Title :
Methods of attacking chaotic encryption and countermeasures
Author :
Sobhy, Mohamed I. ; Shehata, Alaa-eldin R.
Author_Institution :
Electron. Eng. Labs., Kent Univ., Canterbury, UK
Abstract :
Methods of attacking chaotic encryption algorithms have been developed. These methods have been applied to all the published chaotic encryption systems and all these systems are broken in very short computer times. Counter measures have also been developed in order to make chaotic encryption secure. Several examples and results are given
Keywords :
chaos; cryptography; time series; Yamakawa chaotic communication system; chaotic encryption; chaotic time series; ciphertext; countermeasures; security; Autocorrelation; Chaos; Chaotic communication; Counting circuits; Cryptography; Delay; Electronic countermeasures; Laboratories; Security; Thumb;
Conference_Titel :
Acoustics, Speech, and Signal Processing, 2001. Proceedings. (ICASSP '01). 2001 IEEE International Conference on
Conference_Location :
Salt Lake City, UT
Print_ISBN :
0-7803-7041-4
DOI :
10.1109/ICASSP.2001.941086