TY - JOUR
T1 - Security of public key encryption technique based on multiple chaotic systems
AU - Wang, Kai
AU - Pei, Wenjiang
AU - Zou, Liuhua
AU - CHEUNG, Yiu Ming
AU - He, Zhenya
N1 - Funding Information:
This work was supported by the Natural Science Foundation of China under Grants 60133010 and 60102011, the National High Technology Project of China under Grants 2002AA143010 and 2003AA143040, the Excellent Young Teachers Program of Southeast University.
PY - 2006/12/25
Y1 - 2006/12/25
N2 - Recently, a new public key encryption technique based on multiple chaotic systems has been proposed [B. Ranjan, Phys. Rev. Lett. 95 (2005) 098702]. This scheme employs m-chaotic systems and a set of linear functions for key exchange over an insecure channel. Security of the proposed algorithm grows as (N P)m, where N, P are the size of the key and the computational complexity of the linear functions respectively. In this Letter, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the public keys and the initial vector, one can calculate the secret key based on Parseval's theorem. Both theoretical and experimental results show that the attacker can access to the secret key without difficulty. The lack of security discourages the use of such algorithm for practical applications.
AB - Recently, a new public key encryption technique based on multiple chaotic systems has been proposed [B. Ranjan, Phys. Rev. Lett. 95 (2005) 098702]. This scheme employs m-chaotic systems and a set of linear functions for key exchange over an insecure channel. Security of the proposed algorithm grows as (N P)m, where N, P are the size of the key and the computational complexity of the linear functions respectively. In this Letter, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the public keys and the initial vector, one can calculate the secret key based on Parseval's theorem. Both theoretical and experimental results show that the attacker can access to the secret key without difficulty. The lack of security discourages the use of such algorithm for practical applications.
KW - Cryptanalysis
KW - Multiple chaotic systems
KW - Public key cryptography
UR - http://www.scopus.com/inward/record.url?scp=33750489725&partnerID=8YFLogxK
U2 - 10.1016/j.physleta.2006.05.038
DO - 10.1016/j.physleta.2006.05.038
M3 - Article
AN - SCOPUS:33750489725
VL - 360
SP - 259
EP - 262
JO - Physics Letters, Section A: General, Atomic and Solid State Physics
JF - Physics Letters, Section A: General, Atomic and Solid State Physics
SN - 0375-9601
IS - 2
ER -