中国物理B ›› 2012, Vol. 21 ›› Issue (4): 40504-040504.doi: 10.1088/1674-1056/21/4/040504

• GENERAL • 上一篇    下一篇

王兴元,谢旖欣,秦学   

  • 收稿日期:2011-09-16 修回日期:2011-10-10 出版日期:2012-02-29 发布日期:2012-02-29
  • 通讯作者: 王兴元, E-mail:wangxy@dlut.edu.cn E-mail:wangxy@dlut.edu.cn

Cryptanalysis of an ergodic chaotic encryption algorithm

Wang Xing-Yuan(王兴元), Xie Yi-Xin(谢旖欣), and Qin Xue(秦学)   

  1. Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China
  • Received:2011-09-16 Revised:2011-10-10 Online:2012-02-29 Published:2012-02-29
  • Contact: Wang Xing-Yuan, E-mail:wangxy@dlut.edu.cn E-mail:wangxy@dlut.edu.cn
  • Supported by:
    Project supported by the National Natural Science Foundation of China(Grant Nos.61173183,60573172,and 60973152),theDoctoral Program Foundation of Institution of Higher Education of China(Grant No.20070141014),and the Natural ScienceFoundation of Liaoning Province,China(Grant No.20082165)

Abstract: In this paper, we present the results for the security and the possible attacks on a new symmetric key encryption algorithm based on the ergodicity property of a logistic map. After analysis, we use mathematical induction to prove that the algorithm can be attacked by a chosen plaintext attack successfully and give an example to show how to attack it. According to the cryptanalysis of the original algorithm, we improve the original algorithm, and make a brief cryptanalysis. Compared with the original algorithm, the improved algorithm is able to resist a chosen plaintext attack and retain a considerable number of advantages of the original algorithm such as encryption speed, sensitive dependence on the key, strong anti-attack capability, and so on.

Key words: chaos, cryptanalysis, encryption, block-cipher

中图分类号:  (Low-dimensional chaos)

  • 05.45.Ac
05.45.Gg (Control of chaos, applications of chaos) 05.45.Vx (Communication using chaos)