Dergi makalesi Açık Erişim
Solak, Ercan; Cokal, Cahit
<?xml version='1.0' encoding='utf-8'?> <resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd"> <identifier identifierType="URL">https://aperta.ulakbim.gov.tr/record/17885</identifier> <creators> <creator> <creatorName>Solak, Ercan</creatorName> <givenName>Ercan</givenName> <familyName>Solak</familyName> <affiliation>Isik Univ, Dept Comp Sci & Engn, TR-34980 Istanbul, Turkey</affiliation> </creator> <creator> <creatorName>Cokal, Cahit</creatorName> <givenName>Cahit</givenName> <familyName>Cokal</familyName> <affiliation>Isik Univ, Dept Comp Sci & Engn, TR-34980 Istanbul, Turkey</affiliation> </creator> </creators> <titles> <title>Algebraic Break Of Image Ciphers Based On Discretized Chaotic Map Lattices</title> </titles> <publisher>Aperta</publisher> <publicationYear>2011</publicationYear> <dates> <date dateType="Issued">2011-01-01</date> </dates> <resourceType resourceTypeGeneral="Text">Journal article</resourceType> <alternateIdentifiers> <alternateIdentifier alternateIdentifierType="url">https://aperta.ulakbim.gov.tr/record/17885</alternateIdentifier> </alternateIdentifiers> <relatedIdentifiers> <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.1016/j.ins.2010.09.009</relatedIdentifier> </relatedIdentifiers> <rightsList> <rights rightsURI="http://www.opendefinition.org/licenses/cc-by">Creative Commons Attribution</rights> <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights> </rightsList> <descriptions> <description descriptionType="Abstract">In this paper, we provide an algebraic cryptanalysis of a recently proposed chaotic image cipher. We show that the secret parameters of the algorithm can be revealed using chosen-plaintext attacks. Our attack uses the orbit properties of the permutation maps to deduce encryption values for a single round. Once a single round encryption is revealed, the secret parameters are obtained using simple assignments. (C) 2010 Elsevier Inc. All rights reserved.</description> </descriptions> </resource>
Görüntülenme | 38 |
İndirme | 8 |
Veri hacmi | 1.2 kB |
Tekil görüntülenme | 35 |
Tekil indirme | 8 |