Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 53, NO.

12, DECEMBER 2006 2673

Chaotic Cryptosystems: Cryptanalysis and


Identifiability
Floriane Anstett, Gilles Millerioux, and Gérard Bloch

Abstract—A general framework based on the identifiability con-


cept for the cryptanalysis of a large class of chaotic cryptosystems
is proposed. A systematic methodology is provided, in order to
test, a priori, during the design stage, whether the parameters of a
chaotic cryptosystem may play the role of the secret key or not. A Fig. 1. Communication scheme based on chaos.
connection between robustness against brute force attacks, unique-
ness in the parameters and identifiability is pointed out. Two ap-
proaches, the outputs equality approach and the input/output rela- schemes in order to reveal their possible weakness. In [6], a
tion approach, are presented to test the identifiability of the system common framework of basic guidelines (implementation, key
parameters. The second approach is constructive in the sense that management, security analysis) is provided, aiming at assisting
not only it allows to conclude on the identifiability of the param-
designers of new chaotic cryptosystems to fulfill some basic
eters but it also provides a systematic technique, based on solving
a set of algebraic equations, to retrieve the parameters in the con- cryptographic requirements.
text of a known plaintext attack. It turns out that cryptosystems in- A fundamental assumption in cryptanalysis, first stated by
volving polynomial nonlinearities, chaotic or not, are weak against A. Kerkhoff in 1883 [7], is that the adversary knows all the de-
such an attack, called algebraic attack. tails of the cryptosystem, including the algorithm and its imple-
Index Terms—Algebraic attack, brute force attack, chaotic cryp- mentation, except the secret key, on which the security of the
tosystems, cryptanalysis, identifiability, known plaintext attack. cryptosystem must be entirely based. As for chaotic cryptosys-
tems, the system parameters play a central role because they are
expected to act as the secret key.
I. INTRODUCTION One of the problems of great importance related to this
issue is the parameters recovering. In the related literature,
the Kerkhoff assumption is formulated and a known plaintext
C HAOTIC behavior is one of the most complex dynamics a
nonlinear system can exhibit. Because the signals resulting
from chaotic systems are broadband, noiselike, difficult to pre-
attack, where an information sequence (plaintext) and the
corresponding output sequence (ciphertext) are known, is
dict, the idea of using chaotic systems for information masking considered. In [8]–[10] and [11], the parametric cryptanalysis
has received much attention since the pioneering work of [1]. of different usual schemes based on chaotic systems (Lorenz,
The proposed communication schemes involve a chaotic trans- Rössler, …) is proposed. It is shown that the considered en-
mitter system and a receiver system. The transmitter input is cryption schemes are not sufficiently sensitive to parameter
the information to be masked, the plaintext, and its output is mismatch. In fact, synchronization for decryption can be
the encrypted information, the ciphertext, conveyed to the re- achieved despite the parameter mismatch. This reduces the
ceiver (Fig. 1). Several methods for “hiding” an information set of all possible key values and reducing this key space
signal into a chaotic signal have been proposed in the litera- increases the chance for the adversary to find the actual key
ture. An overview can be found according to the chronology in value. The proposed “error function attack” consists in trying a
[2]–[5] including the chaotic masking, the chaotic switching, the key in the reduced key space and in computing the difference
parameter modulation, the message embedding. These methods between the output of the actual system and the output of
are defined either for continuous-time or discrete-time systems. the candidate system, both of them being forced by the same
In general, the decryption mechanism requires the synchroniza- plaintext. If the difference converges to zero, the actual key is
tion between the transmitter and the receiver. recovered. The reconstruction of the system parameters can
An essential issue for the validation of cryptosystems is the be refined by resorting to adaptive techniques [12]–[17]. See
cryptanalysis, that is the study of attacks against cryptographic also [18] where for the first time, the notion of identifiability is
touched. The basic idea is to adaptively adjust the parameters
Manuscript received November 28, 2005; revised July 10, 2006. This paper
to achieve synchronization with remote chaotic systems. A
was supported by the Agence Nationale pour la Recherche in France (Ref. somewhat different method can be found in [19], [20] where
ANR-05-JCJC-0112-01). This paper was recommended by Associate Editor a chosen ciphertext attack is considered. For such an attack,
Y. Nishio.
The authors are with the Centre de Recherche en Automatique de
the adversary is assumed to control the input of the receiver,
Nancy (CRAN, UMR CNRS 7039), École Supérieure des Sciences the ciphertext, and to analyze the corresponding plaintext
et Technologies de l’Ingénieur de Nancy (ESSTIN), University Henri sequence. It is shown that the parameters can be reconstructed
Poincaré (UHP) 54519 Vandoeuvre Les Nancy Cedex, France (e-mail: by solving a set of algebraic equations. Finally, in [21], another
floriane.anstett@esstin.uhp-nancy.fr; gilles.millerioux@esstin.uhp-nancy.fr;
gerard.bloch@esstin.uhp-nancy.fr). approach for the parameter recovering has been investigated for
Digital Object Identifier 10.1109/TCSI.2006.885979 an encryption scheme involving a Lorenz system. The chaotic
1057-7122/$20.00 © 2006 IEEE

