Paper Title:
A Design of a Method of Chaos-Based Secure Communication
  Abstract

In resent years, secure communication is becoming one of the study hotspot in information safety. Secure communication is a way of correspondence, which transmits the desired information in the channel by adopting encryption measure, and then carries on decryption in receiver to recover the messages. Chaotic encryption is making use of random-like characteristic of the chaotic signal to encrypt the plaintext, and secure the real time communication. Taking one sine and square wave signal for examples respectively, the information can be encrypted by using the model of one-way coupled map lattice. Also, it is available to actualize encryption and decryption of the information by choose different keys when the model requires the matching keys precisely.

  Info
Periodical
Advanced Materials Research (Volumes 204-210)
Edited by
Helen Zhang, Gang Shen and David Jin
Pages
508-511
DOI
10.4028/www.scientific.net/AMR.204-210.508
Citation
H. He, H. Dong, T. Yang, L. He, Y. Wu, "A Design of a Method of Chaos-Based Secure Communication", Advanced Materials Research, Vols. 204-210, pp. 508-511, 2011
Online since
February 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Hui Ling Xi, Si Min Yu, Hui Ling Xi
Chapter 17: Manufacturing Process Planning and Scheduling
Abstract:Based on the Lyapunov stability theory, an adaptive full state hybrid function projective lag synchronization (FSHFPLS) scheme is...
4169
Authors: Chuan Kuei Huang, Hsiau Hsian Nien, Shu Li Hsu, Siang Shang Tu
Chapter 4: Engineering Material, Energy Science and Dynamic System in Mechanical Engineering
Abstract:Due to rapid developments in computer networking and communi- cation technology, users have begun to use personal computers to transmit...
761
Authors: Chun Jiang Pang
Chapter 5: Information Processing and Computational Science
Abstract:This paper analyzes a sort of color still image algorithm based on the Logistic map sorting, and verifies the confidentiality. Further, this...
850
Authors: Hong Chen, Cheng Chen, Shu Bin Gu
Chapter 4: Electronics and Microelectronics, Embedded and Integrated Systems, Communications, Power and Energy, Electric and Magnetic Systems
Abstract:In chaotic speech signal encryption, masking is the most direct and convenient method. But the chaotic signals usually have a narrow spectral...
1456