Sciweavers

IJBC
2006

Return-Map Cryptanalysis Revisited

14 years 14 days ago
Return-Map Cryptanalysis Revisited
As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes. Recently, a simple defensive mechanism was presented to enhance the security of chaotic parameter modulation schemes against return-map attacks. Two techniques are combined in the proposed defensive mechanism: multistep parameter modulation and alternative driving of two different transmitter variables. This paper re-studies the security of this proposed defensive mechanism against return-map attacks, and points out that the security was much over-estimated in the original publication for both ciphertext-only attack and known/chosen-plaintext attacks. It is found that a deterministic relationship exists between the shape of the return map and the modulated parameter, and that such a relationship can be used to dramatically enhance return-map attacks thereby making them quite easy to break the defensive mechanism.
Shujun Li, Guanrong Chen, Gonzalo Álvarez
Added 12 Dec 2010
Updated 12 Dec 2010
Type Journal
Year 2006
Where IJBC
Authors Shujun Li, Guanrong Chen, Gonzalo Álvarez
Comments (0)