首页 | 本学科首页   官方微博 | 高级检索  
     检索      

一类时空混沌加解密系统的安全分析
引用本文:王开,裴文江,周建涛,张毅峰,周思源.一类时空混沌加解密系统的安全分析[J].物理学报,2011,60(7):70503-070503.
作者姓名:王开  裴文江  周建涛  张毅峰  周思源
作者单位:东南大学无线电工程系,东南大学水声信号处理教育部重点实验室,南京 210096
基金项目:国家自然科学基金(批准号: 60672095, 60972165), 国家高技术研究发展计划(863 计划) (批准号: 2007AA11Z210), 教育部博士点基金(批准号: 20100092120012,20070286004), 江苏省高技术研究项目,江苏省自然科学基金(批准号:BK2010240), 国家十一五密码发展基金,国家火炬计划项目资助的课题.
摘    要:本文安全分析文献 所提的一类自同步的时空混沌流密码系统.发现该高维的加解密系统在常数的驱动下将收敛到一维,使得动力学系统的复杂性大为降低.在某些特定输入区域内容,保密系统对输入状态的微小扰动不敏感.可以建立密钥和特殊输入状态间一个简单的线性关系,并依次从密钥流中恢复出密钥.基于此,提出一套选择密文攻击方法,利用系统参数和扰动前后密钥流的差异之间的依赖关系通过寻优算法破解密钥,从而攻击了上述文献所提出的基于混沌自同步的安全通信算法. 关键词: 混沌密码 耦合映像格子 安全分析

关 键 词:混沌密码  耦合映像格子  安全分析
收稿时间:2010-08-24

Security of chaos-based secure communications in a large community
Wang Kai,Pei Wen-Jiang,Zhou Jian-Tao,Zhang Yi-Feng and Zhou Si-Yuan.Security of chaos-based secure communications in a large community[J].Acta Physica Sinica,2011,60(7):70503-070503.
Authors:Wang Kai  Pei Wen-Jiang  Zhou Jian-Tao  Zhang Yi-Feng and Zhou Si-Yuan
Institution:Department of Radio Engineering, Southeast University, Key Laboratory of Underwater Acoustic Signal Processing of Ministry of Education, Southeast University, Nanjing 210096, China;Department of Radio Engineering, Southeast University, Key Laboratory of Underwater Acoustic Signal Processing of Ministry of Education, Southeast University, Nanjing 210096, China;Department of Radio Engineering, Southeast University, Key Laboratory of Underwater Acoustic Signal Processing of Ministry of Education, Southeast University, Nanjing 210096, China;Department of Radio Engineering, Southeast University, Key Laboratory of Underwater Acoustic Signal Processing of Ministry of Education, Southeast University, Nanjing 210096, China;Department of Radio Engineering, Southeast University, Key Laboratory of Underwater Acoustic Signal Processing of Ministry of Education, Southeast University, Nanjing 210096, China
Abstract:In this paper, we present an attack on a cryptosystem designed by using a spatiotemporal chaotic system. We show that the decryption system proposed in (Phys. Rev. E 66, 065202 (2002)) degenerates to the one-dimensional map under the constant input, and it is insensitive to the slight perturbations to input in specially selected intervals. Consequently, the attacker can use a very simple optimization algorithm to obtain the proper input value within only hundreds of iterations. Furthermore, we prove that there exits a linear dependency between the secret key and the obtained input value, so that the attacker can break this spatiotemporal chaos-based secure communication scheme easily. Both theoretical and experimental results show that the lack of security discourages the use of these cryptosystems for practical application.
Keywords:chaotic encryption  coupled map lattices  cryptanalysis
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《物理学报》浏览原始摘要信息
点击此处可从《物理学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号