Dergi makalesi Açık Erişim

Algebraic break of image ciphers based on discretized chaotic map lattices

Solak, Ercan; Cokal, Cahit


DataCite XML

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="URL">https://aperta.ulakbim.gov.tr/record/17885</identifier>
  <creators>
    <creator>
      <creatorName>Solak, Ercan</creatorName>
      <givenName>Ercan</givenName>
      <familyName>Solak</familyName>
      <affiliation>Isik Univ, Dept Comp Sci &amp; Engn, TR-34980 Istanbul, Turkey</affiliation>
    </creator>
    <creator>
      <creatorName>Cokal, Cahit</creatorName>
      <givenName>Cahit</givenName>
      <familyName>Cokal</familyName>
      <affiliation>Isik Univ, Dept Comp Sci &amp; Engn, TR-34980 Istanbul, Turkey</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Algebraic Break Of Image Ciphers Based On Discretized Chaotic Map Lattices</title>
  </titles>
  <publisher>Aperta</publisher>
  <publicationYear>2011</publicationYear>
  <dates>
    <date dateType="Issued">2011-01-01</date>
  </dates>
  <resourceType resourceTypeGeneral="Text">Journal article</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://aperta.ulakbim.gov.tr/record/17885</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.1016/j.ins.2010.09.009</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="http://www.opendefinition.org/licenses/cc-by">Creative Commons Attribution</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">In this paper, we provide an algebraic cryptanalysis of a recently proposed chaotic image cipher. We show that the secret parameters of the algorithm can be revealed using chosen-plaintext attacks. Our attack uses the orbit properties of the permutation maps to deduce encryption values for a single round. Once a single round encryption is revealed, the secret parameters are obtained using simple assignments. (C) 2010 Elsevier Inc. All rights reserved.</description>
  </descriptions>
</resource>
38
8
görüntülenme
indirilme
Görüntülenme 38
İndirme 8
Veri hacmi 1.2 kB
Tekil görüntülenme 35
Tekil indirme 8

Alıntı yap