Abstract
An encryption method is proposed that uses self-invertible matrix, modular function, Non-Linear shift register and the chaotic map known as Logistic. Parameter of Logistic map act as secret key. As chaotic system used in this algorithm is 1-D system, the key space is lesser than 2100 which shows that the method is weak against Brute-force attack but identifiability property of the selected key from key space assures its strength against the attack. Key sensitivity and plaintext sensitivity of the key chosen from key space for the algorithm is analyzed and its strength against known-plaintext attack is also tested and conclusions are derived.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Kocarev, L.: Chaos-based cryptography: A brief overview. IEEE Circuits Syst. Mag. 1(3), 6–21 (2001)
Jakimoski, G., Kocarev, L.: Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications 48(2), 163–169 (2001)
Dachselt, F., Schwarz, W.: Chaos and cryptography. IEEE Trans. Circuits and Syst. I 48(6), 1498–1509 (2001)
de Oliveira, L.P., Sobottka, M.: Cryptography with chaotic mixing. Chaos, Solutions and Fractals 35(3), 466–471 (2008)
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Chaotic cryptosystems. In: Sanson, L.D. (ed.) Proc. 33rd Annual 1999 International Carnahan Conference on Security Technology, pp. 332–338. IEEE (1999)
Millérioux, G., Hernandez, A., Amigó, J.: Conventional cryptography and message-embedding. In: Proc. Int. Symp. Nonlinear Theory and its Applications, Bruges, vol. 35, pp. 469–472 (2005)
Guo, X., Zhang, J., Guo, X.: An Efficient Cryptanalysis of a Chaotic Cryptosystem and Its Improvement. In: IEEE Conference on Information Theory and Information Security, China, pp. 578–581 (2010)
Yin, R., Yuan, J., Yang, Q., Shan, X., Wang, X.: Linear cryptanalysis for a chaos-based stream cipher. World Academy of Science, Engineering and Technology 60, 799–804 (2009)
Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(8), 2129–2151 (2006)
Anstett, F., Millerioux, G., Bloch, G.: Message-embedded cryptosystems: Cryptanalysis and identifiability. In: Proc. 44th IEEE Conf. Decision and Control, vol. 44(3), pp. 2548–2553 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this paper
Cite this paper
Mishra, M., Mankar, V.H. (2012). A Chaotic Encryption Algorithm: Robustness against Brute-Force Attack. In: Wyld, D., Zizka, J., Nagamalai, D. (eds) Advances in Computer Science, Engineering & Applications. Advances in Intelligent Systems and Computing, vol 167. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30111-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-30111-7_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30110-0
Online ISBN: 978-3-642-30111-7
eBook Packages: EngineeringEngineering (R0)