12 research outputs found

    Return-Map Cryptanalysis Revisited

    Get PDF
    As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes. Recently, a simple defensive mechanism was presented to enhance the security of chaotic parameter modulation schemes against return-map attacks. Two techniques are combined in the proposed defensive mechanism: multistep parameter modulation and alternative driving of two different transmitter variables. This paper re-studies the security of this proposed defensive mechanism against return-map attacks, and points out that the security was much over-estimated in the original publication for both ciphertext-only attack and known/chosen-plaintext attacks. It is found that a deterministic relationship exists between the shape of the return map and the modulated parameter, and that such a relationship can be used to dramatically enhance return-map attacks thereby making them quite easy to break the defensive mechanism.Comment: 11 pages, 7 figure

    Design and Implementation of Secure Chaotic Communication Systems

    Get PDF
    Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mismatches, mixing property, deterministic dynamics, structure complexity, to mention a few, that map nicely with cryptographic requirements such as confusion, diffusion, deterministic pseudorandomness, algorithm complexity. Furthermore, the possibility of chaotic synchronization, where the master system (transmitter) is driving the slave system (receiver) by its output signal, made it probable for the possible utilization of chaotic systems to implement security in the communication systems. Many methods like chaotic masking, chaotic modulation, inclusion, chaotic shift keying (CSK) had been proposed however, many attack methods later showed them to be insecure. Different modifications of these methods also exist in the literature to improve the security, but almost all suffer from the same drawback. Therefore, the implementation of chaotic systems in security still remains a challenge. In this work, different possibilities on how it might be possible to improve the security of the existing methods are explored. The main problem with the existing methods is that the message imprint could be found in the dynamics of the transmitted signal, therefore by some signal processing or pattern classification techniques, etc, allow the exposition of the hidden message. Therefore, the challenge is to remove any pattern or change in dynamics that the message might bring in the transmitted signal

    Synchronicity From Synchronized Chaos

    Get PDF
    The synchronization of loosely coupled chaotic oscillators, a phenomenon investigated intensively for the last two decades, may realize the philosophical notion of synchronicity. Effectively unpredictable chaotic systems, coupled through only a few variables, commonly exhibit a predictable relationship that can be highly intermittent. We argue that the phenomenon closely resembles the notion of meaningful synchronicity put forward by Jung and Pauli if one identifies "meaningfulness" with internal synchronization, since the latter seems necessary for synchronizability with an external system. Jungian synchronization of mind and matter is realized if mind is analogized to a computer model, synchronizing with a sporadically observed system as in meteorological data assimilation. Internal synchronization provides a recipe for combining different models of the same objective process, a configuration that may also describe the functioning of conscious brains. In contrast to Pauli's view, recent developments suggest a materialist picture of semi-autonomous mind, existing alongside the observed world, with both exhibiting a synchronistic order. Basic physical synchronicity is manifest in the non-local quantum connections implied by Bell's theorem. The quantum world resides on a generalized synchronization "manifold", a view that provides a bridge between nonlocal realist interpretations and local realist interpretations that constrain observer choice .Comment: 1) clarification regarding the connection with philosophical synchronicity in Section 2 and in the concluding section 2) reference to Maldacena-Susskind "ER=EPR" relation in discussion of role of wormholes in entanglement and nonlocality 3) length reduction and stylistic changes throughou