Authorized licensed use limited to: Jesus Leyva-Ramos. Downloaded on March 23,2010 at 20:05:52 EDT from IEEE Xplore. Restrictions apply.
2674 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 53, NO. 12, DECEMBER 2006

system is transformed, by eliminating the state variables, into Having in mind the encryption purposes, we only consider
a system depending only on the information, the output, their the practical case where the system has a single input
derivatives and the parameters. The resulting system is solved and a single output but the following results can be extended
in the parameters. This approach has been also applied to a to the case of multiple inputs and multiple outputs.
chaotic cryptosystem based on the Henon map, in [22] and has We assume that the cryptosystem must face the most basic
been extended to a class of chaotic discrete-time systems in attack, i.e., the brute force attack. This attack consists in trying
[23]. In this case, the derivatives are replaced by the iterates. exhaustively every possible parameter value in the parameter
All these works deal with some identification techniques for space (which is in practice a finite space), in order to retrieve
reconstructing the parameters and most often on some special the secret key [32]. The brute force attack is the most expensive
cases. In this paper, a general framework based on the identifi- one, owing to the exhaustive search. The quicker the brute force
ability concept for the cryptanalysis of a large class of chaotic attack succeeds, the weaker the cryptosystem is. The worst sit-
cryptosystems is proposed. It is provided a systematic method- uation for the eavesdropper, and the best for the security, is that
ology for testing, a priori, during the design stage, whether there exists a unique solution. In this case, the probability of
the parameters of a chaotic cryptosystem may play the role of finding the actual parameter value is the lowest. The key idea
the secret key or not. Besides, a connection between robust- is that the uniqueness of the parameters is directly linked to the
ness against brute force attacks, uniqueness in the parameters parametric identifiability concept [33]. Some basic backgrounds
and identifiability is pointed out. Some preliminary results have are recalled below.
been presented in [25]. Let us stress that the methodology is
independent of the approach one may resort to reconstruct the B. Identifiability
parameters (adaptive, …). The following definitions are borrowed from [34].
The paper is organized as follows. In Section II, a connection Definition 1: An input sequence over a window of iterations
between uniqueness in the secret parameters and identifiability , denoted by , is called an admissible input on
is pointed out. Two approaches, the outputs equality approach if the difference equation (1) admits a unique local solution.
and the input/output relation approach, are presented to test the Definition 2: The system is locally strongly -identifi-
identifiability of the system parameters. Then, in Section III, able at through the admissible input sequence if there
a cryptanalytic procedure, based on the identifiability concept, exists an open neighborhood of , , such that for any
is carried out on some specific examples. It is shown that and for any
cryptosystems with polynomial nonlinearities are unfortunately
weak against known plaintext attacks. Throughout the manu- (2)
script, we only consider discrete-time systems but the results
still hold in the continuous case. Definition 3: The system is structurally identifiable if
there exist , an open subset and some dense sub-
II. PROBLEM STATEMENT AND IDENTIFIABILITY sets and , such that, for every ,
and , the system is locally strongly
A. Problem Statement -identifiable at through the admissible input sequence .
In the following, we will equally say that the system or its
Among the different usual methods for hiding an informa- parameters are structurally identifiable.
tion, additive masking, chaotic switching, parameter modula- Remark 1: In the definitions above, the subset is open in
tion, message embedding, we focus on the last one because all order to avoid considering an atypical set of zero measure which
the results given here can be easily transposed to the others. leads to singularities and where no conclusion about identifia-
We recall the message embedding scheme, in the discrete- bility is possible. Moreover, these definitions are given for the
time case, which involves the transmitter system given by initial condition taken at the particular time step . How-
the general form ever, we can consider any time step because the system (1) is
shift-invariant.
(1) Remark 2: The Definition 3 is a direct discrete-time coun-
terpart of that of the structural identifiability of continuous-time
where is the state vector, the systems, given in [35] and is equivalent to the definition of ra-
measured, and so available, output, the in- tional identifiability of [36].
formation signal, is a nonlinear chaotic function and a To test the identifiability of system parameters, two ap-
(possibly) nonlinear function, both parameterized by , proaches, the outputs equality approach and the input/output
, the parameter vector. The most relation approach can be performed.
common nonlinearities are of polynomial type (Henon map
[26], Logistic map [27], Mandelbrot map [28], Arnold’s cat map C. Outputs Equality Approach
[29], …). means that can depend on but not nec- The outputs equality approach is directly based on Definition
essary. The initial condition of will be denoted . At the 3. The trajectories contain information about the unknown
receiver side, the information recovering requires a synchro- parameter vector . The approach consists in testing whether the
nization mechanism. Details of chaos-based synchronization are equality of the output trajectories of systems and , over an
described in [30], [31]. iteration window , implies the equality of the parameter

