11,172 research outputs found
Simulator verification techniques study. Integrated simulator self test system concepts
Software and hardware requirements for implementing hardware self tests are presented in support of the development of training and procedures development simulators for the space shuttle program. Self test techniques for simulation hardware and the validation of simulation performance are stipulated. The requirements of an integrated simulator self system are analyzed. Readiness tests, fault isolation tests, and incipient fault detection tests are covered
Breaking a secure communication scheme based on the phase synchronization of chaotic systems
A security analysis of a recently proposed secure communication scheme based
on the phase synchronization of chaotic systems is presented. It is shown that
the system parameters directly determine the ciphertext waveform, hence it can
be readily broken by parameter estimation of the ciphertext signal.Comment: 4 pages, 6 figure
Breaking parameter modulated chaotic secure communication system
This paper describes the security weakness of a recently proposed secure
communication method based on parameter modulation of a chaotic system and
adaptive observer-based synchronization scheme. We show that the security is
compromised even without precise knowledge of the chaotic system used.Comment: 8 pages, 3 figures, latex forma
Lorenz System Parameter Determination and Application to Break the Security of Two-channel Chaotic Cryptosystems
This paper describes how to determine the parameter values of the chaotic
Lorenz system used in a two-channel cryptosystem. The geometrical properties of
the Lorenz system are used firstly to reduce the parameter search space, then
the parameters are exactly determined, directly from the ciphertext, through
the minimization of the average jamming noise power created by the encryption
process.Comment: 5 pages, 5 figures Preprint submitted to IEEE T. Cas II, revision of
authors name spellin
- …