Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 468567, 9 pages
http://dx.doi.org/10.1155/2015/468567
Research Article

On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks

1School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
2School of Computer Science, Carleton University, 1125 Colonel By Drive, Ottawa, ON, Canada K1S 5B6

Received 14 October 2014; Revised 30 January 2015; Accepted 3 February 2015

Academic Editor: Joao B. R. Do Val

Copyright © 2015 Ke Qin and B. John Oommen. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. James, “Chaos and randomness,” Chaos, Solitons & Fractals, vol. 6, pp. 221–226, 1995. View at Publisher · View at Google Scholar · View at Scopus
  2. R. Matthews, “On the derivation of a ‘chaotic’ encryption algorithm,” Cryptologia, vol. 8, no. 1, pp. 29–41, 1984. View at Google Scholar
  3. M. S. Baptista, “Cryptography with chaos,” Physics Letters A, vol. 240, no. 1-2, pp. 50–54, 1998. View at Publisher · View at Google Scholar · View at MathSciNet
  4. E. Alvarez, A. Fernández, P. Garcí, J. Jiménez, and A. Marcano, “New approach to chaotic encryption,” Physics Letters, Section A: General, Atomic and Solid State Physics, vol. 263, no. 4–6, pp. 373–375, 1999. View at Google Scholar · View at Scopus
  5. G. Alvarez, F. Montoya, M. Romera, and G. Pastor, “Cryptanalysis of a chaotic encryption system,” Physics Letters A, vol. 276, no. 1–4, pp. 191–196, 2000. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. D. Erdmann and S. Murphy, “Henon stream cipher,” Electronics Letters, vol. 28, no. 9, pp. 893–895, 1992. View at Publisher · View at Google Scholar · View at Scopus
  7. A. Kanso, H. Yahyaoui, and M. Almulla, “Keyed hash function based on a chaotic map,” Information Sciences, vol. 186, pp. 249–264, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. A. Kanso and M. Ghebleh, “A novel image encryption algorithm based on a 3D chaotic map,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 7, pp. 2943–2959, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. L. Kocarev and Z. Tasev, “Public-key encryption based on Chebyshev maps,” in Proceedings of the International Symposium on Circuits and Systems (ISCAS '03), vol. 3, pp. 28–31, Bangkok, Thailand, May 2003. View at Publisher · View at Google Scholar
  10. T. Stojanovski and L. Kocarev, “Chaos-based random number generators. Part I. Analysis,” IEEE Transactions on Circuits and Systems. I. Fundamental Theory and Applications, vol. 48, no. 3, pp. 281–288, 2001. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. K. Qin, M. T. Zhou, and N. Q. Liu, “A novel group key management based on jacobian elliptic chebyshev rational map,” in Network and Parallel Computing, vol. 4672 of Lecture Notes in Computer Science, pp. 287–295, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar
  12. A. A. Zaher and A. Abu-Rezq, “On the design of chaos-based secure communication systems,” Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 9, pp. 3721–3737, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. S. J. Li, Analysis and design of digital chaotic ciphers [Ph.D. thesis], Xi'an Jiaotong University, Xi'an, China, 2003.
  14. L. Kocarev, “Chaos-based cryptography: a brief overview,” IEEE Transactions on Circuits and Systems Magazine, vol. 1, no. 3, pp. 6–21, 2001. View at Publisher · View at Google Scholar · View at Scopus
  15. G. J. Liu, L. Shan, Y. W. Dai, J. S. Sun, and Z. Q. Wang, “One-way Hash function based on chaotic neural network,” Acta Physica Sinica, vol. 55, no. 11, pp. 5688–5693, 2006. View at Google Scholar · View at MathSciNet
  16. Y. Li, S. Deng, and D. Xiao, “A novel Hash algorithm construction based on chaotic neural network,” Neural Computing and Applications, vol. 20, no. 1, pp. 133–141, 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. Q.-T. Yang and T.-G. Gao, “One-way hash function based on hyper-chaotic cellular neural network,” Chinese Physics B, vol. 17, no. 7, pp. 2388–2393, 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. W. Yu and J. Cao, “Cryptography based on delayed chaotic neural networks,” Physics Letters A, vol. 356, no. 4-5, pp. 333–338, 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. D. Hinrichsen and A. J. Pritchard, Mathematical Systems Theory. I, vol. 48 of Texts in Applied Mathematics, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  20. A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boston, Mass, USA, 2001.
  21. D. Eastlake and J. Schiller, “Randomness requirements for security,” IETF RFC 4086, 2005. View at Google Scholar
  22. H. T. Lu, “Chaotic attractors in delayed neural networks,” Physics Letters A, vol. 298, no. 2-3, pp. 109–116, 2002. View at Publisher · View at Google Scholar · View at Scopus
  23. D. Zhang and J. Xu, “Chaotic and hyperchaotic attractors in time-delayed neural networks,” in Complex Sciences, vol. 5, pp. 1193–1202, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  24. E. Klein, R. Mislovaty, I. Kanter, and W. Kinzel, “Public-channel cryptography using chaos synchronization,” Physical Review E, vol. 72, no. 1, Article ID 016214, 2005. View at Publisher · View at Google Scholar · View at Scopus
  25. W. B. Mao, Modern Cryptography: Theory and Practice, Prentice Hall, Englewood Cliffs, NJ, USA, 2003.