Authorized licensed use limited to: Jesus Leyva-Ramos. Downloaded on March 23,2010 at 20:05:52 EDT from IEEE Xplore. Restrictions apply.
ANSTETT et al.: CHAOTIC CRYPTOSYSTEMS 2675

vectors and . So, the following theorem states a sufficient To obtain (4), we must first eliminate the variable and its
condition for structural identifiability of system (1). iterates in (1), considered as indeterminates. That leads to a re-
Theorem 1: The system (1) is structurally identifiable if lation depending only on the parameter vector , the output ,
the set of equations the input and their iterates, called the input/output relation

(3) (6)

where is the observability index of the system (1) [38] and


has a unique solution for , that is .
.
The proof is a direct consequence of the implication (2).
Important Remarks: It is worth pointing out that this ap-
Remark 3: In the case of continuous-time systems, this ap-
proach is constructive. It allows not only to conclude on the pa-
proach is formulated as the Taylor series expansion approach
rameter identifiability but also provides a way for retrieving the
[37]. To test their equality, the output trajectories are approxi-
parameters in the context of a known plaintext attack. Indeed,
mated by their Taylor series expansions, whose coefficients are
regarding (5), both the input and the output must be known.
unique and contain information about the parameters. The aim is
For chaotic cryptosystems involving polynomial nonlineari-
then to test whether the equality of the coefficients of the Taylor
ties, the functions and in (4) are polynomials and (5) can
series expansions implies the equality of the parameter vectors
be easily obtained. As a result, the chaotic cryptosystems in-
and or not.
volving polynomial nonlinearities can be always easily broken
Remark 4: is a positive integer and represents the number
and that reveals their weakness. The corresponding attack is
of iterations required to prove that (3) . If goes to
called a known plaintext algebraic attack.
infinity and the previous relation cannot be proved, no conclu-
In the following, two approaches for the state elimination,
sion on structural identifiability can be given. As is unknown
the Gröbner bases approach and the characteristic set approach,
a priori, Theorem 1 is only a sufficient condition of structural
dedicated to polynomial nonlinearities, are presented.
identifiability.
1) Gröbner Bases Approach: The method of the Gröbner
Besides, to recover , Theorem 1 requires the knowledge of
bases is borrowed from the algebra. The first algorithm of this
the initial condition. Actually, to test the structural identifia-
type is due to [39] and has been first applied for identifiability
bility, there exists another method which is independent of the
purposes by [35] in the case of continuous-time systems. Some
initial condition: the input/output relation approach, detailed in
notions of differential algebra can be found in [40] for contin-
the next section.
uous-time systems. However, they can equally be defined with
the derivative operator (continuous-time case) or with the delay
D. Input/Output Relation Approach operator (discrete-time case). Some recalls in the case of dis-
crete-time systems are carried out below.
The following theorem is a discrete-time counterpart of the Consider a system of the polynomial ring, denoted by
theorem given in [35] for continuous-time systems. It formu- where the indeterminates are the state
lates a necessary and sufficient condition for the parametric vector components, , and the coefficients are real
structural identifiability. numbers.
Theorem 2: The system (1) is structurally identifiable if Definition 4: An ideal of is a subset of , such that, for
and only if there exists two integers and such polynomials and :
that the equations (1) can be rearranged in a linear regression • , , ;
such that, for ( is the dimension of the parameter • , , .
vector) For the system (1) with polynomial nonlinearities, the ideal
is the set of all the linear combinations of (1) and their
iterates.
Definition 5: A lexicographic order is a ranking according to
(4) the names of the variables and their iterates such that:
• , ;
where and are functions depending only on , and
• , , , ;
on their iterates.
If Theorem 2 holds, it is clear that every parameter can • , , .
be written as To obtain (6), the variables of (1) to be eliminated are considered
as the greatest.
If a given pair satisfies (1), it will also satisfy the
(5) equations obtained by addition, multiplication, and iteration of
(1), that are the equations of the ideal associated to (1). For a
unless vanishes. The condition is called the persistent given lexicographic order, it then suffices to find a basis of this
excitation (PE) condition. The set of values of and cor- ideal such that one expression of the basis does no longer con-
responding to is a set of zero measure, in general. This tain the variables , but only , , their iterates and . This
set of zero measure is omitted because we only consider the set expression is of the form (6). Such a basis is called a Gröbner
of admissible inputs (Definition 1). basis. A more formal definition of the Gröbner bases can be

