2,955 research outputs found

    Secure Communication Based on Hyperchaotic Chen System with Time-Delay

    Get PDF
    This research is partially supported by National Natural Science Foundation of China (61172070, 60804040), Fok Ying Tong Education Foundation Young Teacher Foundation(111065), Innovative Research Team of Shaanxi Province(2013KCT-04), The Key Basic Research Fund of Shaanxi Province (2016ZDJC-01), Chao Bai was supported by Excellent Ph.D. research fund (310-252071603) at XAUT.Peer reviewedPostprin

    Cryptographic requirements for chaotic secure communications

    Get PDF
    In recent years, a great amount of secure communications systems based on chaotic synchronization have been published. Most of the proposed schemes fail to explain a number of features of fundamental importance to all cryptosystems, such as key definition, characterization, and generation. As a consequence, the proposed ciphers are difficult to realize in practice with a reasonable degree of security. Likewise, they are seldom accompanied by a security analysis. Thus, it is hard for the reader to have a hint about their security. In this work we provide a set of guidelines that every new cryptosystems would benefit from adhering to. The proposed guidelines address these two main gaps, i.e., correct key management and security analysis, to help new cryptosystems be presented in a more rigorous cryptographic way. Also some recommendations are offered regarding some practical aspects of communications, such as channel noise, limited bandwith, and attenuation.Comment: 13 pages, 3 figure

    A Practical Realization of a Return Map Immune Lorenz Based Chaotic Stream Cipher in Circuitry

    Get PDF
    Some chaotic systems are advantageously capable of self-synchronizing with a like system through a single shared state. Using a plain text binary message, a single system parameter can be modulated to mask this message and transmit it securely through the single shared state. The most simple implementations of this encryption technique are, however, vulnerable to the return map attack. Using a time-scaling factor to further obfuscate the modulation process, a return map attack immunity is gained. We report on the progress towards a realization of this process in real-time analog circuitry using off-the-shelf components

    Constructing multiwing attractors from a robust chaotic system with non-hyperbolic equilibrium points

    Get PDF
    We investigate a three-dimensional (3D) robust chaotic system which only holds two nonhyperbolic equilibrium points, and finds the complex dynamical behaviour of position modulation beyond amplitude modulation. To extend the application of this chaotic system, we initiate a novel methodology to construct multiwing chaotic attractors by modifying the position and amplitude parameters. Moreover, the signal amplitude, range and distance of the generated multiwings can be easily adjusted by using the control parameters, which enable us to enhance the potential application in chaotic cryptography and secure communication. The effectiveness of the theoretical analyses is confirmed by numerical simulations. Particularly, the multiwing attractor is physically realized by using DSP (digital signal processor) chip

    Grid Multiscroll Hyperchaotic Attractors Based on Colpitts Oscillator Mode with Controllable Grid Gradient and Scroll Numbers

    Get PDF
    AbstractThrough introducing two piecewise-linear triangular wave functions in a three-dimensional spiral chaotic Colpitts oscillator model, a four-dimensional grid multiscroll hyperchaotic system is constructed. Interestingly, by adjusting a build-in parameter in a variable of one triangle wave function, the control of the gradient of the multiscroll grid is achieved. Whereas by deploying the zero points of the two triangular wave functions to extend the saddle-focus equilibrium points with index-2 in phase space the scroll numbers do not only increase along with the number of turning points, but they can also generate arbitrary multiples of products. The basic dynamical behaviors of the proposed four-dimensional multiscroll hyperchaotic system are analyzed. Finally, the hardware experimental circuit is designed and the interrelated circuit implementation is realized. The experimental results are in agreement with both theoretical analyses and numerical simulations, which verify the feasibility of the design methods

    Field-programmable gate array design of image encryption and decryption using Chua’s chaotic masking

