Cryptanalysis of a novel cryptosystem based on chaotic oscillators and feedback inversion (original) (raw)

Chaotic cryptosystem based on inverse duffing circuit

2006

We have studied experimentally a chaotic cryptosystem, which is based on the inverse system approach. We applied this method to a second order nonlinear circuit (master circuit), which is described by a Duffing equation. We present the implementation of the slave circuit with the inverse system approach and we demonstrate the decryption when the information signal has several forms (sinusoidal and rectangular). By appropriate choice of the parameters of the nonlinear oscillator, and the signal oscillator, it is possible to have a cryptosystem capable of transmitting information securely and recovering it accurately.

Experimental demonstration of a chaotic cryptographic scheme

2006

In this paper we demonstrate an experimental chaotic cryptosystem. This cryptosystem is based on the inverse system approach, which we apply to a second order nonlinear circuit, described by a Duffing equation. We present the implementation of the electronic circuit obeying Duffing's equation, and the slave circuit which is implemented with the inverse system approach. By choosing several forms for the information signal (sinusoidal, triangular and rectangular) we demonstrate the good performance of the proposed cryptosystem. Finally, we conclude that the method works well enough, when the system oscillates with frequencies that are much higher than the characteristic frequencies of the information signal.

A Novel Chaos-Based Cryptography Algorithm and Its Performance Analysis

Mathematics

Data security represents an essential task in the present day, in which chaotic models have an excellent role in designing modern cryptosystems. Here, a novel oscillator with chaotic dynamics is presented and its dynamical properties are investigated. Various properties of the oscillator, like equilibria, bifurcations, and Lyapunov exponents (LEs), are discussed. The designed system has a center point equilibrium and an interesting chaotic attractor. The existence of chaotic dynamics is proved by calculating Lyapunov exponents. The region of attraction for the chaotic attractor is investigated by plotting the basin of attraction. The oscillator has a chaotic attractor in which its basin is entangled with the center point. The complexity of the chaotic dynamic and its entangled basin of attraction make it a proper choice for image encryption. Using the effective properties of the chaotic oscillator, a method to construct pseudo-random numbers (PRNGs) is proposed, then utilizing the g...

Cryptanalysis of a chaotic encryption system

Physics Letters A, 2000

Recently a new chaotic encryption system has been proposed by E. Alvarez et al. In this paper, several weaknesses of this cryptosystem are pointed out and four successful cryptanalytic attacks are described.

Cryptanalysis of a new chaotic cryptosystem based on ergodicity

Arxiv preprint arXiv: …, 2008

This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack. Some other design weaknesses are also shown.

Cryptanalysis of a chaos-based cryptosystem on DSP

Communications in Nonlinear Science and Numerical Simulation, 2011

In this work, we cryptanalyse a recently chaos based cryptosystem on DSP by proposing three different attacks to break it. We report the weakness of this cryptosystem and hence demonstrate that in its actual design, it can not be used in the real world applications and it needs to be first enhanced by avoiding the design drawbacks reported in this work.

Chaos-based cryptosystem on DSP

Chaos, Solitons & Fractals, 2009

We present a numeric chaos-based cryptosystem, implemented on a Digital Signal Processor (DSP), which resists all the attacks we have thought of. The encryption scheme is a synchronous stream cipher. Its security arises from the properties of the trajectories in a chaotic attractor, reinforced by the use of a nonlinear non-invertible two-dimensional map, the introduction of jumps between successive points of the orbits and the retaining of only one bit of the representation of real values. We describe the results obtained through a cryptanalytic study, we detail how to adjust the different parameters of the cryptosystem in order to ensure security, and we apply the NIST (National Institute of Standards and Technology) standard tests for pseudo-randomness to our construction. The originality of this work lies in the end in the way we were able to improve the security of our system, so that it is from now on possible to envisage the use, in more general cryptographic purposes, of other recurrences than those classically employed.

Cryptanalytic methods in chaotic cryptosystems

6 pages, 6 figures.-- Communication presented at the 5th World Multiconference on Systemics, Cybernetics and Informatics and 7th International Conference on Information System Analysis and Synthesis (SCI/ISAS 2001, Orlando, Florida, Jul 22-25, 2001). In recent years, telecommunications networks have undergone an explosive growth. As a consequence, there has been a strong demand of information protection mechanisms. Many cryptosystems based on chaos have been proposed, although little or no critical analysis has been made about the security and cryptographic robustness of these algorithms. In this paper we present our tools to examine some of these algorithms from a cryptographic perspective, showing many vulnerabilities that can be exploited to successfully break them. We conclude that most of the chaotic cryptosystems are very insecure and cumbersome, thus, unreliable and impractical for real applications. Peer reviewed

Implementation of Various Cryptosystem Using Chaos

IOSR Journal of Computer Engineering, 2013

Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel to make the system more complex and robust Chaos is applied in the various cryptographic algorithms. In this paper we use most commonly used algorithm AES, RC5, IDEA, RSA, ELGamal. In this paper firstly we implement all the algorithm in MATLAB then Chaos is applied on it. After applying Chaos in these algorithms we observe that both Security and Speed increases as compare to the conventional cryptographic algorithm.

Implementation and Practical Problems of Chaos-based Cryptography Revisited

Journal of Information Security and Applications, 2019

Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional cryptography. Chaotic maps have been used in the design of cryptosystems because they depict desirable characteristics such as pseudorandomness, complexity, and sensitivity to parameter changes. Despite these characteristics being analogous to cryptographic requirements, the resulting chaos-based cryptosystems are usually difficult to analyze, inefficient, and have reproducibility issues. In this paper, we highlight some of the problems which deter the practical application of chaos-based cryptosystems. We show that recently published work in reputable journals still do not address these problems and remain only of academic interest. We also perform experiments to depict some of the implementation issues of digital chaos that need to be taken into consideration when designing chaos-based algorithms. We then discuss a number of possible solutions that can be explored to overcome these problems.