    Chaos synchronization and its application to secure communication

    Get PDF
    Chaos theory is well known as one of three revolutions in physical sciences in 20th-century, as one physicist called it: Relativity eliminated the Newtonian illusion of absolute space and time; quantum theory eliminated the Newtonian dream of a controllable measurable process; and chaos eliminates the Laplacian fantasy of deterministic predictability". Specially, when chaos synchronization was found in 1991, chaos theory becomes more and more attractive. Chaos has been widely applied to many scientific disciplines: mathematics, programming, microbiology, biology, computer science, economics, engineering, finance, philosophy, physics, politics, population dynamics, psychology, and robotics. One of most important engineering applications is secure communication because of the properties of random behaviours and sensitivity to initial conditions of chaos systems. Noise-like dynamical behaviours can be used to mask the original information in symmetric cryptography. Sensitivity to initial conditions and unpredictability make chaotic systems very suitable to construct one-way function in public-key cryptography. In chaos-based secure communication schemes, information signals are masked or modulated (encrypted) by chaotic signals at the transmitter and the resulting encrypted signals are sent to the corresponding receiver across a public channel (unsafe channel). Perfect chaos synchronization is usually expected to recover the original information signals. In other words, the recovery of the information signals requires the receiver's own copy of the chaotic signals which are synchronized with the transmitter ones. Thus, chaos synchronization is the key technique throughout this whole process. Due to the difficulties of generating and synchronizing chaotic systems and the limit of digital computer precision, there exist many challenges in chaos-based secure communication. In this thesis, we try to solve chaos generation and chaos synchronization problems. Starting from designing chaotic and hyperchaotic system by first-order delay differential equation, we present a family of novel cell attractors with multiple positive Lyapunov exponents. Compared with previously reported hyperchaos systems with complex mathematic structure (more than 3 dimensions), our system is relatively simple while its dynamical behaviours are very complicated. We present a systemic parameter control method to adjust the number of positive Lyapunov exponents, which is an index of chaos degree. Furthermore, we develop a delay feedback controller and apply it to Chen system to generate multi-scroll attractors. It can be generalized to Chua system, Lorenz system, Jerk equation, etc. Since chaos synchronization is the critical technique in chaos-based secure communication, we present corresponding impulsive synchronization criteria to guarantee that the receiver can generate the same chaotic signals at the receiver when time delay and uncertainty emerge in the transmission process. Aiming at the weakness of general impulsive synchronization scheme, i.e., there always exists an upper boundary to limit impulsive intervals during the synchronization process, we design a novel synchronization scheme, intermittent impulsive synchronization scheme (IISS). IISS can not only be flexibly applied to the scenario where the control window is restricted but also improve the security of chaos-based secure communication via reducing the control window width and decreasing the redundancy of synchronization signals. Finally, we propose chaos-based public-key cryptography algorithms which can be used to encrypt synchronization signals and guarantee their security across the public channel

    Symmetry in Chaotic Systems and Circuits

    Get PDF
    Symmetry can play an important role in the field of nonlinear systems and especially in the design of nonlinear circuits that produce chaos. Therefore, this Special Issue, titled “Symmetry in Chaotic Systems and Circuits”, presents the latest scientific advances in nonlinear chaotic systems and circuits that introduce various kinds of symmetries. Applications of chaotic systems and circuits with symmetries, or with a deliberate lack of symmetry, are also presented in this Special Issue. The volume contains 14 published papers from authors around the world. This reflects the high impact of this Special Issue

    Synchronization Phenomena in Coupled Birkhoff-Shaw Chaotic Systems Using Nonlinear Controllers

    Get PDF
    In this chapter, the well-known non-autonomous chaotic system, the Birkhoff-Shaw, which exhibits the structure of beaks and wings, typically observed in chaotic neuronal models, is used in a coupling scheme. The Birkhoff-Shaw system is a second-order non-autonomous dynamical system with rich dynamical behaviour, which has not been sufficiently studied. Furthermore, the master-slave (unidirectional) coupling scheme, which is used, is designed by using the nonlinear controllers to target synchronization states, such as complete synchronization and antisynchronization, with amplification or attenuation in chaotic oscillators. It is the first time that the specific method has been used in coupled non-autonomous chaotic systems. The stability of synchronization is ensured by using Lyapunov function stability theorem in the unidirectional mode of coupling. The simulation results from system’s numerical integration confirm the appearance of complete synchronization and antisynchronization phenomena depending on the signs of the parameters of the error functions. Electronic circuitry that models the coupling scheme is also reported to verify its feasibility

    Design and implementation of secure chaotic communication systems

    Get PDF
    Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mismatches, mixing property, deterministic dynamics, structure complexity, to mention a few, that map nicely with cryptographic requirements such as confusion, diffusion, deterministic pseudorandomness, algorithm complexity. Furthermore, the possibility of chaotic synchronization, where the master system (transmitter) is driving the slave system (receiver) by its output signal, made it probable for the possible utilization of chaotic systems to implement security in the communication systems. Many methods like chaotic masking, chaotic modulation, inclusion, chaotic shift keying (CSK) had been proposed however, many attack methods later showed them to be insecure. Different modifications of these methods also exist in the literature to improve the security, but almost all suffer from the same drawback. Therefore, the implementation of chaotic systems in security still remains a challenge. In this work, different possibilities on how it might be possible to improve the security of the existing methods are explored. The main problem with the existing methods is that the message imprint could be found in the dynamics of the transmitted signal, therefore by some signal processing or pattern classification techniques, etc, allow the exposition of the hidden message. Therefore, the challenge is to remove any pattern or change in dynamics that the message might bring in the transmitted signal.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Synchronicity from synchronized chaos