    Get PDF
    This article presents a simple and efficient masking technique based on Chua chaotic system synchronization. It includes feeding the masked signal back to the master system and using it to drive the slave system for synchronization purposes. The proposed system is implemented in a field programmable gate array (FPGA) device using the Xilinx system generator tool. To achieve synchronization, the Pecora-Carroll identical cascading synchronization approach was used. The transmitted signal should be mixed or masked with a chaotic carrier and can be processed by the receiver without any distortion or loss. For different images, the security analysis is performed using the histogram, correlation coefficient, and entropy. In addition, FPGA hardware co-simulation based Xilinx Artix7 xc7a100t-1csg324 was used to check the reality of the encryption and decryption of the images

    Topics in chaotic secure communication

    Get PDF
    Results in nonlinear dynamics and chaos during this decade have been applied to problems in secure communications with limited success. Most of these applications have been based on the chaotic synchronization property discovered by Pecora and Carroll in 1989 [37]. Short [44, 45, 48] demonstrated the effectiveness of nonlinear dynamic (NLD) forecasting methods in breaking this class of communication schemes. In response, investigators have proposed enhancements to the basic synchronization technique in an attempt to improve the security properties. In this work two of these newer communication systems will be analyzed using NLD forecasting and other techniques to determine the level of security they provide. It will be shown that the transmitted waveform alone allows an eavesdropper to extract the message. During the course of this research, a new impulsively initialized, binary chaotic communication scheme has been developed, which eliminates the most significant weaknesses of its predecessors. This new approach is based on symbolic dynamics and chaotic control, and may be implemented using one-dimensional maps, which gives the designer more control over the statistics of the transmitted binary stream. Recent results in a certain class of one-dimensional chaotic maps will be discussed in this context. The potential for using NLD techniques in problems from standard digital communications will also be explored. The two problems which will be addressed are bit errors due to channel effects and co-channel interference. It will be shown that NLD reconstruction methods provide a way to exploit the short-term determinism that is present in these types of communication signals

    Grid multi-wing butterfly chaotic attractors generated from a new 3-D quadratic autonomous system

    Get PDF
    Due to the dynamic characteristics of the Lorenz system, multi-wing chaotic systems are still confined in the positive half-space and fail to break the threshold limit. In this paper, a new approach for generating complex grid multi-wing attractors that can break the threshold limit via a novel nonlinear modulating function is proposed from the firstly proposed double-wing chaotic system. The proposed method is different from that of classical multi-scroll chaotic attractors generated by odd-symmetric multi-segment linear functions from Chua system. The new system is autonomous and can generate various grid multi-wing butterfly chaotic attractors without requiring any external forcing, it also can produce grid multi-wing both on the xz-plane and yz-plane. Basic properties of the new system such as dissipation property, equilibrium, stability, the Lyapunov exponent spectrum and bifurcation diagram are introduced by numerical simulation, theoretical analysis and circuit experiment, which confirm that the multi-wing attractors chaotic system has more rich and complicated chaotic dynamics. Finally, a novel module-based unified circuit is designed which provides some principles and guidelines for future circuitry design and engineering application. The circuit experimental results are consistent with the numerical simulation results.&nbsp

    Enhancement of speech scrambles using DNA technique and chaotic maps over transformation domain

    Get PDF
    This work presents and describes a new method for speech scrambles in light of chaotic maps and DNA coding. Both a wavelet transform (DWT) and Discrete cosine transform (DCT) are used to change the speech signal into another format for processing. The chaotic maps are represented by Logistic-Chebyshev map (LCH) and Random Logistic map (RLM) which are employed for generating sequences of keys that are used in the proposed system, hence the use of DNA encoding technology as an emerging technology for enhancing the security of speech. The proposed system is illustrated explicitly and tested with various security speech signals metrics, such as the coefficient, signal to noise ratio and peak signal to noise ratio. All tests of the proposed system concluded that the speech signal is reliably secure and undetectable, and hence the proposed system provides a sufficient security level
    corecore