中国物理B ›› 2007, Vol. 16 ›› Issue (8): 2254-2258.doi: 10.1088/1009-1963/16/8/016

• GENERAL • 上一篇    下一篇

Application of periodic orbit theory in chaos-based security analysis

龙敏1, 丘水生2   

  1. (1)College of Computer and Communication, Changsha University of Science and Technology, Changsha 410076, China; (2)College of Electronic & Engineering, South China Univ. of Technology, Guangzhou 510640, China
  • 收稿日期:2006-08-22 修回日期:2006-11-20 出版日期:2007-08-20 发布日期:2007-08-20

Application of periodic orbit theory in chaos-based security analysis

Long Min(龙敏)a) and Qiu Shui-Sheng(丘水生)b)   

  1. a College of Computer and Communication, Changsha University of Science and Technology, Changsha 410076, China; b College of Electronic & Engineering, South China Univ. of Technology, Guangzhou 510640, China
  • Received:2006-08-22 Revised:2006-11-20 Online:2007-08-20 Published:2007-08-20

摘要: Chaos-based encryption schemes have been studied extensively, while the security analysis methods for them are still problems to be resolved. Based on the periodic orbit theory, this paper proposes a novel security analysis method. The periodic orbits theory indicates that the fundamental frequency of the spiraling orbits is the natural frequency of associated linearized system, which is decided by the parameters of the chaotic system. Thus, it is possible to recover the plaintext of secure communication systems based on chaotic shift keying by getting the average time on the spiraling orbits. Analysis and simulation results show that the security analysis method can break chaos shift keying secure communication systems, which use the parameters as keys.

Abstract: Chaos-based encryption schemes have been studied extensively, while the security analysis methods for them are still problems to be resolved. Based on the periodic orbit theory, this paper proposes a novel security analysis method. The periodic orbits theory indicates that the fundamental frequency of the spiraling orbits is the natural frequency of associated linearized system, which is decided by the parameters of the chaotic system. Thus, it is possible to recover the plaintext of secure communication systems based on chaotic shift keying by getting the average time on the spiraling orbits. Analysis and simulation results show that the security analysis method can break chaos shift keying secure communication systems, which use the parameters as keys.

Key words: periodic orbit theory, secure communication, chaos-based security analysis

中图分类号:  (Communication using chaos)

  • 05.45.Vx