Comment on "Novel Public Key Encryption Technique Based on Multiple Chaotic Systems" (Phys. Rew. Lett. 95, 2005)
Wang Kai,Pei Wen-jiang,Zou Liu-hua,He Zhen-ya
2005-01-01
Abstract:size of the key and the computational complexity of the linear functions respectively. In this paper, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the public keys and the initial vector, one can calculate the secret key based on Parsevala's theorem. Both theoretical and experimental results show that the attacker can access to the secret key without difficulty. The lack of security discourages the use of such algorithm for practical applications. PACS numbers: 05.45.Vx, 89.70.+c Chaotic systems are characterized by ergodicity, sensitive dependence on initial conditions and random-like behaviors, properties which seem pretty much the same required by several cryptographic primitive characters such as "diffusion" and "confusion". So far, the constructing of secret-key cryptosystems, which are mostly based on both chaotic synchronization and chaos-based pseudorandom bit generator, has attracted a great deal of attention, and plenty of chaos-based stream ciphers and block ciphers had been presented in the past (2, 3). While all the currently used public-key cryptosystems based on number theory work well for both encryption and digital signatures, it is of much importance to construct public-key cryptosystems by chaotic dynamics and there have been some attempts along this line. In Ref. (4, 5), a public key cryptosystems and modification, which are based on distributed dynamics encryption, had been proposed. In those schemes, a high-dimensional dissipative dynamical system is separated into two parts. The binary message is characterize by different attractors, which are named as the 0-attractor and the 1-attractor, in the whole system. An authorized receiver knows the full dynamics and can simulate the system a priori in order to find the state space location of the two different attractors. This receiver is able to decode the message by observing the convergence of the system trajectory to the 0-attractor or to the 1-attractor in a reconstructed phase space. In Ref. (6), a RSA like public key algorithm based on the semigroup property of the Chebyshev map and the Jacobian Elliptic Chebyshev Rational map had been presented, and this algorithm had been used to design the key agreement scheme, deniable authentication scheme and Hash function (7). Unfortunately, the later studies show that this scheme is vulnerable to some sophisticated attack because the semigroup property provides a lot of public keys from a public key with a fixed private key (8, 9), and the modification, designed along the same lines of the