    Get PDF
    The synchronization of loosely-coupled chaotic oscillators, a phenomenon investigated intensively for the last two decades, may realize the philosophical concept of “synchronicity”—the commonplace notion that related eventsmysteriously occur at the same time. When extended to continuous media and/or large discrete arrays, and when general (non-identical) correspondences are considered between states, intermittent synchronous relationships indeed become ubiquitous. Meaningful synchronicity follows naturally if meaningful events are identified with coherent structures, defined by internal synchronization between remote degrees of freedom; a condition that has been posited as necessary for synchronizability with an external system. The important case of synchronization between mind and matter is realized if mind is analogized to a computer model, synchronizing with a sporadically observed system, as in meteorological data assimilation. Evidence for the ubiquity of synchronization is reviewed along with recent proposals that: (1) synchronization of different models of the same objective process may be an expeditious route to improved computational modeling and may also describe the functioning of conscious brains; and (2) the nonlocality in quantum phenomena implied by Bell’s theorem may be explained in a variety of deterministic (hidden variable) interpretations if the quantum world resides on a generalized synchronization “manifold”.publishedVersio

    Impulsive Control and Synchronization of Chaos-Generating-Systems with Applications to Secure Communication

    Get PDF
    When two or more chaotic systems are coupled, they may exhibit synchronized chaotic oscillations. The synchronization of chaos is usually understood as the regime of chaotic oscillations in which the corresponding variables or coupled systems are equal to each other. This kind of synchronized chaos is most frequently observed in systems specifically designed to be able to produce this behaviour. In this thesis, one particular type of synchronization, called impulsive synchronization, is investigated and applied to low dimensional chaotic, hyperchaotic and spatiotemporal chaotic systems. This synchronization technique requires driving one chaotic system, called response system, by samples of the state variables of the other chaotic system, called drive system, at discrete moments. Equi-Lagrange stability and equi-attractivity in the large property of the synchronization error become our major concerns when discussing the dynamics of synchronization to guarantee the convergence of the error dynamics to zero. Sufficient conditions for equi-Lagrange stability and equi-attractivity in the large are obtained for the different types of chaos-generating systems used. The issue of robustness of synchronized chaotic oscillations with respect to parameter variations and time delay, is also addressed and investigated when dealing with impulsive synchronization of low dimensional chaotic and hyperchaotic systems. Due to the fact that it is impossible to design two identical chaotic systems and that transmission and sampling delays in impulsive synchronization are inevitable, robustness becomes a fundamental issue in the models considered. Therefore it is established, in this thesis, that under relatively large parameter perturbations and bounded delay, impulsive synchronization still shows very desired behaviour. In fact, criteria for robustness of this particular type of synchronization are derived for both cases, especially in the case of time delay, where sufficient conditions for the synchronization error to be equi-attractivity in the large, are derived and an upper bound on the delay terms is also obtained in terms of the other parameters of the systems involved. The theoretical results, described above, regarding impulsive synchronization, are reconfirmed numerically. This is done by analyzing the Lyapunov exponents of the error dynamics and by showing the simulations of the different models discussed in each case. The application of the theory of synchronization, in general, and impulsive synchronization, in particular, to communication security, is also presented in this thesis. A new impulsive cryptosystem, called induced-message cryptosystem, is proposed and its properties are investigated. It was established that this cryptosystem does not require the transmission of the encrypted signal but instead the impulses will carry the information needed for synchronization and for retrieving the message signal. Thus the security of transmission is increased and the time-frame congestion problem, discussed in the literature, is also solved. Several other impulsive cryptosystems are also proposed to accommodate more solutions to several security issues and to illustrate the different properties of impulsive synchronization. Finally, extending the applications of impulsive synchronization to employ spatiotemporal chaotic systems, generated by partial differential equations, is addressed. Several possible models implementing this approach are suggested in this thesis and few questions are raised towards possible future research work in this area
    corecore