Authorized licensed use limited to: Jesus Leyva-Ramos. Downloaded on March 23,2010 at 20:05:52 EDT from IEEE Xplore. Restrictions apply.
2676 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 53, NO. 12, DECEMBER 2006

found in [39] and a theorem of variable elimination based on


this method is detailed in [41]. • The input/output relation (6) is iterated up to the dimension
Another way of eliminating the state vector in (1) to obtain of the parameter vector, in order to get as much equations
the relation (6) is called the characteristic set approach and is as unknowns
detailed in the next section.
2) Characteristic Set Approach: The theory of the character-
istic set was introduced by Ritt [42]. Before explaining what is ..
a characteristic set, the following definitions are required. .
Definition 6: Given a lexicographic order and a polynomial (8)
, the leader of the polynomial is the highest ranked
iterate of the variables appearing in . where is and .
Definition 7: A polynomial is reduced with respect to a • From (8) , we check if the relations (4) or equivalently (5) can
polynomial if contains neither the leader of with equal be obtained for every parameter.
or greater algebraic degree, nor its iterates. A set of polynomials
that are all reduced with respect to each The proposed method can be extended for the continuous-
other is called an autoreduced set. time systems. In this case, we consider the derivatives instead
Two autoreduced sets, and of the iterates.
, ordered in increasing rank with respect to
their leaders so that , III. PARAMETRIC CRYPTANALYSIS
, are ranked according to the following principle. In this section, the parametric cryptanalysis of usual chaotic
• If there exists an integer , such that discrete-time cryptosystems involving polynomial nonlineari-
for and ties is carried out through the concept of identifiability. The con-
, then is of lower rank than text, given at the beginning of the paper, is briefly recalled.
. For assessing the security of a cryptosystem, it must be tested,
• If and for , then a priori, during the design stage, whether the parameters may
is also of lower rank than . play the role of the secret key or not. It is assumed that the eaves-
Definition 8: A lowest rank autoreduced set that can be dropper is supposed to know the structure of the system and the
formed with polynomials belonging to a given set of polyno- signal , as usual in cryptography [7]. It is tested whether the
mials is called a characteristic set. cryptosystem to be designed is able to face two kinds of attacks.
The characteristic set of system (1) is of the triangular form The first attack to face is the brute force attack which consists
in trying exhaustively every possible value for the parameters.
For assessing the security in this context, we check if the param-
eters are identifiable, i.e., a given input/output behavior corre-
.. sponds to a unique value for the parameters. This situation is the
. best for the security of the cryptosystem as previously pointed
out.
The second attack to face is the known plaintext attack where
the eavesdropper chooses a sequence and analyzes the
corresponding sequence . For assessing the security in this
(7) context, we check if the parameters can be easily recovered by
the input/output relation approach. This approach corresponds
The relation represents the input/output relation (6). to an algebraic attack.
Note that each component of the state vector can also be These distinct attacks along with the two approaches, namely,
expressed from , as a function only depending the outputs equality approach and the input/output relation ap-
on the input, the output, their iterates and the parameters. This proach, are illustrated through two examples.
is due to the triangular form of (7). So, the initial condition
can be deduced from . A. Example 1
3) Summary: The proposed method is summed up by the Consider the message embedding scheme (1) where the in-
following steps. formation is embedded in the Henon map [26]

• The system (1) is iterated times, where is the observability


index of system (1). Usually, is equal to the dimension (9)
of the system.
• The Gröbner bases or the characteristic set associated to the In this example, the structural identifiability of the parameter
system (1) and its iterates is computed in order to obtain the vector ( ) is only treated
input/output relation (6). This can be achieved with symbolic through the input/output relation approach where the state is
computation software (Maxima, Maple, …). eliminated with the Gröbner bases approach.

