Skip to main content

A Chaotic Encryption Algorithm: Robustness against Brute-Force Attack

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AINSC,volume 167))

Abstract

An encryption method is proposed that uses self-invertible matrix, modular function, Non-Linear shift register and the chaotic map known as Logistic. Parameter of Logistic map act as secret key. As chaotic system used in this algorithm is 1-D system, the key space is lesser than 2100 which shows that the method is weak against Brute-force attack but identifiability property of the selected key from key space assures its strength against the attack. Key sensitivity and plaintext sensitivity of the key chosen from key space for the algorithm is analyzed and its strength against known-plaintext attack is also tested and conclusions are derived.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kocarev, L.: Chaos-based cryptography: A brief overview. IEEE Circuits Syst. Mag. 1(3), 6–21 (2001)

    Article  Google Scholar 

  2. Jakimoski, G., Kocarev, L.: Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications 48(2), 163–169 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  3. Dachselt, F., Schwarz, W.: Chaos and cryptography. IEEE Trans. Circuits and Syst. I 48(6), 1498–1509 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  4. de Oliveira, L.P., Sobottka, M.: Cryptography with chaotic mixing. Chaos, Solutions and Fractals 35(3), 466–471 (2008)

    Article  MATH  Google Scholar 

  5. Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Chaotic cryptosystems. In: Sanson, L.D. (ed.) Proc. 33rd Annual 1999 International Carnahan Conference on Security Technology, pp. 332–338. IEEE (1999)

    Google Scholar 

  6. Millérioux, G., Hernandez, A., Amigó, J.: Conventional cryptography and message-embedding. In: Proc. Int. Symp. Nonlinear Theory and its Applications, Bruges, vol. 35, pp. 469–472 (2005)

    Google Scholar 

  7. Guo, X., Zhang, J., Guo, X.: An Efficient Cryptanalysis of a Chaotic Cryptosystem and Its Improvement. In: IEEE Conference on Information Theory and Information Security, China, pp. 578–581 (2010)

    Google Scholar 

  8. Yin, R., Yuan, J., Yang, Q., Shan, X., Wang, X.: Linear cryptanalysis for a chaos-based stream cipher. World Academy of Science, Engineering and Technology 60, 799–804 (2009)

    Google Scholar 

  9. Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(8), 2129–2151 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  10. Anstett, F., Millerioux, G., Bloch, G.: Message-embedded cryptosystems: Cryptanalysis and identifiability. In: Proc. 44th IEEE Conf. Decision and Control, vol. 44(3), pp. 2548–2553 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mina Mishra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Mishra, M., Mankar, V.H. (2012). A Chaotic Encryption Algorithm: Robustness against Brute-Force Attack. In: Wyld, D., Zizka, J., Nagamalai, D. (eds) Advances in Computer Science, Engineering & Applications. Advances in Intelligent Systems and Computing, vol 167. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30111-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30111-7_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30110-0

  • Online ISBN: 978-3-642-30111-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics