中国物理B ›› 2004, Vol. 13 ›› Issue (5): 625-632.doi: 10.1088/1009-1963/13/5/011

• • 上一篇    下一篇

Security analysis of a spatiotemporal-chaos-based cryptosystem

匡锦瑜1, 叶卫平1, 李晓文2, 唐国宁2, 吕华平3, 王世红4, 胡岗5   

  1. (1)Department of Electronics, Beijing Normal University, Beijing 100875, China; (2)Department of Physics, Beijing Normal University, Beijing 100875, China; (3)Department of Physics, Beijing Normal University, Beijing 100875, China; Department of Physics, Xuzhou Normal University, Xuzhou 221009, China; (4)Department of Physics, Beijing Normal University, Beijing 100875, China; Science school, Beijing University of Posts and Telecommunications, Beijing 100876, China; (5)Department of Physics, Beijing Normal University, Beijing 100875, China; The Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 100875, China
  • 收稿日期:2003-07-03 修回日期:2003-09-19 出版日期:2004-05-06 发布日期:2005-07-06
  • 基金资助:
    Project supported by the National Natural Science Foundation of China (Grant No 10175010) and the Special Funds for Major State Basic Research Projects (Grant No G2000077304).

Security analysis of a spatiotemporal-chaos-based cryptosystem

Lü Hua-Ping (吕华平)ab, Wang Shi-Hong (王世红)ac, Li Xiao-Wen (李晓文)a, Tang Guo-Ning (唐国宁)a, Kuang Jin-Yu (匡锦瑜)d, Ye Wei-Ping (叶卫平)d, Hu Gang (胡岗)ae    

  1. a Department of Physics, Beijing Normal University, Beijing 100875, China; b Department of Physics, Xuzhou Normal University, Xuzhou 221009, China; c Science school, Beijing University of Posts and Telecommunications, Beijing 100876, China; d Department of Physics, Beijing Normal University, Beijing 100875, Chinae The Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 100875, China
  • Received:2003-07-03 Revised:2003-09-19 Online:2004-05-06 Published:2005-07-06
  • Supported by:
    Project supported by the National Natural Science Foundation of China (Grant No 10175010) and the Special Funds for Major State Basic Research Projects (Grant No G2000077304).

摘要: An S-box modified one-way coupled map lattice is applied as a chaotic cryptograph. The security of the system is evaluated from various attacks currently used, including those based on error function analysis, statistical property analysis, and known-plaintext and chosen-ciphertext analytical computations. It is found that none of the above attacks can be better than the brute force attack of which the cost is exhaustively quantitated by the key number in the key space. Also, the system has fairly fast encryption (decryption) speed, and has extremely long period for finite-precision computer realization of chaos. It is thus argued that this chaotic cryptosystem can be a hopeful candidate for realistic service of secure communications.

关键词: chaos synchronization, chaotic cryptograph, S-box operation

Abstract: An S-box modified one-way coupled map lattice is applied as a chaotic cryptograph. The security of the system is evaluated from various attacks currently used, including those based on error function analysis, statistical property analysis, and known-plaintext and chosen-ciphertext analytical computations. It is found that none of the above attacks can be better than the brute force attack of which the cost is exhaustively quantitated by the key number in the key space. Also, the system has fairly fast encryption (decryption) speed, and has extremely long period for finite-precision computer realization of chaos. It is thus argued that this chaotic cryptosystem can be a hopeful candidate for realistic service of secure communications.

Key words: chaos synchronization, chaotic cryptograph, S-box operation

中图分类号:  (Synchronization; coupled oscillators)

  • 05.45.Xt
05.45.Vx (Communication using chaos)