Statements in which the resource exists as a subject.
PredicateObject
rdf:type
lifeskim:mentions
pubmed:issue
3
pubmed:dateCreated
2008-12-2
pubmed:abstractText
This paper comments on a recent paper by R. Rhouma and B. Safya [Chaos 17, 033117 (2007)]. They claimed to find some security weakness of the spatiotemporal chaotic cryptosystem suggested by G. Tang et al. [Phys. Lett. A 318, 388 (2003)] and proposed a chosen-plaintext attack to analyze this system. We find that in their analysis, called a "chosen-plaintext attack," they actually act as a legal receiver (with a machine in their hands during the entire decryption process) rather than an attacker and, therefore, the whole reasoning is not valid.
pubmed:commentsCorrections
pubmed:language
eng
pubmed:journal
pubmed:citationSubset
IM
pubmed:status
MEDLINE
pubmed:month
Sep
pubmed:issn
1089-7682
pubmed:author
pubmed:copyrightInfo
(c) 2008 American Institute of Physics.
pubmed:issnType
Electronic
pubmed:volume
18
pubmed:owner
NLM
pubmed:authorsComplete
Y
pubmed:pagination
038102
pubmed:meshHeading
pubmed:year
2008
pubmed:articleTitle
Comment on "On the security of a spatiotemporal chaotic cryptosystem" [Chaos 17, 033117 (2007)].
pubmed:affiliation
School of Sciences, Key Laboratory of Optical Communication and Lightwave, Beijing University of Posts and Telecommunications, Beijing 100876, China.
pubmed:publicationType
Journal Article, Comment