Weak key analysis for chaotic cipher based on randomness properties

Weak key analysis is a key issue in the design of chaotic ciphers. While most of the existing research focusing on the degradation of the chaotic sequences which causes weak keys, we point out that the parameters for which the chaotic sequences do not degrade are still possible to be weak keys. In this paper, we propose a new approach based on the rigorous statistical test to improve the weak key analysis. The weak keys of a specific chaotic cipher are investigated by using our method and a large number of new weak keys are detected. These results verify that our method is more effective. On the other hand, although statistical tests are now widely adopted to test the chaos-based bit sequences, there are few reports of analysis results on the weak keys or weak sequences of chaotic cipher. Thus our work may be helpful for current research on statistical tests of chaotic cipher.

[1]  Juan Soto,et al.  Randomness Testing of the AES Candidate Algorithms , 1999 .

[2]  Gonzalo Alvarez,et al.  Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.

[3]  Salih Ergun,et al.  Truly random number generators based on a non-autonomous chaotic oscillator , 2007 .

[4]  Adrian Skrobek Cryptanalysis of chaotic stream cipher , 2007 .

[5]  Guanrong Chen,et al.  A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map , 2006 .

[6]  Jinsheng Sun,et al.  A chaotic stream cipher and the usage in video protection , 2007 .

[7]  Massimo Alioto,et al.  A feedback strategy to improve the entropy of a chaos-based random bit generator , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[8]  R. Robinson,et al.  An Introduction to Dynamical Systems: Continuous and Discrete , 2004 .

[9]  Lawrence E. Bassham,et al.  Randomness Testing of the Advanced Encryption Standard Finalist Candidates , 2000 .

[10]  Meltem Sönmez Turan,et al.  Detailed Statistical Analysis of Synchronous Stream Ciphers , 2006 .

[11]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[12]  William M. Daley,et al.  Security Requirements for Cryptographic Modules , 1999 .

[13]  YiWei Zhang,et al.  A chaos-based image encryption algorithm using alternate structure , 2007, Science in China Series F: Information Sciences.

[14]  Sang Tao,et al.  Perturbance-based algorithm to expand cycle length of chaotic key stream , 1998 .

[15]  Akio Tsuneda,et al.  Design of binary sequences with tunable exponential autocorrelations and run statistics based on one-dimensional chaotic maps , 2005, IEEE Transactions on Circuits and Systems I: Regular Papers.

[16]  Marco Tomassini,et al.  On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata , 2000, IEEE Trans. Computers.

[17]  Kim-Fung Man,et al.  A Chaos-Based Pseudo-Random Number Generator and its Application in Voice Communications , 2007, Int. J. Bifurc. Chaos.

[18]  Shujun Li,et al.  When Chaos Meets Computers , 2004, nlin/0405038.

[19]  Gonzalo Álvarez,et al.  Cryptanalysis of a chaotic block cipher with external key and its improved version , 2006, ArXiv.

[20]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[21]  S. K. Park,et al.  Random number generators: good ones are hard to find , 1988, CACM.

[22]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[23]  Tohru Kohda Information sources using chaotic dynamics , 2001 .

[24]  Wolfgang A. Halang,et al.  Analysis of a Multiple-Output Pseudo-Random-Bit Generator Based on a Spatiotemporal Chaotic System , 2006, Int. J. Bifurc. Chaos.

[25]  Donald W. Davies,et al.  Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.

[26]  Vinod Patidar,et al.  A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing , 2009, Informatica.

[27]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[28]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[29]  Guanrong Chen,et al.  Breaking a chaos-based secure communication scheme designed by an improved modulation method , 2004, nlin/0411007.

[30]  T. Kohda,et al.  Statistics of chaotic binary sequences , 1997, IEEE Trans. Inf. Theory.

[31]  Eli Biham,et al.  Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91 , 1991, EUROCRYPT.

[32]  X. Liao,et al.  A novel block cryptosystem based on iterating a chaotic map , 2006 .

[33]  G. Álvarez,et al.  Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .

[34]  Tommaso Addabbo,et al.  Invariant Measures of Tunable Chaotic Sources: Robustness Analysis and Efficient Estimation , 2009, IEEE Transactions on Circuits and Systems I: Regular Papers.