Authorized licensed use limited to: Jesus Leyva-Ramos. Downloaded on March 23,2010 at 20:05:52 EDT from IEEE Xplore. Restrictions apply.
ANSTETT et al.: CHAOTIC CRYPTOSYSTEMS 2677

Since is not directly transmitted through the signal , it So, only is identifiable and thus could play the role of
is chosen to be the greatest and the corresponding lexicographic the secret key in the context of brute force attack. At the op-
order is posite, since there exist at least numerous pairs or
verifying the relations (12) and (13), the parameters
(10) , and are unidentifiable and cannot play the role of
the secret key.
It can be shown that the observability index of system (9) is As stressed in the important remarks in Section II-D, ac-
equal to the dimension of the system, . cording to (5) and here (14), it is clear that, performing a known
For obtaining the input/output relation, that is , the plaintext attack, the parameter can be easily reconstructed
system (9) is first iterated twice with and in (15). Hence, cannot finally play the role
of the secret key.
As a result, this cryptosystem will be weak against a known
plaintext attack.

(11) B. Example 2
Consider the message embedding scheme (1) where the in-
formation is embedded in the Burgers map [43]

The software Maxima, available for free at http://maxima. (16)


sourceforge.net, computes, with the function poly_buchberger,
the Gröbner basis of the ideal associated to system (11), with
the lexicographic order (10). One of the Gröbner basis expres-
The initial condition is .
sions is the input/output relation (6)
In the following, the structural identifiability of the parameter
vector ( ) is tested respectively with the out-
(12)
puts equality and the input/output relation approach.
1) Outputs Equality Approach: The values of the output tra-
The other expressions of the basis are useless for our purpose
jectory are denoted for short by . One
since they involve the state vector. Then, the input/output rela-
has
tion (12) is iterated and yields ,
and , respectively

(13) (17)

From the set of (12) and (13), it can be shown, for example by The condition (3) gives here
using the function solve of Maxima, that the relation (4) is only
fulfilled for
(18)
(19)
(14)

with

(20)

Equation (18) is trivial and always fulfilled. Assuming that


and respectively, (19) leads to
and then, (20) leads to . As a result, Theorem 1 is
fulfilled for . Consequently, the parameters and
(15) are structurally identifiable.

Authorized licensed use limited to: Jesus Leyva-Ramos. Downloaded on March 23,2010 at 20:05:52 EDT from IEEE Xplore. Restrictions apply.
2678 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 53, NO. 12, DECEMBER 2006

Note that and is a zero measure ( with


and do not belong to ) that leads to a singularity and
no conclusion about parametric identifiability is possible.
Besides, to retrieve the parameters from system (17), the ini-
tial condition is needed. The input/output relation approach,
independent of the initial condition, is applied in the following.
2) Input/Output Relation Approach: For obtaining the input/
output relation, that is , the system (16) is first iterated up
to its observability index that is also its dimension ( )

(21)

(26)

The state is not directly transmitted through . Hence,


is chosen to be the greatest in the following lexicographic Thus, Theorem 2 is fulfilled and and are structurally
ranking: identifiable.
Characteristic Set Approach: The set of polynomials
defining system (16) are
(22)

Gröbner Bases Approach: The software Maxima computes,


with the function poly_buchberger, the Gröbner basis of the
ideal associated to (21), with the lexicographic order (22). One (27)
of the Gröbner basis expressions is the input/output relation

According to the lexicographic order (22), the leader of is


, the leader of is and the leader of is . To
compute the characteristic set, polynomials and must be
(23) reduced with respect to polynomial . It gives

The other expressions of the basis are useless for our purpose
since they involve the state vector. Then, the input/output rela-
tion (23) is iterated and yields
(28)

The leader of is and the state or its iterates does


no longer appear in . Consequently, is reduced with re-
(24)
spect to . The leader of is still . As the state and
its iterates do not appear in , is reduced with respect to
Equations (23) and (24) can be rewritten in the form (4) for . However, polynomial must be reduced with respect to
every parameter. Indeed, the function solve of Maxima com- . It leads to
putes successfully

(25)
(29)

Authorized licensed use limited to: Jesus Leyva-Ramos. Downloaded on March 23,2010 at 20:05:52 EDT from IEEE Xplore. Restrictions apply.
ANSTETT et al.: CHAOTIC CRYPTOSYSTEMS 2679

The leader of is now . It is reduced with respect to . ACKNOWLEDGMENT


The polynomials , and are all autoreduced and the The authors would like to thank the anonymous reviewers for
characteristic set is given by their valuable suggestions and the proposed references.

