Methods of attacking chaotic encryption and countermeasures

  • Authors:
  • M. I. Sobhy;A.-E. R. Shehata

  • Affiliations:
  • Electron. Eng. Labs., Kent Univ., Canterbury, UK;-

  • Venue:
  • ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 200. on IEEE International Conference - Volume 02
  • Year:
  • 2001

Quantified Score

Hi-index 0.01

Visualization

Abstract

Methods of attacking chaotic encryption algorithms have been developed. These methods have been applied to all the published chaotic encryption systems and all these systems are broken in very short computer times. Counter measures have also been developed in order to make chaotic encryption secure. Several examples and results are given.