首页> 外文OA文献 >Breaking a chaos-based secure communication scheme designed by an improved modulation method
【2h】

Breaking a chaos-based secure communication scheme designed by an improved modulation method

机译:打破通过改进的调制方法设计的基于混沌的安全通信方案

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Recently Bu and Wang [Bu S, Wang B-H. Chaos, Solitons & Fractals 2004;19(4):919–24] proposed a simple modulation method aiming to improve the security of chaos-based secure communications against return-map-based attacks. Soon this modulation method was independently cryptanalyzed by Chee et al. [Chee CY, Xu D, Bishop SR. Chaos, Solitons & Fractals 2004;21(5):1129–34], Wu et al. [Wu X, Hu H, Zhang B. Chaos, Solitons & Fractals 2004;22(2):367–73], and Álvarez et al. [Álvarez G, Montoya F, Romera M, Pastor G. Chaos, Solitons & Fractals, in press, arXiv:nlin/0406065] via different attacks. As an enhancement to the Bu–Wang method, an improving scheme was suggested by Wu et al. by removing the relationship between the modulating function and the zero-points. The present paper points out that the improved scheme proposed by Wu et al. is still insecure against a new attack. Compared with the existing attacks, the proposed attack is more powerful and can also break the original Bu–Wang scheme. Furthermore, it is pointed out that the security of the modulation-based schemes proposed by Wu et al. is not so satisfactory from a pure cryptographical point of view. The synchronization performance of this class of modulation-based schemes is also discussed.
机译:最近卜和王[Bu S,Wang B-H。 Chaos,Solitons&Fractals 2004; 19(4):919-24]提出了一种简单的调制方法,旨在提高针对基于返回图的攻击的基于混沌的安全通信的安全性。不久,这种调制方法被Chee等人独立加密。 [Che CY,Xu D,Bishop SR。 Wu,et al。,Chaos,Solitons&Fractals 2004; 21(5):1129–34]。 [Wu X,Hu H,Zhang B. Chaos,Solitons&Fractals 2004; 22(2):367-73],和Álvarez等。 [ÁlvarezG,Montoya F,Romera M,Pastor G. Chaos,Solitons&Fractals,in press,arXiv:nlin / 0406065]通过不同的攻击。作为对Bu-Wang方法的增强,Wu等人提出了一种改进方案。通过消除调制函数和零点之间的关系。本文指出了Wu等人提出的改进方案。对于新的攻击仍然没有安全感。与现有攻击相比,建议的攻击功能更强大,并且还可以破坏原始的Bu-Wang方案。此外,指出了Wu等人提出的基于调制方案的安全性。从纯粹的密码学角度来看,这并不令人满意。还讨论了此类基于调制的方案的同步性能。

著录项

  • 作者

    Li, S; Álvarez, G; Chen, G;

  • 作者单位
  • 年度 2005
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号