Security

Breaking a Chaotic Cryptographic Scheme Based on Composition Maps

Free registration required

Executive Summary

The development of information technology makes the transmission of digital data is carried out more and more frequently over all kinds of channels. Meanwhile, the security of digital data become more and more important. So, the demand of secure and fast encryption schemes become urgent. Due to the subtle similarities between cryptography and chaos, a great number of chaotic encryption schemes have been proposed in the past decade. However, most of them have been found to be insecure in different extents from the view point of modern cryptography. As for how to evaluate the security of a chaotic cryptographic scheme, please refer to.

  • Format: PDF
  • Size: 2877.44 KB