REFERENCES
[1] T. L. Carroll and L. M. Pecora, “Synchronizing chaotic circuits,” IEEE
Trans. Circuits Syst., vol. 38, no. 4, pp. 453–456, Apr. 1991.
[2] M. J. Ogorzalek, “Taming chaos – Part I: Synchronization,” IEEE
Trans. Circuits Syst. I, Fundam. Theory Appl., vol. 40, no. 10, pp.
693–699, Oct. 1993.
[3] M. Hasler, “Synchronization of chaotic systems and transmission of
information,” Int. J. Bifurc. Chaos, vol. 8, no. 4, pp. 647–659, Apr.
1998.
[4] T. Yang, “A survey of chaotic secure communication systems,” Int. J.
(30) Comput. Cogn., vol. 2, no. 2, pp. 81–130, 2004.
[5] G. Millérioux, A. Hernandez, and J. Amigó, “Conventional cryptog-
raphy and message-embedding,” in Proc. 2005 Int. Symp. Nonlinear
In the characteristic set (30), represents the input/output Theory and its Applications (NOLTA 2005), Bruges, Belgium, Oct.
relation and is identical to (23) given by the Gröbner basis ap- 18–21, 2005.
[6] G. Alvarez and S. Li, “Some basic cryptographic requirements for
proach. Hence, Theorem 2 is fulfilled and the parameters chaos-based cryptosystems,” Int. J. Bifurc. Chaos, 2006.
and are structurally identifiable. [7] H. Delfs and H. Knebl, Introduction to Cryptography. Berlin, Ger-
In the context of brute force attack, since the parameters many: Springer-Verlag, 2002.
and are identifiable, they could play the role of the secret [8] X. Wang, M. Zhan, and C. H. Lai, “Error function attack of chaos
synchronization based encryption schemes,” Chaos, vol. 14, no. 1, pp.
key. 128–137, 2004.
However, it is clear that, performing a known plaintext at- [9] S. Li, G. Alvarez, G. Chen, and X. Mou, “Breaking a chaos-noise-based
tack, the parameters and can be easily reconstructed. secure communication scheme,” Chaos, vol. 15, no. 1, 2005.
[10] G. Alvarez, F. Montoya, M. Romera, and G. Pastor, “Cryptanalyzing
Hence, this cryptosystem is weak against known plaintext alge- a discrete-time chaos synchronization secure communication system,”
braic attack. Chaos, Solitons, Fractals, vol. 21, pp. 689–694, 2004.
[11] G. Alvarez, S. Li, F. Montoya, G. Pastor, and M. Romera, “Breaking
IV. CONCLUSION projective chaos synchronization secure communication using filtering
and generalized synchronization,” Chaos, Solitons, Fractals, vol. 24,
In this paper, a general framework based on identifiability for pp. 775–783, 2005.
the cryptanalysis of a large class of chaotic cryptosystems is pro- [12] R. Marino and P. Tomei, “Global adaptive observers for nonlinear sys-
tems via filtered transformations,” IEEE Trans. Autom. Contr., vol. 37,
posed. More precisely, it is provided a systematic methodology no. 8, pp. 1239–1245, 1992.
to test, a priori, during the design stage, whether the parameters [13] A. Fradkov, H. Nijmeijer, and A. Markov, “Adaptive observer-based
of a chaotic cryptosystem may play the role of the secret key or synchronization for communication,” Int. J. Bifurc. Chaos, vol. 10, no.
not. From a cryptanalysis point of view, this paper leads to the 12, pp. 2807–2813, 2000.
[14] Q. Zhang and A. Xu, “Global adaptive observer for a class of nonlinear
following conclusions. systems,” in Proc. 40th IEEE Conf. Decision and Control, Orlando, FL,
