4 sonuçlar
Arama Sonuçları
Listeleniyor 1 - 4 / 4
Yayın Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps(Elsevier Science BV, 2008-11-17) Solak, Ercan; Çokal, CahitRecently, an encryption algorithm based on two-dimensional discretized chaotic maps was proposed [Xiang et al., Phys. Lett. A 364 (2007) 252]. In this Letter, we analyze the security weaknesses of the proposal. Using the algebraic dependencies among system parameters. we show that its effective key space can be shrunk. We demonstrate a chosen-ciphertext attack that reveals a portion of the key.Yayın Cryptanalysis of a chaos-based image encryption algorithm(Elsevier Science BV, 2009-03-30) Çokal, Cahit; Solak, ErcanA chaos-based image encryption algorithm was proposed in [Z.-H. Guan, F. Huang, W. Guan, Phys. Lett. A 346 (2005) 153]. In this Letter, we analyze the security weaknesses of the proposal. By applying chosen-plaintext and known-plaintext attacks, we show that all the secret parameters can be revealed.Yayın Algebraic break of a cryptosystem based on discretized two-dimensional chaotic maps(Elsevier Science BV, 2009-03-30) Solak, Ercan; Çokal, CahitRecently, a cryptosystem based on two-dimensional discretized chaotic maps was proposed [T. Xiang, et al., Phys. Lett. A 364 (2007) 252]. In this Letter, we cryptanalyze the proposal using algebraic methods. We give three different attacks that yield all the secret parameters of the cryptosystem.Yayın Algebraic break of image ciphers based on discretized chaotic map lattices(Elsevier Science Inc, 2011-01-01) Solak, Ercan; Çokal, CahitIn this paper, we provide an algebraic cryptanalysis of a recently proposed chaotic image cipher. We show that the secret parameters of the algorithm can be revealed using chosen-plaintext attacks. Our attack uses the orbit properties of the permutation maps to deduce encryption values for a single round. Once a single round encryption is revealed, the secret parameters are obtained using simple assignments.












