Repository landing page

We are not able to resolve this OAI Identifier to the repository landing page. If you are the repository manager for this record, please head to the Dashboard and adjust the settings.

Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations

Abstract

Recently two encryption schemes were proposed by combining circular bit shift and XOR operations, under the control of a pseudorandom bit sequence (PRBS) generated from a chaotic system. This Letter studies the security of these two encryption schemes and reports the following findings: (1) there exist some security defects in both schemes; (2) the underlying chaotic PRBS can be reconstructed as an equivalent key by using only two chosen plaintexts; (3) most elements in the underlying chaotic PRBS can be obtained by a differential known-plaintext attack using only two known plaintexts. Experimental results are given to demonstrate the feasibility of the proposed attack.Department of Electronic and Information Engineerin

Similar works

Full text

thumbnail-image

The Hong Kong Polytechnic University Pao Yue-kong Library

redirect
Last time updated on 10/02/2018

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.