Firstly, if the parameter vector of the transmitter is identifi- Dec. 4–7, 2001, vol. 4, pp. 3360–3365.
able, it is more difficult for the eavesdropper to find it by a brute [15] A. Guyader and Q. Zhang, “Adaptive observer for discrete time linear
time varying systems,” in Proc. 3rd IFAC/IFORS Symp. Identification
force attack (exhaustive search). Consequently, this parameter
and System Parameter Estimation, SYSID’2003, Rotterdam, The
vector may be a good candidate to play the role of the secret Netherlands, Aug. 2003.
key against a brute force attack. [16] F. Anstett, G. Millerioux, and G. Bloch, “Global adaptive synchroniza-
If the parameter vector is not identifiable, the eavesdropper tion based upon polytopic observers,” in Proc. IEEE Int. Symp. Circuits
Syst., Vancouver, BC, Canada, May 2004, pp. 728–731.
has a higher favorable chance to find it by a brute force attack. [17] G. Millerioux, F. Anstett, and G. Bloch, “Considering the attractor
Thus, this parameter vector is a bad candidate to play the role structure of chaotic maps for observer-based synchronization prob-
of the secret key against a brute force attack. lems,” Math. Comput. Simulation, vol. 68, no. 1, pp. 67–85, 2005.
Secondly, if the parameters are identifiable, which is a neces- [18] H. Dedieu and M. Ogorzalek, “Identifiability and identification of
chaotic systems based on adaptative synchronization,” IEEE Trans.
sary condition for the security against brute force attack, obvi- Circuits Syst. I, Fundam. Theory Appl., vol. 44, no. 10, pp. 948–962,
ously not sufficient since sensitivity or specific statistical prop- Oct. 1997.
erties are also required, an explicit form of each parameter can [19] H. Guojie, F. Zhengjin, and M. Ruiling, “Chosen ciphertext attack on
chaos communication based on chaotic synchronization,” IEEE Trans.
be established. For cryptosystems involving polynomial nonlin- Circuits Syst. I, Fundam. Theory Appl., vol. 50, no. 2, pp. 275–279,
earities of low order, it is an easy task and thus, the parameters Feb. 2003.
can be easily retrieved by a known plaintext attack. [20] H. Guojie, F. Zhengjin, and W. Lin, “Analysis of a type digital chaotic
As a consequence, all these cryptosystems are weak against cryptosystem,” in Proc. IEEE Int. Symp. Circuits Syst. , Scottsdale, AZ,
May 26–29, 2002, vol. 3, pp. III–473–III–475.
algebraic attacks. Let us point out that this weakness is indepen- [21] P. G. Vaidya and S. Angadi, “Decoding chaotic cryptography without
dent of the motion exhibited by the system, chaotic or not. All access to the superkey,” Chaos, Solitons, Fractals, vol. 17, pp. 379–386,
these results can be easily extended to the case of continuous- 2003.
[22] E. Solak, “On the security of a class of discrete-time chaotic cryptosys-
time chaotic systems and can be transposed to the other usual
tems,” Phys. Lett. A, no. 320, pp. 389–395, 2004.
methods for hiding an information, additive masking, chaotic [23] ——, “Cryptanalysis of observer based discrete-time chaotic encryp-
switching and parameter modulation. tion schemes,” Int. J. Bifurc. Chaos, vol. 15, no. 2, pp. 653–658, 2005.

