BibTex RIS Kaynak Göster
Yıl 2012, Cilt: 1 Sayı: 3, 79 - 81, 29.09.2012

Öz

Kaynakça

  • E. Solak, “Cryptanalysis of Chaotic Ciphers, in: L. Kocarev, S. Lian (Eds.), Chaos Based Cryptography Theory Algorithms and Applications”, Springer-Verlag, pp.227-256, 2011.
  • G. Alvarez, J. M. Amigo, D. Arroyo, S. Li, “Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers, in: L. Kocarev, S. Lian (Eds.), Chaos Based Cryptography Theory Algorithms and Applications”, Springer-Verlag, pp. 257-295, 2011.
  • J. M. Amigo, L. Kocarev, J. Szczapanski, “Theory and practice of chaotic cryptography”, Physics Letters A 366, pp.211-216, 2007.
  • G. Jakimoski, L. Kocarev. “Chaos and cryptography: block encryption ciphers”. IEEE Trans Circ Syst—I 48/2, pp.163–169, 2001.
  • G. Alvarez, S. Li, “Some basic cryptographic requirements International Journal of Bifurcation Chaos 16/8, pp.2129– 2151, 2006. chaos-based cryptosystems”.
  • Z.-H. Guan, F. Huang, W. Guan, “Chaos-based image encryption algorithm”, Physics Letters A 346, pp.153– 157, 2005.
  • C. Çokal, E. Solak, “Cryptanalysis of a chaos-based image encryption algorithm”, Physics Letters A 373, pp.1357–1360, 2009.
  • N. Bigdeli, Y. Farid, K. Afshar, “A robust hybrid method for image encryption based on Hopfield neural network”, Computers and Electrical Engineering 38, pp.356–369, 2012.

Cryptanalysis of Bigdeli algorithm using Çokal’s attack

Yıl 2012, Cilt: 1 Sayı: 3, 79 - 81, 29.09.2012

Öz

Chaotic cryptography is a new field that has seen a significant amount of research activity during the last 20 years. Despite the many proposals that use various methods in the design of encryption algorithms, there is a definite need for a mathematically rigorous cryptanalysis of these designs. In this study, we analyze the security weaknesses of the “N. Bigdeli, Y. Farid, K. Afshar, A robust hybrid method for image encryption based on Hopfield neural network, Computers and Electrical Engineering 38 (2012) 356–369”. By applying Çokal’s attack, we show that all the secret parameters can be revealed.

Kaynakça

  • E. Solak, “Cryptanalysis of Chaotic Ciphers, in: L. Kocarev, S. Lian (Eds.), Chaos Based Cryptography Theory Algorithms and Applications”, Springer-Verlag, pp.227-256, 2011.
  • G. Alvarez, J. M. Amigo, D. Arroyo, S. Li, “Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers, in: L. Kocarev, S. Lian (Eds.), Chaos Based Cryptography Theory Algorithms and Applications”, Springer-Verlag, pp. 257-295, 2011.
  • J. M. Amigo, L. Kocarev, J. Szczapanski, “Theory and practice of chaotic cryptography”, Physics Letters A 366, pp.211-216, 2007.
  • G. Jakimoski, L. Kocarev. “Chaos and cryptography: block encryption ciphers”. IEEE Trans Circ Syst—I 48/2, pp.163–169, 2001.
  • G. Alvarez, S. Li, “Some basic cryptographic requirements International Journal of Bifurcation Chaos 16/8, pp.2129– 2151, 2006. chaos-based cryptosystems”.
  • Z.-H. Guan, F. Huang, W. Guan, “Chaos-based image encryption algorithm”, Physics Letters A 346, pp.153– 157, 2005.
  • C. Çokal, E. Solak, “Cryptanalysis of a chaos-based image encryption algorithm”, Physics Letters A 373, pp.1357–1360, 2009.
  • N. Bigdeli, Y. Farid, K. Afshar, “A robust hybrid method for image encryption based on Hopfield neural network”, Computers and Electrical Engineering 38, pp.356–369, 2012.
Toplam 8 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Makaleler
Yazarlar

Fatih Özkaynak

Ahmet Özer Bu kişi benim

Sırma Yavuz

Yayımlanma Tarihi 29 Eylül 2012
Gönderilme Tarihi 30 Ocak 2016
Yayımlandığı Sayı Yıl 2012 Cilt: 1 Sayı: 3

Kaynak Göster

IEEE F. Özkaynak, A. Özer, ve S. Yavuz, “Cryptanalysis of Bigdeli algorithm using Çokal’s attack”, IJISS, c. 1, sy. 3, ss. 79–81, 2012.