PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A stream cipher generator based on a combination of two non-linear systems for secure signal transmissions

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
PL
Generator szyfrujący bazujący na kombinacji dwóch nieliniowych systemów Lorz\nza i Rosslera
Języki publikacji
EN
Abstrakty
EN
A new cryptosystem approach based on two non-linear systems combined to satisfy a high degree of signal transmission security. These systems are Lorenz system and Rössler system. Each chaotic system has a completely different output bit stream. The system uses a stream cipher, in which the encryption key varies continuously. Therefore, a design of a secure communication system that is robust to different types of attacks such brute force attack is very important. One of the main properties of this system is the ability to retrieve the data transmitted through a noisy environment. The proposed system is a novel stream cipher which is based on combining two non-linear systems that are used in digital communication system. The key size of the system will exceed 576, which provide 2576 key space. Hence, this huge key space will provide a high security for plaintext against a brute force attack.
PL
Przedstawiono nowy szystem szyfrowania danych bazujący na kombinacji dwóch nieliniowych. Te dwa systemy to system Lorenza i system Rosslera. System umożliwia odzyskanie danych przy transmisji w zaszumionym środowisku.
Rocznik
Strony
51--54
Opis fizyczny
Bibliogr. 30 poz., rys., tab.
Twórcy
  • Dept. of Electrical Engineering, College of Engineering, University of Hail, Hail, KSA
Bibliografia
  • [1] C. Shannon, "A mathematical theory of communication, bell System technical Journal 27: 379-423 and 623–656," Mathematical Reviews (MathSciNet): MR10, 133e, 1948. H. Ettouny, L. Rizzuti, Solar desalination: A challenge for sustainable fresh water in the
  • [2] C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Technical Journal, vol. 28, pp. 656-715, 1949.
  • [3] A. P. Kurian, S. Puthusserypady, and S. M. Htut, "Performance enhancement of DS/CDMA system using chaotic complex spreading sequence," IEEE Transactions on wireless communications, vol. 4, pp. 984-989, 2005.
  • [4] G. Kaddoum, F.-D. Richardson, and F. Gagnon, "Design and analysis of a multi-carrier differential chaos shift keying communication system," IEEE Transactions on communications, vol. 61, pp. 3281-3291, 2013.
  • [5] G. Kaddoum, "Wireless chaos-based communication systems: A comprehensive survey," IEEE Access, vol. 4, pp. 2621-2648, 2016.
  • [6] C. Tse and F. Lau, "Chaos-based digital communication systems," Operating Principles, Analysis Methods and Performance Evaluation (Springer Verlag, Berlin, 2004), 2003.
  • [7] R. Vali, S. Berber, and S. K. Nguang, "Accurate derivation of chaos-based acquisition performance in a fading channel," IEEE Transactions on wireless communications, vol. 11, pp. 722-731, 2012.
  • [8] R. Vali, S. M. Berber, and S. K. Nguang, "Analysis of chaosbased code tracking using chaotic correlation statistics," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 59, pp. 796-805, 2012.
  • [9] S. Berber and S. Feng, "Chaos-based physical layer design for WSN applications," in 17th WSEAS Int. Conf. on Communications, Rhodes, Greece, pp. 157-162, 2013.
  • [10] J. Yu and Y.-D. Yao, "Detection performance of chaotic spreading LPI waveforms," IEEE Transactions on wireless communications, vol. 4, pp. 390396, 2005.
  • [11] M. Sobhy and A. Shehata, "Chaotic radar systems," in Microwave Symposium Digest. 2000 IEEE MTT-S International, pp. 1701-1704, 2000.
  • [12] T. Yang and L. O. Chua, "Chaotic digital code-division multiple access (CDMA) communication systems," International Journal of Bifurcation and Chaos, vol. 7, pp. 2789-2805, 1997.
  • [13] V. Lynnyk and S. Čelikovský, "On the anti–synchronization detection for the generalized Lorenz system and its applications to secure encryption," Kybernetika, vol. 46, pp. 1- 18, 2010.
