Arama Sonuçları

Listeleniyor 1 - 5 / 5
  • Yayın
    Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427]
    (Elsevier Science BV, 2009-09-07) Rhouma, Rhouma; Solak, Ercan; Arroyo, David; Li, Shujun; Alvarez, Gonzalo; Belghith, Safya Mdimegh
    In this comment, we analyze a recently proposed Baptista-like cryptosystem and show that it is not invertible. Others weaknesses are also reported. A modified version of this cryptosystem is proposed to show how to overcome the non-invertibility.
  • Yayın
    Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps
    (Elsevier Science BV, 2008-11-17) Solak, Ercan; Çokal, Cahit
    Recently, an encryption algorithm based on two-dimensional discretized chaotic maps was proposed [Xiang et al., Phys. Lett. A 364 (2007) 252]. In this Letter, we analyze the security weaknesses of the proposal. Using the algebraic dependencies among system parameters. we show that its effective key space can be shrunk. We demonstrate a chosen-ciphertext attack that reveals a portion of the key.
  • Yayın
    Cryptanalysis of a chaos-based image encryption algorithm
    (Elsevier Science BV, 2009-03-30) Çokal, Cahit; Solak, Ercan
    A chaos-based image encryption algorithm was proposed in [Z.-H. Guan, F. Huang, W. Guan, Phys. Lett. A 346 (2005) 153]. In this Letter, we analyze the security weaknesses of the proposal. By applying chosen-plaintext and known-plaintext attacks, we show that all the secret parameters can be revealed.
  • Yayın
    SIMSec: A key exchange protocol between SIM card and service provider
    (Springer New York LLC, 2016-08-01) Ok, Kerem; Coşkun, Vedat; Yarman, Bekir Sıddık Binboğa; Çevikbaş, Cem; Özdenizci Köse, Büşra
    Mobile technology is so popular and overdosed adoption is inevitable in today’s world. As the mobile technologies have advanced, Service Providers (SP) have offered services via Smartphones and some of them required secure data communication between the Subscriber Identity Module (SIM) cards on Smartphones and the servers of SP. The latest SIM cards comply with recent specifications including secure domain generation, mobile signatures, pre-installed encryption keys, and other useful security services. Nevertheless, un-keyed SIM cards do not satisfy such requirements, thus end-to-end encryption between the SIM card and SP cannot be provided. In this paper, we provide a key exchange protocol, which creates a symmetric key through the collaborative work of the SIM card and the SP server. After a successful protocol performance, the SIM card and SP can perform end-to-end data encryption. After defining the protocol, we also discuss the security issues and provide a formal security analysis of the protocol using the Casper/FDR tool.
  • Yayın
    Algebraic break of a cryptosystem based on discretized two-dimensional chaotic maps
    (Elsevier Science BV, 2009-03-30) Solak, Ercan; Çokal, Cahit
    Recently, a cryptosystem based on two-dimensional discretized chaotic maps was proposed [T. Xiang, et al., Phys. Lett. A 364 (2007) 252]. In this Letter, we cryptanalyze the proposal using algebraic methods. We give three different attacks that yield all the secret parameters of the cryptosystem.