Research Article

On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks

Figure 3

An example of the PWLCM’s iteration trajectories. The four red bold lines make up the image of the PWLCM. The line and vertical and horizontal lines indicate the iteration process. In this figure, an iteration begins at starting point (marked with ) and ends at (marked with a “square”). The reader should note that associated with the line (marked with dash-dot line), there are at least four starting points that share the same trajectory. These are, namely, the points , , , and , which, in turn, implies that there is a collision for at least four different initial inputs.