Cryptanalysis of Bigdeli algorithm using Çokal’s attack

Volume: 1 Number: 3 September 29, 2012
EN

Cryptanalysis of Bigdeli algorithm using Çokal’s attack

Abstract

Chaotic cryptography is a new field that has seen a significant amount of research activity during the last 20 years. Despite the many proposals that use various methods in the design of encryption algorithms, there is a definite need for a mathematically rigorous cryptanalysis of these designs. In this study, we analyze the security weaknesses of the “N. Bigdeli, Y. Farid, K. Afshar, A robust hybrid method for image encryption based on Hopfield neural network, Computers and Electrical Engineering 38 (2012) 356–369”. By applying Çokal’s attack, we show that all the secret parameters can be revealed.

Keywords

References

  1. E. Solak, “Cryptanalysis of Chaotic Ciphers, in: L. Kocarev, S. Lian (Eds.), Chaos Based Cryptography Theory Algorithms and Applications”, Springer-Verlag, pp.227-256, 2011.
  2. G. Alvarez, J. M. Amigo, D. Arroyo, S. Li, “Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers, in: L. Kocarev, S. Lian (Eds.), Chaos Based Cryptography Theory Algorithms and Applications”, Springer-Verlag, pp. 257-295, 2011.
  3. J. M. Amigo, L. Kocarev, J. Szczapanski, “Theory and practice of chaotic cryptography”, Physics Letters A 366, pp.211-216, 2007.
  4. G. Jakimoski, L. Kocarev. “Chaos and cryptography: block encryption ciphers”. IEEE Trans Circ Syst—I 48/2, pp.163–169, 2001.
  5. G. Alvarez, S. Li, “Some basic cryptographic requirements International Journal of Bifurcation Chaos 16/8, pp.2129– 2151, 2006. chaos-based cryptosystems”.
  6. Z.-H. Guan, F. Huang, W. Guan, “Chaos-based image encryption algorithm”, Physics Letters A 346, pp.153– 157, 2005.
  7. C. Çokal, E. Solak, “Cryptanalysis of a chaos-based image encryption algorithm”, Physics Letters A 373, pp.1357–1360, 2009.
  8. N. Bigdeli, Y. Farid, K. Afshar, “A robust hybrid method for image encryption based on Hopfield neural network”, Computers and Electrical Engineering 38, pp.356–369, 2012.

Details

Primary Language

English

Subjects

-

Journal Section

-

Publication Date

September 29, 2012

Submission Date

January 30, 2016

Acceptance Date

-

Published in Issue

Year 2012 Volume: 1 Number: 3

APA
Özkaynak, F., Özer, A., & Yavuz, S. (2012). Cryptanalysis of Bigdeli algorithm using Çokal’s attack. International Journal of Information Security Science, 1(3), 79-81. https://izlik.org/JA43SE27KC
AMA
1.Özkaynak F, Özer A, Yavuz S. Cryptanalysis of Bigdeli algorithm using Çokal’s attack. IJISS. 2012;1(3):79-81. https://izlik.org/JA43SE27KC
Chicago
Özkaynak, Fatih, Ahmet Özer, and Sırma Yavuz. 2012. “Cryptanalysis of Bigdeli Algorithm Using Çokal’s Attack”. International Journal of Information Security Science 1 (3): 79-81. https://izlik.org/JA43SE27KC.
EndNote
Özkaynak F, Özer A, Yavuz S (September 1, 2012) Cryptanalysis of Bigdeli algorithm using Çokal’s attack. International Journal of Information Security Science 1 3 79–81.
IEEE
[1]F. Özkaynak, A. Özer, and S. Yavuz, “Cryptanalysis of Bigdeli algorithm using Çokal’s attack”, IJISS, vol. 1, no. 3, pp. 79–81, Sept. 2012, [Online]. Available: https://izlik.org/JA43SE27KC
ISNAD
Özkaynak, Fatih - Özer, Ahmet - Yavuz, Sırma. “Cryptanalysis of Bigdeli Algorithm Using Çokal’s Attack”. International Journal of Information Security Science 1/3 (September 1, 2012): 79-81. https://izlik.org/JA43SE27KC.
JAMA
1.Özkaynak F, Özer A, Yavuz S. Cryptanalysis of Bigdeli algorithm using Çokal’s attack. IJISS. 2012;1:79–81.
MLA
Özkaynak, Fatih, et al. “Cryptanalysis of Bigdeli Algorithm Using Çokal’s Attack”. International Journal of Information Security Science, vol. 1, no. 3, Sept. 2012, pp. 79-81, https://izlik.org/JA43SE27KC.
Vancouver
1.Fatih Özkaynak, Ahmet Özer, Sırma Yavuz. Cryptanalysis of Bigdeli algorithm using Çokal’s attack. IJISS [Internet]. 2012 Sep. 1;1(3):79-81. Available from: https://izlik.org/JA43SE27KC