Keywords: chaotic cipher; related-key attack; ZLL chaotic cipher; divide- and-conquer attack; known plaintexts attack
@article{KYB_2008_44_4_a5,
author = {Yang, Yang and Jin, Chenhui},
title = {A related-key attack on iterated chaotic ciphers},
journal = {Kybernetika},
pages = {501--510},
year = {2008},
volume = {44},
number = {4},
mrnumber = {2459068},
zbl = {1171.94362},
language = {en},
url = {http://geodesic.mathdoc.fr/item/KYB_2008_44_4_a5/}
}
Yang, Yang; Jin, Chenhui. A related-key attack on iterated chaotic ciphers. Kybernetika, Tome 44 (2008) no. 4, pp. 501-510. http://geodesic.mathdoc.fr/item/KYB_2008_44_4_a5/
[1] Frey D. R.: Chaotic digital encoding: An approach to secure communication. IEEE Trans. Circuits and Systems 40 (1993), 10, 660–666
[2] Jin, Ch.: The analysis of a block cipher algorithm based on chaos (in Chinese). China Engnrg. Sci. 3 (2001), 6, 1066–1070
[3] Jin, Ch., Gao H.: Analysis of two stream ciphers based on chaos (in Chinese). Acta Electronic Sinica 34 (2004), 7, 1066–1070
[4] Li S., Mou X., Ji, Z., Zhang J.: Cryptanalysis of a class of chaotic stream ciphers (in Chinese). J. Electronics & Information Technology 25 (2003), 4, 473–479
[5] Matsui M.: Linear cryptanalysis method for DES cipher. In: Advance in Cryptology - Eurocrypt’93 (Lecture Notes in Control Systems 765.) Springer-Verlag, Berlin 1994 | Zbl
[6] Zhou H., Ling X.-T.: Problems with the chaotic inverse systems encryption approach. IEEE Trans. Circuits and Systems-I 44 (1997), 3, 268–271
[7] Zhou H., Luo, J., Ling X.: Generating nonlinear feedback stream ciphers via chaotic systems (in Chinese). Acta Electronic Sinica 25 (1997), 10, 57–60
[8] Zhou H., Yu, J., Ling X.: Theoretical design of chaotic feed forward stream cipher (in Chinese). Acta Electronic Sinica 26 (1998), 1, 98–101