PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A novel cryptosystem based on chaotic signals for data encryption applications and CDMA communication system

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
PL
Nowatorski kryptosystem oparty na chaotycznych sygnałach do aplikacji szyfrowania danych i systemu komunikacji CDMA
Języki publikacji
EN
Abstrakty
EN
In this paper, we study the Lorenz chaotic system as a cryptosystem stream cipher. The system employs a stream cipher, in which the encryption key changes in a chaotic manner over time. For added security, one of the Lorenz generator's parameters are controlled by step function subsystem. The cryptosystem's bit stream passed the statistical randomness test. As a result, a cryptosystem's design can withstand many sorts of attacks, such as brute force. The system's key size will be greater than 256, allowing for a total of 2256 key spaces. As a result, the large key space will give strong plaintext security against a brute force attack.
PL
W tym artykule badamy chaotyczny system Lorenza jako szyfr strumieniowy kryptosystemu. System wykorzystuje szyfr strumieniowy, w którym klucz szyfrowania zmienia się w czasie w sposób chaotyczny. Dla zwiększenia bezpieczeństwa, jeden z parametrów generatora Lorenza jest kontrolowany przez podsystem funkcji krokowej. Strumień bitów kryptosystemu przeszedł test losowości statystycznej. W rezultacie projekt kryptosystemu może wytrzymać wiele rodzajów ataków, takich jak brutalna siła. Rozmiar klucza systemowego będzie większy niż 256, co pozwoli na łącznie 2256 miejsc na klucze. W rezultacie duża przestrzeń na klucze zapewni silne zabezpieczenie tekstu jawnego przed atakiem brute force.
Rocznik
Strony
10--13
Opis fizyczny
Bibliogr. 20 poz., rys., tab.
Twórcy
  • Department of Electrical Engineering, College of Engineering, University of Hail, Hail, KSA
Bibliografia
  • [1] Yunpeng Zhang , Lifu Huang , Yasin Karanfil , Zhenzhen Wang, ‘A New Digital Image Hiding Encryption Algorithm Based on Dual Chaotic Systems’, No/VOL: 01b/2013 Page no. 127
  • [2] Ewa Świercz ‘ Image encryption algorithms based on wavelet decomposition and encryption of compressed data in wavelet domain’, No/VOL: 02/2018 Page no. 79
  • [3] Badr Alshammari, ‘ Cryptanalysis of a Bilateral-Diffusion image encryption algorithm based on dynamical compound chaos’, 01/2021 Page no. 128
  • [4] S. H. Strogatz, Nonlinear dynamics and chaos: with applications to physics, biology, chemistry, and engineering: Westview press, 2014.C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Technical Journal, vol. 28, pp. 656-715, 1949.
  • [5] J. Y. Stein, Digital signal processing: a computer science perspective: John Wiley & Sons, Inc., 2000.
  • [6] R. Kharel, "Design and Implementation of secure chaotic communication system," PhD thesis, March 2011.
  • [7] G. Kaddoum, "Wireless chaos-based communication systems: A comprehensive survey," IEEE Access, vol. 4, pp. 2621-2648, 2016.
  • [8] G. Kaddoum, "Wireless chaos-based communication systems: A comprehensive survey," IEEE Access, vol. 4, pp. 2621-2648, 2016.
  • [9] H. Dedieu, M. P. Kennedy, and M. Hasler, "Chaos shift keying: Modulation and demodulation of a chaotic carrier using self- synchronizing Chua's circuits," IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol. 40, pp. 634-642, 1993.
  • [10] U. Parlitz, L. O. Chua, L. Kocarev, K. Halle, and A. Shang, "Transmission of digital signals by chaotic synchronization," International Journal of Bifurcation and Chaos, vol. 2, pp. 973- 977, 1992.
  • [11] G. Kolumbán, M. P. Kennedy, and L. O. Chua, "The role of synchronization in digital communications using chaos. I. Fundamentals of digital communications," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 44, pp. 927-936, 1997.
  • [12] G. Kaddoum, "Wireless chaos-based communication systems: A comprehensive survey," IEEE Access, vol. 4, pp. 2621-2648, 2016.
  • [13] C. Tse and F. Lau, "Chaos-based digital communication systems," Operating Principles, Analysis Methods and Performance Evaluation (Springer Verlag, Berlin, 2004), 2003.
  • [14] M. P. Kennedy, G. Kolumbán, G. Kis, and Z. Jákó, "Performance evaluation of FM-DCSK modulation in multipath environments," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 47, pp. 1702-1711, 2000.
  • [15] A. Pande and J. Zambreno, "A chaotic encryption scheme for real-time embedded systems: design and implementation," Telecommunication Systems, pp. 1-11, 2013.
  • [16] S. Berber and S. Feng, "Chaos-based physical layer design for WSN applications," in 17th WSEAS Int. Conf. on Communications, Rhodes, Greece, pp. 157-162, 2013.
  • [17] S. Sadoudi, M. S. Azzaz, and C. Tanougast, "Novel experimental synchronization technique for embedded chaotic communications," in Control, Decision and Information Technologies (CoDIT), 2014 International Conference on,pp. 669-672, 2014.
  • [18] N. X. Quyen, V. Van Yem, and T. Q. Duong, "Design and analysis of a spread-spectrum communication system with chaos-based variation of both phase-coded carrier and spreading factor," IET Communications, vol. 9, pp. 1466-1473, 2015.
  • [19] T. K. Ksheerasagar, S. Anuradha, G. Avadhootha, and K. S. R. Charan, "Performance analysis of DS-CDMA using different chaotic sequences," in Wireless Communications, Signal Processing and Networking (WiSPNET), International Conference on, pp. 2421-2425, 2016.
  • [20] Y. Wu, Y. Zhou, and L. Bao, "Discrete wheel-switching chaotic system and applications," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 61, pp. 3469-3477, 2014.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-ebe7a993-bb5b-44fa-83e7-e8a85a42c5c5
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.