Elsevier

Physics Letters A

Volume 342, Issues 5–6, 25 July 2005, Pages 389-396
Physics Letters A

Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm

https://doi.org/10.1016/j.physleta.2005.05.048Get rights and content

Abstract

Based on chaotic masking algorithm, an enhanced Baptista-type cryptosystem is proposed by Li et al. to resist all known attacks [S. Li, X. Mou, Z. Ji, J. Zhang, Y. Cai, Phys. Lett. A 307 (2003) 22; S. Li, G. Chen, K.-W. Wong, X. Mou, Y. Cai, Phys. Lett. A 332 (2004) 368]. In this Letter, we show that the second class bit extracting function in [S. Li, X. Mou, Z. Ji, J. Zhang, Y. Cai, Phys. Lett. A 307 (2003) 22] still leak partial information on the current chaotic state and reduce the security of cryptosystem. So, this type bit extracting function is not a good candidate for the masking algorithm.

Introduction

Since a novel chaotic cryptosystem was proposed by Baptista in [1], many modified schemes have been presented in recent years [2], [3], [4], [5], [6], [7], [8].

To enhance the security of the original Baptista-type cryptosystem, a modification and its rectified version are proposed by Li et al. in [7], [8], respectively. In their cryptosystem, for defeating all known attacks on Baptista-type cryptosystem [9], [10], [11], [12], the chaotic masking algorithm is used to prevent an attacker to get the number of chaotic iterations from the cipher text. The chaotic masking algorithm is based on the masking operation XOR and the bit extracting function, which extracts 16 bits from the current chaotic state. The cryptosystem is briefly introduced as follows.

In this cryptosystem, the employed chaotic map is Logistic map F(b,x)=bx(1x),x[0,1].

Assume Xɛ={Xi|Xi=[xmin+(i1)ɛ,xmin+iɛ,i=1,2,,S)} is an equivalent partitions of [xmin,xmax)[0,1], where ɛ=xmaxxminS. The set of plain message is denoted as A, which has S different characters A={α1,α2,,αs}. Then association map fs is defined as a bijection fs:Xɛ={X1,X2,,Xs}A={α1,α2,,αs}.

By use of another character βA, a new bijection can be defined as follows: fs(x)={fs(Xi),xXi,β,x[0,1][xmin,xmax].

Let N0 and Nmax denote the minimum and the maximum iteration time, respectively. A memory unit allocated to store NmaxN0+1 variable B[N0]B[Nmax], representing C=N0C=Nmax, respectively.

In this cryptosystem, the secret key is composed of the initial value x0, the parameter b and the association map fs. In the next section, our cryptanalysis is independent of fs, so we neglect it.

With the above notations, given the plain-message M={m1,m2,,mi,}, the encryption and decryption procedures are presented as follows [8].

The encryption procedure:

  • (a)

    Initialize x0(0)=x0;

  • (b)

    For the ith plain character mi, iterate the chaotic system from x(i1) for N0 times, set C˜i=N0 and then perform the following operations: Ci=C˜ifbe(x), B[Ci]=B[Ci]+1, if the current chaotic state x satisfying fs(x)=mi, let Bi=B[Ci], then a 2-tuple cipher text (Ci,Bi) is generated and set x0(i)=x and then go to the next plain-character mi+1; otherwise, repeat this procedure until a cipher text is generated.

The decryption procedure:

For each cipher text unit (Ci,Bi), first, we iterate the chaotic system for N0 times and set C˜i=N0, then we perform the following operations: if C˜ifbe(x)=Ci for the Bi th times, then the current chaotic state x is used to derive the plain-character mi and go to the next cipher text unit (Ci+1,Bi+1); otherwise we iterate the chaotic system and let C˜=C˜+1 for 1 iteration, until the above condition is satisfied…

…Where ⊕ means bit XOR operation and fbe() is a bit extracting function. Two classes of such functions are suggested in [7], but the first class is not explicitly given. In the next section, our cryptanalysis only focuses on the second class, which is denoted as fbe(x0(i))=j=0152jb(Fj(x0(i)),Fj+m(x0(i))2nmod 16), where m1, n4 and b(x,j)=x2jmod 2.

