Dergi makalesi Açık Erişim
Solak, Ercan; Cokal, Cahit
<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
<identifier identifierType="URL">https://aperta.ulakbim.gov.tr/record/17885</identifier>
<creators>
<creator>
<creatorName>Solak, Ercan</creatorName>
<givenName>Ercan</givenName>
<familyName>Solak</familyName>
<affiliation>Isik Univ, Dept Comp Sci & Engn, TR-34980 Istanbul, Turkey</affiliation>
</creator>
<creator>
<creatorName>Cokal, Cahit</creatorName>
<givenName>Cahit</givenName>
<familyName>Cokal</familyName>
<affiliation>Isik Univ, Dept Comp Sci & Engn, TR-34980 Istanbul, Turkey</affiliation>
</creator>
</creators>
<titles>
<title>Algebraic Break Of Image Ciphers Based On Discretized Chaotic Map Lattices</title>
</titles>
<publisher>Aperta</publisher>
<publicationYear>2011</publicationYear>
<dates>
<date dateType="Issued">2011-01-01</date>
</dates>
<resourceType resourceTypeGeneral="Text">Journal article</resourceType>
<alternateIdentifiers>
<alternateIdentifier alternateIdentifierType="url">https://aperta.ulakbim.gov.tr/record/17885</alternateIdentifier>
</alternateIdentifiers>
<relatedIdentifiers>
<relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.1016/j.ins.2010.09.009</relatedIdentifier>
</relatedIdentifiers>
<rightsList>
<rights rightsURI="http://www.opendefinition.org/licenses/cc-by">Creative Commons Attribution</rights>
<rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
</rightsList>
<descriptions>
<description descriptionType="Abstract">In this paper, we provide an algebraic cryptanalysis of a recently proposed chaotic image cipher. We show that the secret parameters of the algorithm can be revealed using chosen-plaintext attacks. Our attack uses the orbit properties of the permutation maps to deduce encryption values for a single round. Once a single round encryption is revealed, the secret parameters are obtained using simple assignments. (C) 2010 Elsevier Inc. All rights reserved.</description>
</descriptions>
</resource>
| Görüntülenme | 50 |
| İndirme | 8 |
| Veri hacmi | 1.2 kB |
| Tekil görüntülenme | 45 |
| Tekil indirme | 8 |