The employed map is simple. Especially, rounding in
is tractable for digital computers. However, it is to
be noted that implementational easiness on hardware is a distinct
matter.
The probability that the only X1's or only X2's are always chosen
in n operations of
is
.
Then, those who intend differential or linear cryptanalysis
must exhaustively solve nonlinear equations
for each of
0.52-n / 2 = 20.94n + 1 pairs of
plaintexts and ciphertexts
(X1,Y1),(X2,Y2).
All the possible fixed points and cycles are repelling with no
essential basin, and there are few short cycles [7,8].
Accordingly, our cryptosystem is strong against
cryptanalysis utilizing them. This is in contrast with
synchronization-based cryptosystems, which requires a substantial
attractive region for robustness.
We required
0.4M<A<0.6M to get rid of pathological
cases. Accordingly,
.
If the key space is
smaller than the plaintext space, the cardinality of the key space
provides an upper limit of security standard
[9]; we must modify FS-CES to obtain the cardinality of
the key space, at least equal to M.
Questions or comments regarding this service? Contact us.
Copyright (C) 2000 R&D Team, AIHARA Electrical Engineering Co., Ltd.
All rights reserved.