Skip to main content
Top

2014 | OriginalPaper | Chapter

Cryptanalysis of a Cryptographic Algorithm that Utilizes Chaotic Neural Networks

Authors : Ke Qin, B. J. Oommen

Published in: Information Sciences and Systems 2014

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper deals with the security and efficiency issues of a cryptographic algorithm which utilizes the principles of Chaotic Neural Network (CNN). The algorithm that we consider is the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the Delayed CNN. Although the cryptographic algorithm has its own salient characteristics, our analysis show that, unfortunately, the DCBE is not secure since it is not capable of resisting known-plaintext, chosen-plaintext, and chosen-ciphertext attacks. Furthermore, unfortunately, the scheme is not efficient either, because of the large number of iteration steps involved in its implementation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference E. Alvarez, A. Fernandez, P. Garcia, J. Jimenez, A. Marcano, New approach to chaotic encryption. Phys. Lett. A 266, 373–375 (1999)CrossRef E. Alvarez, A. Fernandez, P. Garcia, J. Jimenez, A. Marcano, New approach to chaotic encryption. Phys. Lett. A 266, 373–375 (1999)CrossRef
2.
go back to reference G. Alvarez, F. Montoya, M. Romera, G. Pastor, Cryptanalysis of a chaotic encryption system. Phys. Lett. A 276(1–4), 191–196 (2000)CrossRefMATHMathSciNet G. Alvarez, F. Montoya, M. Romera, G. Pastor, Cryptanalysis of a chaotic encryption system. Phys. Lett. A 276(1–4), 191–196 (2000)CrossRefMATHMathSciNet
4.
go back to reference D. Erdmann, S. Murphy, Henon stream cipher. Electron. Lett. 28(9), 893–895 (1992)CrossRef D. Erdmann, S. Murphy, Henon stream cipher. Electron. Lett. 28(9), 893–895 (1992)CrossRef
5.
go back to reference A. Kanso, M. Ghebleh, A novel image encryption algorithm based on a 3d chaotic map. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2943–2959 (2012)CrossRefMATHMathSciNet A. Kanso, M. Ghebleh, A novel image encryption algorithm based on a 3d chaotic map. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2943–2959 (2012)CrossRefMATHMathSciNet
7.
go back to reference E. Klein, R. Mislovaty, I. Kanter, W. Kinzel, Public-channel cryptography using chaos synchronization. Phys. Rev. E 72(1), 016,214 (2005)CrossRef E. Klein, R. Mislovaty, I. Kanter, W. Kinzel, Public-channel cryptography using chaos synchronization. Phys. Rev. E 72(1), 016,214 (2005)CrossRef
8.
go back to reference L. Kocarev, Chaos-based cryptography: a brief overview. IEEE Trans. Circuits Syst. Mag. 1(3), 6–21 (2001)CrossRef L. Kocarev, Chaos-based cryptography: a brief overview. IEEE Trans. Circuits Syst. Mag. 1(3), 6–21 (2001)CrossRef
9.
go back to reference L. Kocarev, Z. Tasev, Public-key encryption based on chebyshev maps, in Proceedings of the 2003 International Symposium on Circuits and Systems, Proceedings of the 2003 International Symposium on Circuits and Systems, vol. 3, pp. 28–31 (2003) L. Kocarev, Z. Tasev, Public-key encryption based on chebyshev maps, in Proceedings of the 2003 International Symposium on Circuits and Systems, Proceedings of the 2003 International Symposium on Circuits and Systems, vol. 3, pp. 28–31 (2003)
10.
go back to reference S.J. Li, Analysis and design of digital chaotic ciphers, Ph.D. thesis, Xi’an Jiaotong University, China (2003) S.J. Li, Analysis and design of digital chaotic ciphers, Ph.D. thesis, Xi’an Jiaotong University, China (2003)