Section snippets

Cryptanalysis

In [7], the bit extracting function is used to prevent the attacker to get any information on the iteration times to encrypt a plain-character, meanwhile it should not leak any information about the current chaotic state x0(i). In this section, we will show that the bit extracting function (4) cannot satisfy the above request, it leaks not only partial information on the iteration times and also that of the current chaotic state x0(i). With the leaked information, a chosen plaintext attack

Discussion

The range of the parameters in (4) is m1 and n4, but our attack is based on m=1 and n=4, in the following we will discuss the others situation of parameters. With the cryptanalysis of Section 2.1, it is easy to see that the information leaking is unavoidable for any m1 and n4, by Algorithm 1 we can still get some (Ci,Cj,Ck,N). But the selection of the parameters m and n will affect the sub-function Fj+m(x0(i))2nmod 16 of (4). It is obvious that when m and n increase, the complexity to

Conclusion

In this Letter, we present one cryptanalysis on a modified Baptista-type cryptosystem that employs the chaotic masking algorithm to conceal the iteration number of current chaotic states. Our analysis have pointed out that the second class of bit extracting functions in [7] cannot prevent the partial information leaking on the iteration numbers and the current chaotic state. So this class bit extracting functions is not a good candidate for the masking algorithm.

Acknowledgements

This work described in this Letter was supported by the National Natural Science Foundation of China (No. 60271019), the Doctorate Foundation of the Ministry of Education of China (No. 20020611007), the Post-doctoral Scientific Foundation of China and the Natural Science Foundation of Chongqing (No. 8509).

References (12)

  • M.S. Baptista

    Phys. Lett. A

    (1998)
  • W.-K. Wong et al.

    Comput. Phys. Commun.

    (2001)
  • K.-W. Wong

    Phys. Lett. A

    (2002)
  • K.-W. Wong

    Phys. Lett. A

    (2003)
  • K.-W. Wong et al.

    Phys. Lett. A

    (2003)
  • A. Palacios et al.

    Phys. Lett. A

    (2002)
There are more references available in the full text version of this article.

Cited by (18)

  • The 3D modular chaotic map to digital color image encryption

    2019, Future Generation Computer Systems
    Citation Excerpt :

    Chaotic cryptography is the application of themathematical chaos theory to the practice of the cryptography, the study or techniques used for private and secure transmission of information when a third-party or adversary is present. As the date of its initial investigation by Robert Matthews in 1989 [39], the use of chaos in cryptography has attracted much interest; however, long-standing concerns about its security and implementation speed continue to limit its implementation [40–44]. In order to use chaos theory efficiently in cryptography, the chaotic maps should be implemented such that the entropy generated by the map can produce required Confusion and diffusion.

  • A chaotic digital secure communication based on a modified gravitational search algorithm filter

    2012, Information Sciences
    Citation Excerpt :

    Chaos has been extensively applied in many highly complex nonlinear systems. The use of chaotic systems for secure communication has been widely studied due to its interesting intrinsic features such as ergodicity, sensitivity to initial conditions and system parameters [4,8,11,13,18,19,37]. Since Pecora and Carroll presented the concept of chaotic synchronization for two identical chaotic systems in 1990 [29], there have been tremendous efforts to construct chaotic secure communication systems [3,15,22,25–27,39,40,45,49].

  • Chaotic secure communication based on a gravitational search algorithm filter

    2012, Engineering Applications of Artificial Intelligence
    Citation Excerpt :

    Lin et al. (2010) proposed a means of secure communication based on synchronized chaotic systems. In the fields of secure communication, many techniques and methods have been proposed to tackle the problem of chaotic secure communication, including chaotic masking (Chen and Liao, 2005; Milanovic and Zaghloul, 2002), chaotic switching (Yang et al., 2002), chaos shift keying (CSK) (Galias and Maggio, 2001; Tam et al., 2006; Mirasso et al., 2002), differential chaos shift keying (DCSK) (Fan and Zhang, 2009), chaotic frequency modulation (Tse et al., 2003), and anti-phase synchronization (lazejczyk-Okolewska et al., 2001; Ho et al., 2002). It should be noted that all the methods mentioned above do not consider channel noise, which is unavoidable in the transmission of a masked signal.

  • Chaos Cryptography

    2023, Studies in Computational Intelligence
View all citing articles on Scopus
View full text