Sciweavers

Share
COMCOM
2004

Breaking network security based on synchronized chaos

8 years 8 months ago
Breaking network security based on synchronized chaos
Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possible and that the proposed encryption approach can be used to secure communications over Internet, we prove that these claims are unfounded, and that the cryptosystem can be broken in different ways. Key words: Chaotic cryptosystems; Cryptanalysis; Network security
Gonzalo Álvarez, Shujun Li
Added 17 Dec 2010
Updated 17 Dec 2010
Type Journal
Year 2004
Where COMCOM
Authors Gonzalo Álvarez, Shujun Li
Comments (0)
books