Authorized licensed use limited to: Jesus Leyva-Ramos. Downloaded on March 23,2010 at 20:05:52 EDT from IEEE Xplore. Restrictions apply.
2680 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 53, NO. 12, DECEMBER 2006

[24] T. Beth, D. E. Lazic, and A. Mathias, Cryptanalysis of Cryptosystems Floriane Anstett received the Engineer’s degree
Based on Remote Chaos Replication. New York: Springer-Verlag, in automatic control engineering from the École
1994. Supérieure des Sciences et Technologies de l’In-
[25] F. Anstett, G. Millerioux, and G. Bloch, “Message-embedded cryp- génieur de Nancy (ESSTIN), University Henri
tosystems: Cryptanalysis and identifiability,” in Proc. 44th IEEE Conf. Poincaré (UHP), Nancy, France, in 2003, and the
Decision and Control, Sevilla, Spain, Dec. 12–15, 2005. Ph.D. degree in automatic control theory from UHP,
[26] M. Hénon, “A two-dimensional mapping with a strange attractor,” Nancy, France, in 2006.
Commun. Math. Phys., vol. 50, pp. 69–77, 1976. Her research interests include chaotic systems,
[27] R. May, “Simple mathematical models with complicated dynamics,” polytopic observers, identifiability and cryptanalysis.
Nature, vol. 261, pp. 459–470, 1976.
[28] B. Mandelbrot, Les Objets Fractals: Forme, Hasard et Dimension.
Paris, France: Flammarion, 1975.
[29] H. G. Schuster, Deterministic Chaos. New York: Wiley-VCH, 1988.
[30] G. Millerioux and J. Daafouz, “Unknown input observers for mes- Gilles Millerioux received the Engineer’s degree in
sage-embedded chaos synchronization of discrete-time systems,” Int. electrical engineering and the Ph.D. degree in auto-
J. Bifurc. Chaos, vol. 14, no. 4, pp. 1357–1368, Apr. 2004. matic control theory from the National Institute for
[31] ——, “Input independent chaos synchronization of switched systems,” Applied Sciences of Toulouse, Toulouse, France, in
IEEE Trans. Autom. Contr., vol. 49, no. 7, pp. 1182–1187, Jul. 2004. September 1993 and 1997, respectively.
[32] A. Menezes, P. V. Oorschot, and S. Vanstone, Handbook of Applied Since 2005, he has been a Professor at the Uni-
Cryptography. Boca Raton, FL: CRC, 1996. versity Henri Poincaré (UHP), Nancy, France. He
[33] E. Walter and L. Pronzato, Identification of Parametric Models From is with the Centre de Recherche en Automatique de
Experimental Data. New York: Springer-Verlag, 1997. Nancy (CRAN) and his research interests include
[34] S. Nõmm and C. H. Moog, “Identifiability of discrete-time non- chaotic systems, chaos synchronization, cryptog-
linear systems,” in Proc. 6th IFAC Symp. Nonlinear Control Systems, raphy, nonlinear observers. He is vice-chair of the
NOLCOS, Stuttgart, Germany, Sep. 1–3, 2004, pp. 477–489. Action Group “Chaos, Synchronization and Control.” This Group is under the
[35] L. Ljung and T. Glad, “On global identifiability for arbitrary model aegis of the IEEE Control Systems Society Technical Committee on Computer
parametrizations,” Automatica, vol. 30, no. 2, pp. 265–276, 1994. Aided Control System Design and aims at making visible research activities
related to chaos synchronization and control.
[36] S. Diop and M. Fliess, “Nonlinear observability, identifiability and
persistent trajectories,” in Proc. 30th Conf. Decision and Control,
Brighton, U.K., Dec. 1991, pp. 714–718.
[37] H. Pohjanpalo, “System identifiability based on the power series ex-
pansion of the solution,” Math. Biosci., vol. 41, pp. 21–33, 1978. Gérard Bloch received the Ph.D. degree in automatic
[38] H. Nijmeijer and A. J. van der Schaft, Nonlinear Dynamical Control control from the University Henri Poincaré (UHP),
Systems. New York: Springer, 1990. Nancy, France, in 1988.
[39] B. Buchberger, “An algorithm for finding a basis for the residue class He is with the École Supérieure des Sciences et
Technologies de l’Ingénieur de Nancy (ESSTIN),
ring of zero-dimensional polynomial ideal,” Ph.D. dissertation, Dept.
UHP, and affiliated with the Centre de Recherche
of Math., Math. Inst. Univ. of Innsbrück, Innsbrück, Austria, 1965.
en Automatique de Nancy (CRAN, UMR CNRS
[40] E. Kolchin, Differential Algebra and Algebraic Groups. New York: 7039), Nancy, France. His research interests include
Academic, 1973. nonlinear system identification and observation,
[41] E. Frisk, “Residual generation for fault diagnosis,” Ph.D. dissertation, process diagnosis, machine learning and application
Dept. of Elect. Eng., Linköpings Universitet, Linköping, Sweden, of neural networks to automatic control problems.
2001. He has supervised 11 doctoral and 20 Master’s graduates and has been the
[42] J. F. Ritt, Differential Algebra. Providence, RI: American Mathemat- principal investigator of several industrial/government research contracts,
ical Society, 1950. particularly in the applied fields of steel industry, guided transports, automobile
[43] J.-P. Barbot, “Observability bifurcations: Application to cryptog- engine control. He has co-authored one book, about 30 papers in international
raphy,” in Proc. 4ème Ecole Internationale d’Automatique de Lille, journals and more than 50 papers in conference proceedings.
2003, pp. 1–19.

Authorized licensed use limited to: Jesus Leyva-Ramos. Downloaded on March 23,2010 at 20:05:52 EDT from IEEE Xplore. Restrictions apply.

You might also like