Chaotic Cryptosystems: Cryptanalysis and Identifiability - Archive ouverte HAL Accéder directement au contenu
Article Dans Une Revue IEEE Transactions on Circuits and Systems I: Regular Papers Année : 2006

Chaotic Cryptosystems: Cryptanalysis and Identifiability

Résumé

A general framework and a systematic methodology for the cryptanalysis of a large class of chaotic cryptosystems are proposed. More precisely, it is tested, a priori, during the design stage, whether the parameters of a chaotic cryptosystem may play the role of the secret key or not. Robustness against brute force attacks is first considered. A connection between uniqueness in the parameters and identifiability is pointed out. Two approaches, the outputs equality approach and the input/output relation approach, are presented to test the identifiability of the system parameters. The second approach is constructive in the sense that not only it allows to conclude on the identifiability of the parameters but it also provides a systematic technique to retrieve the parameters in the context of a known plaintext attack. It is shown that cryptosystems involving polynomial nonlinearities, chaotic or not, are weak against this attack, called algebraic attack.
Fichier principal
Vignette du fichier
Tcas_ident2006.pdf (155.98 Ko) Télécharger le fichier
Loading...

Dates et versions

hal-00113989 , version 1 (15-11-2006)

Identifiants

Citer

Floriane Anstett, Gilles Millérioux, Gérard Bloch. Chaotic Cryptosystems: Cryptanalysis and Identifiability. IEEE Transactions on Circuits and Systems I: Regular Papers, 2006, 53 (12), pp.2673-2680. ⟨10.1109/TCSI.2006.885979⟩. ⟨hal-00113989⟩
112 Consultations
258 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More