BibTex RIS Cite
Year 2012, Volume: 1 Issue: 3, 79 - 81, 29.09.2012

Abstract

References

  • E. Solak, “Cryptanalysis of Chaotic Ciphers, in: L. Kocarev, S. Lian (Eds.), Chaos Based Cryptography Theory Algorithms and Applications”, Springer-Verlag, pp.227-256, 2011.
  • G. Alvarez, J. M. Amigo, D. Arroyo, S. Li, “Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers, in: L. Kocarev, S. Lian (Eds.), Chaos Based Cryptography Theory Algorithms and Applications”, Springer-Verlag, pp. 257-295, 2011.
  • J. M. Amigo, L. Kocarev, J. Szczapanski, “Theory and practice of chaotic cryptography”, Physics Letters A 366, pp.211-216, 2007.
  • G. Jakimoski, L. Kocarev. “Chaos and cryptography: block encryption ciphers”. IEEE Trans Circ Syst—I 48/2, pp.163–169, 2001.
  • G. Alvarez, S. Li, “Some basic cryptographic requirements International Journal of Bifurcation Chaos 16/8, pp.2129– 2151, 2006. chaos-based cryptosystems”.
  • Z.-H. Guan, F. Huang, W. Guan, “Chaos-based image encryption algorithm”, Physics Letters A 346, pp.153– 157, 2005.
  • C. Çokal, E. Solak, “Cryptanalysis of a chaos-based image encryption algorithm”, Physics Letters A 373, pp.1357–1360, 2009.
  • N. Bigdeli, Y. Farid, K. Afshar, “A robust hybrid method for image encryption based on Hopfield neural network”, Computers and Electrical Engineering 38, pp.356–369, 2012.

Cryptanalysis of Bigdeli algorithm using Çokal’s attack

Year 2012, Volume: 1 Issue: 3, 79 - 81, 29.09.2012

Abstract

Chaotic cryptography is a new field that has seen a significant amount of research activity during the last 20 years. Despite the many proposals that use various methods in the design of encryption algorithms, there is a definite need for a mathematically rigorous cryptanalysis of these designs. In this study, we analyze the security weaknesses of the “N. Bigdeli, Y. Farid, K. Afshar, A robust hybrid method for image encryption based on Hopfield neural network, Computers and Electrical Engineering 38 (2012) 356–369”. By applying Çokal’s attack, we show that all the secret parameters can be revealed.

References

  • E. Solak, “Cryptanalysis of Chaotic Ciphers, in: L. Kocarev, S. Lian (Eds.), Chaos Based Cryptography Theory Algorithms and Applications”, Springer-Verlag, pp.227-256, 2011.
  • G. Alvarez, J. M. Amigo, D. Arroyo, S. Li, “Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers, in: L. Kocarev, S. Lian (Eds.), Chaos Based Cryptography Theory Algorithms and Applications”, Springer-Verlag, pp. 257-295, 2011.
  • J. M. Amigo, L. Kocarev, J. Szczapanski, “Theory and practice of chaotic cryptography”, Physics Letters A 366, pp.211-216, 2007.
  • G. Jakimoski, L. Kocarev. “Chaos and cryptography: block encryption ciphers”. IEEE Trans Circ Syst—I 48/2, pp.163–169, 2001.
  • G. Alvarez, S. Li, “Some basic cryptographic requirements International Journal of Bifurcation Chaos 16/8, pp.2129– 2151, 2006. chaos-based cryptosystems”.
  • Z.-H. Guan, F. Huang, W. Guan, “Chaos-based image encryption algorithm”, Physics Letters A 346, pp.153– 157, 2005.
  • C. Çokal, E. Solak, “Cryptanalysis of a chaos-based image encryption algorithm”, Physics Letters A 373, pp.1357–1360, 2009.
  • N. Bigdeli, Y. Farid, K. Afshar, “A robust hybrid method for image encryption based on Hopfield neural network”, Computers and Electrical Engineering 38, pp.356–369, 2012.
There are 8 citations in total.

Details

Primary Language English
Journal Section Articles
Authors

Fatih Özkaynak

Ahmet Özer This is me

Sırma Yavuz

Publication Date September 29, 2012
Submission Date January 30, 2016
Published in Issue Year 2012 Volume: 1 Issue: 3

Cite

IEEE F. Özkaynak, A. Özer, and S. Yavuz, “Cryptanalysis of Bigdeli algorithm using Çokal’s attack”, IJISS, vol. 1, no. 3, pp. 79–81, 2012.