A Novel Secure Communication Scheme Based on Chaotic System

Article Preview

Abstract:

A secure communication scheme based on piecewise linear chaotic system is proposed. Two Chaotic Systems are used in this algorithm, with a symbolic sequence generated by a Chaotic System the message sequence is tracked, employing the chaotic masking technique the message for transmitted is encrypted with a binary sequence extracted from another Chaotic System. The theoretic and experience results stated that the proposed algorithm has many properties such as high speed and easy implementing and high security and it is suitable for practical use in the secure communication.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 255-260)

Pages:

2242-2247

Citation:

Online since:

May 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] P. García, J. Jiménez, Communication through chaotic map systems, Phys. Lett. A 298 (2002) ,p.35.

Google Scholar

[2] G. Alvarez, F. Montoya, M. Romera, G. Pastor, Cryptanalysis of a chaotic secure communication system, Phys. Lett. A 306 (2003),p.200.

DOI: 10.1016/s0375-9601(02)01502-5

Google Scholar

[3] Jorge A. González, Ramiro Pino, Chaotic and stochastic functions, Physica A 276 (2000) 425

Google Scholar

[4] M.S. Baptista, Cryptography with chaos, phys. Lett. A 240(1998) ,p.50.

Google Scholar

[5] T. Kohda, A.Tsuneda, Statistics of Chaotic Binary Sequences, IEEE Trans. Inform. Theory, vol. 43, 1997 ,p.104.

DOI: 10.1109/18.567654

Google Scholar

[6] B. Schneier, in: Applied Cryptography, 2nd Edition, edtied by Wiley, 1996.

Google Scholar

[7] Kohda, T., and Tsuneda, A. Statistics of Chaotic Binary Sequences. IEEE Trans. Information Theory, 1997, p.104.

DOI: 10.1109/18.567654

Google Scholar

[8] Kohda, T., and Tsuneda, A. Pseudonoise Sequences by Chaotic Nonlinear and their Correlation Properties. IEICE Trans. on Communications, 1993, p.855.

Google Scholar

[9] Wei Pengcheng, Zhang Wei , Liao xiaofeng and Yang Huaqian. Design keyed Hash function based on couple chaotic system. Journal on Communications, 26(6),2006, p.27

Google Scholar

[10] Wei Pengcheng, Zhang Wei , and Yang Huaqian. A novel chaotic stream cryptographic algorithm based on hénon map and m-sequences . Journal of Computer Science, 32(6) 2005, pp.9-72.

Google Scholar

[11] Wei Pengcheng, Zhang Wei , and Yang Huaqian. Study on multistage chaotic image encryption algorithm[J]. Journal of Computer Science, 32(7) 2005, pp.55-60.

Google Scholar