  • [14] Y. Xia, C. Tse, and F. C.-M. Lau, "Performance of differential chaos-shiftkeying digital communication systems over a multipath fading channel with delay spread," IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 51, pp. 680- 684, 2004.
  • [15] M. I. Sobhy and A.-E. Shehata, "Chaotic algorithms for data encryption," in Acoustics, Speech, and Signal Processing, 2001. Proceedings.(ICASSP'01). 2001 IEEE International Conference on, pp. 997-1000, 2001.
  • [16] L. Shujun, M. Xuanqin, and C. Yuanlong, "Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography," Progress in Cryptology— INDOCRYPT 2001, pp. 316-329, 2001.
  • [17] M. A. Abu-Rgheff, Introduction to CDMA wireless communications: Academic Press, 2007.
  • [18] G. Heidari-Bateni and C. McGillem, "Chaotic sequences for spread spectrum: An alternative to PN-sequences," in Wireless Communications, 1992. Conference Proceedings., 1992 IEEE International Conference on Selected Topics in, pp. 437-440, 1992
  • [19] P. I. Martoyo, A. Susanto, E. Wijanto, H. Kanalebe, and K. Gandi, "Chaos codes vs. orthogonal codes for CDMA," in Spread Spectrum Techniques and Applications (ISITA), 2010 IEEE 11th International Symposium on, pp. 189193, 2010.
  • [20] R. C. Hilborn, Chaos and nonlinear dynamics: an introduction for scientists and engineers: Oxford University Press on Demand, 2000.
  • [21] G. Kaddoum, M. Coulon, D. Roviras, and P. Chargé, "Theoretical performance for asynchronous multi-user chaosbased communication systems on fading channels," Signal Processing, vol. 90, pp. 2923-2933, 2010.
  • [22] A. P. Kurian, S. Puthusserypady, and S. M. Htut, "Performance enhancement of DS/CDMA system using chaotic complex spreading sequence," IEEE Transactions on wireless communications, vol. 4, pp. 984-989, 2005.
  • [23] G. Mazzini, G. Setti, and R. Rovatti, "Chaotic complex spreading sequences for asynchronous DS-CDMA. I. System modeling and results," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 44, pp. 937-947, 1997.
  • [24] H. Nejati, A. Beirami, and W. H. Ali, "Discrete-time chaotic-map truly random number generators: design, implementation, and variability analysis of the zigzag map," Analog Integrated Circuits and Signal Processing, vol. 73, pp. 363-374, 2012.
  • [25] J. Yu and Y.-D. Yao, "Detection performance of chaotic spreading LPI waveforms," IEEE Transactions on wireless communications, vol. 4, pp. 390396, 2005.
  • [26] L. Cong and W. Xiaofu, "Design and realization of an FPGAbased generator for chaotic frequency hopping sequences," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 48, pp. 521-532, 2001.
  • [27] M. Azzaz, C. Tanougast, S. Sadoudi, and A. Dandache, "Realtime FPGA implementation of Lorenz's chaotic generator for ciphering telecommunications," in Circuits and Systems and TAISA Conference, 2009. NEWCAS-TAISA'09. Joint IEEE North-East Workshop on, 2009, pp. 1-4.
  • [28] D. Majumdar, R. Moritz, H. Leung, and J. M. Brent, "An enhanced data rate chaos-based multilevel transceiver design exploiting ergodicity," in MILITARY COMMUNICATIONS CONFERENCE, 2010-MILCOM 2010, pp. 1256-1261, 2010.
  • [29] L. Merah, A. Ali-Pacha, N. H. Said, and M. Mamat, "A pseudo random number generator based on the chaotic system of Chua’s circuit, and its real time FPGA implementation," Applied Mathematical Sciences, vol. 7, pp. 2719-2734, 2013.
  • [30] Yunpeng ZHANG1, Lifu HUANG, Yasin Hasan KARANFIL2, , Zhenzhen WANG, A New Digital Image Hiding Encryption Algorithm Based on Dual Chaotic Systems. PRZEGLĄD ELEKTROTECHNICZNY, ISSN 0033-2097, R. 89 NR 1b/2013.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2020).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e1dd454c-2699-4910-87ac-f7aa23c98453
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.