11.
go back to reference Y.T. Li, S.J. Deng, D. Xiao, A novel hash algorithm construction based on chaotic neural network. Neural Comput. Appl. 20(1), 133–141 (2011)CrossRef Y.T. Li, S.J. Deng, D. Xiao, A novel hash algorithm construction based on chaotic neural network. Neural Comput. Appl. 20(1), 133–141 (2011)CrossRef
12.
go back to reference G.J. Liu, L. Shan, Y.W. Dai, J.S. Sun, Z.Q. Wang, One-way hash function based on chaotic neural network. Acta Physica Sinica 55(11), 5688–5693 (2006)MATHMathSciNet G.J. Liu, L. Shan, Y.W. Dai, J.S. Sun, Z.Q. Wang, One-way hash function based on chaotic neural network. Acta Physica Sinica 55(11), 5688–5693 (2006)MATHMathSciNet
13.
go back to reference H.T. Lu, Chaotic attractors in delayed neural networks. Phys. Lett. A 298(2–3), 109–116 (2002)CrossRefMATH H.T. Lu, Chaotic attractors in delayed neural networks. Phys. Lett. A 298(2–3), 109–116 (2002)CrossRefMATH
14.
go back to reference R. Matthews, On the derivation of a chaotic encryption algorithm. Cryptologia 8(1), 29–41 (1984) R. Matthews, On the derivation of a chaotic encryption algorithm. Cryptologia 8(1), 29–41 (1984)
15.
go back to reference K. Qin, M.T. Zhou, N.Q. Liu, A novel group key management based on jacobian elliptic chebyshev rational map. Lect. Notes Comput. Sci. 4672, 287–295 (2007)CrossRef K. Qin, M.T. Zhou, N.Q. Liu, A novel group key management based on jacobian elliptic chebyshev rational map. Lect. Notes Comput. Sci. 4672, 287–295 (2007)CrossRef
16.
go back to reference T. Stojanovski, L. Kocarev, Chaos-based random number generators—part i: Analysis. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 48(3), 281–288 (2001)CrossRefMATHMathSciNet T. Stojanovski, L. Kocarev, Chaos-based random number generators—part i: Analysis. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 48(3), 281–288 (2001)CrossRefMATHMathSciNet
17.
go back to reference Q.T. Yang, T.G. Gao, One-way hash function based on hyper-chaotic cellular neural network. Chin. Phys. B 17(7), 2388–2393 (2008)CrossRefMathSciNet Q.T. Yang, T.G. Gao, One-way hash function based on hyper-chaotic cellular neural network. Chin. Phys. B 17(7), 2388–2393 (2008)CrossRefMathSciNet
18.
go back to reference W.W. Yu, J.D. Cao, Cryptography based on delayed chaotic neural networks. Phys. Lett. A 356(4–5), 333–338 (2006)CrossRefMATH W.W. Yu, J.D. Cao, Cryptography based on delayed chaotic neural networks. Phys. Lett. A 356(4–5), 333–338 (2006)CrossRefMATH
19.
go back to reference A.A. Zaher, A. Abu-Rezq, On the design of chaos-based secure communication systems. Commun. Nonlinear Sci. Numer. Simul. 16(9), 3721–3737 (2011)CrossRefMATHMathSciNet A.A. Zaher, A. Abu-Rezq, On the design of chaos-based secure communication systems. Commun. Nonlinear Sci. Numer. Simul. 16(9), 3721–3737 (2011)CrossRefMATHMathSciNet
20.
go back to reference D. Zhang, J. Xu, Chaotic and hyperchaotic attractors in time-delayed neural networks. Complex Sci. 5, 1193–1202 (2009)CrossRef D. Zhang, J. Xu, Chaotic and hyperchaotic attractors in time-delayed neural networks. Complex Sci. 5, 1193–1202 (2009)CrossRef
Metadata
Title
Cryptanalysis of a Cryptographic Algorithm that Utilizes Chaotic Neural Networks
Authors
Ke Qin
B. J. Oommen
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-09465-6_18

Premium Partner