gonzalo Alvarez,et al.  Cryptanalysis of a family of self-synchronizing chaotic stream ciphers , 2009, 0903.2928.

[75]  Toshimitsu Ushio,et al.  Chaos communication using unknown input observers , 2001 .

[76]  G. Álvarez,et al.  Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .

[77]  Guanrong Chen,et al.  Breaking a chaos-based secure communication scheme designed by an improved modulation method , 2004, nlin/0411007.

[78]  Guanrong Chen,et al.  YET ANOTHER CHAOTIC ATTRACTOR , 1999 .

[79]  S. Li,et al.  On the security of a new image encryption scheme based on chaotic map lattices. , 2008, Chaos.

[80]  Kwok-Wo Wong,et al.  An efficient entire chaos-based scheme for deniable authentication , 2005 .

[81]  Revised December,et al.  APPROXIMATIONS OF DYNAMICAL SYSTEMS AND THEIR APPLICATIONS TO CRYPTOGRAPHY , 2003 .

[82]  Ljupco Kocarev,et al.  Intelligent Computing Based on Chaos , 2009 .

[83]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[84]  Neal Koblitz,et al.  Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.

[85]  Tao Yang,et al.  A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .

[86]  G. Álvarez,et al.  Cryptanalysis of an ergodic chaotic cipher , 2003 .

[87]  Chai Wah Wu,et al.  A Simple Way to Synchronize Chaotic Systems with Applications to , 1993 .

[88]  Ljupco Kocarev,et al.  Public-Key Encryption Based on Chebyshev Polynomials , 2005 .

[89]  Tao Yang,et al.  Recovery of digital signals from chaotic switching , 1995, Int. J. Circuit Theory Appl..

[90]  Gonzalo Álvarez,et al.  Analysis of security problems in a medical image encryption system , 2007, Comput. Biol. Medicine.

[91]  M. Hasler,et al.  Communication by chaotic signals : the inverse system approach , 1996 .

[92]  C. Caramanis What is ergodic theory , 1963 .

[93]  G. Álvarez,et al.  Cryptanalysis of a chaotic encryption system , 2000 .

[94]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[95]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[96]  Kevin M. Short,et al.  Reconstructing the keystream from a chaotic encryption scheme , 2001 .

[97]  H. Samtleben,et al.  Canonical quantization of cylindrical gravitational waves with two polarizations , 1997, gr-qc/9705013.

[98]  Jamal Daafouz,et al.  Unknown Input Observers for Message-Embedded Chaos Synchronization of Discrete-Time Systems , 2004, Int. J. Bifurc. Chaos.

[99]  Henk Nijmeijer,et al.  System identification in communication with chaotic systems , 2000 .

[100]  Kuang-Yow Lian,et al.  Synchronization with message embedded for generalized Lorenz chaotic circuits and its error analysis , 2000 .

[101]  Hu Guojie,et al.  Chosen ciphertext attack on chaos communication based on chaotic synchronization , 2003 .

[102]  Gonzalo Alvarez,et al.  Some Hints for the Design of Digital Chaos-Based Cryptosystems: Lessons Learned from Cryptanalysis , 2008, 0812.0765.

[103]  Michael Peter Kennedy,et al.  The role of synchronization in digital communications using chaos. II. Chaotic modulation and chaotic synchronization , 1998 .

[104]  Olcay Taner Yildiz,et al.  Cryptanalysis of Fridrich's Chaotic Image Encryption , 2010, Int. J. Bifurc. Chaos.

[105]  M. Baptista Cryptography with chaos , 1998 .

[106]  Ta-lun Yang,et al.  Breaking chaotic secure communication using a spectrogram , 1998 .

[107]  Shujun Li,et al.  Cryptanalysis of a new chaotic cryptosystem based on ergodicity , 2008, 0806.3183.

[108]  Ljupco Kocarev,et al.  A chaos-based approach to the design of cryptographically secure substitutions , 2005 .

[109]  Zhong-Ping Jiang,et al.  A note on chaotic secure communication systems , 2002 .

[110]  Thomas Beth,et al.  Cryptanalysis of Cryptosystems Based on Remote Chaos Replication , 1994, CRYPTO.

[111]  Martin Hasler,et al.  Synchronization of chaotic systems and transmission of information , 1998 .

[112]  Michael Peter Kennedy,et al.  Chaos shift keying : modulation and demodulation of a chaotic carrier using self-sychronizing chua"s circuits , 1993 .

[113]  A. Pisarchik,et al.  Encryption and decryption of images with chaotic map lattices. , 2006, Chaos.

[114]  Gonzalo Alvarez,et al.  Security problems with a chaos-based deniable authentication scheme , 2004, nlin/0412023.

[115]  Nicholas J. Higham,et al.  INVERSE PROBLEMS NEWSLETTER , 1991 .

[116]  Mei Han An,et al.  accuracy and stability of numerical algorithms , 1991 .

[117]  Chai Wah Wu,et al.  Synchronization in Coupled Chaotic Circuits and Systems , 2002 .

[118]  Ljupco Kocarev,et al.  Discrete Chaos-I: Theory , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[119]  G. Álvarez,et al.  Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.

[120]  Gonzalo Álvarez,et al.  Cryptanalysis of a computer cryptography scheme based on a filter bank , 2007, Chaos, Solitons & Fractals.

[121]  Iwao Sasase,et al.  A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.