Skip to main content
Article thumbnail
Location of Repository

Modified chaotic shift keying using indirect coupled chaotic synchronization for secure digital communication

By Rupak Kharel, Krishna Busawon and Zabih Ghassemlooy

Abstract

In this paper, a modified chaotic shift keying method is proposed to transmit digital bits securely over a communication channel. The scheme is based upon encrypting the digital bits 0 and 1 into infinite levels by applying the keystream such that there is no recognisable pattern in the encoded transmitted signal. The encoded transmitting signal generated is shown to resist popular attack method therefore realizing a secure and trustworthy digital communication system

Topics: H600, H900
Year: 2010
OAI identifier: oai:nrl.northumbria.ac.uk:7539

Suggested articles

Citations

  1. (2003). A secure communciation scheme based on the phase synchronization of chaotic systems,"
  2. (2004). A secure communication scheme using projective chaos synchronization,"
  3. (2004). A survey of chaotic secure communication systems,"
  4. (2004). A zero-crossing approach to uncover the mask by chaotic encryption with periodic modulation,"
  5. (2004). Analyzing and improving a chaotic encryption method,"
  6. (1998). Application of neural networks to unmasking chaotic secure communication,"
  7. (2005). Breaking a choas-based secure scheme designed by an improved modulation method,"
  8. (2004). Breaking a secure communication scheme based on the phase synchronization of chaotic systems,"
  9. (2005). Breaking projective chaos synchronization secure communication using filtering and generalized synchronization,"
  10. (2004). Chaotic encryption with transient dynamics induced by pseudorandom switching keys,"
  11. (1998). Cryptanalyzing chaotic secure communication using return maps,"
  12. (1995). Extracting messages masked by chaos,"
  13. (1999). Extracting messages masked by chaotic signals of timedelay systems,"
  14. (2004). Improving the security of chaotic encryption by using a simple modulating method,"
  15. (2009). Indirect coupled oscillators for keystream generation in secure chaotic communication,"
  16. (2006). Return-Map Cryptanalysis Revisited,"
  17. (2001). Secure digital signal transmission by multistep parameter modulation and alternative driving of transmitter variables,"
  18. (2008). Time Scaling of Chaotic Systems: Application to Secure Communications,"
  19. (1998). Unmasking a hyperchaotic communication scheme,"

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.