DocumentCode :
3344873
Title :
Methods of attacking chaotic encryption and countermeasures
Author :
Sobhy, Mohamed I. ; Shehata, Alaa-eldin R.
Author_Institution :
Electron. Eng. Labs., Kent Univ., Canterbury, UK
Volume :
2
fYear :
2001
fDate :
2001
Firstpage :
1001
Abstract :
Methods of attacking chaotic encryption algorithms have been developed. These methods have been applied to all the published chaotic encryption systems and all these systems are broken in very short computer times. Counter measures have also been developed in order to make chaotic encryption secure. Several examples and results are given
Keywords :
chaos; cryptography; time series; Yamakawa chaotic communication system; chaotic encryption; chaotic time series; ciphertext; countermeasures; security; Autocorrelation; Chaos; Chaotic communication; Counting circuits; Cryptography; Delay; Electronic countermeasures; Laboratories; Security; Thumb;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Acoustics, Speech, and Signal Processing, 2001. Proceedings. (ICASSP '01). 2001 IEEE International Conference on
Conference_Location :
Salt Lake City, UT
ISSN :
1520-6149
Print_ISBN :
0-7803-7041-4
Type :
conf
DOI :
10.1109/ICASSP.2001.941086
Filename :
941086
Link To Document :
بازگشت