Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption

Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption

Author: Banerjee, Santo

Publisher: IGI Global

Published: 2010-07-31

Total Pages: 596

ISBN-13: 1615207384

DOWNLOAD EBOOK

Over the past few decades, there has been numerous research studies conducted involving the synchronization of dynamical systems with several theoretical studies and laboratory experimentations demonstrating the pivotal role for this phenomenon in secure communications. Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding. This innovative publication presents a critical mass of the most sought after research, providing relevant theoretical frameworks and the latest empirical research findings in this area of study.


Chaos-based Cryptography

Chaos-based Cryptography

Author: Ljupco Kocarev

Publisher: Springer

Published: 2011-06-17

Total Pages: 400

ISBN-13: 3642205429

DOWNLOAD EBOOK

Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.


Synchronization Techniques for Chaotic Communication Systems

Synchronization Techniques for Chaotic Communication Systems

Author: Branislav Jovic

Publisher: Springer Science & Business Media

Published: 2011-08-20

Total Pages: 354

ISBN-13: 3642218490

DOWNLOAD EBOOK

Since the early 1990s, when synchronization of chaotic communication systems became a popular research subject, a vast number of scientific papers have been published. However, most of today’s books on chaotic communication systems deal exclusively with the systems where perfect synchronization is assumed, an assumption which separates theoretical from practical, real world, systems. This book is the first of its kind dealing exclusively with the synchronization techniques for chaotic communication systems. It describes a number of novel robust synchronization techniques, which there is a lack of, for single and multi-user chaotic communication systems published and highly cited in world’s leading journals in the area. In particular, it presents a solution to the problem of robust chaotic synchronization by presenting the first fully synchronized, highly secure, chaos based DS-CDMA system. The book fills a gap in the existing literature where a number of books exist that deal with chaos and chaotic communications but not with synchronization of chaotic communication systems. It also acts as a bridge between communication system theory and chaotic synchronization by carefully explaining the two concepts and demonstrating how they link into chaotic communication systems. The book also presents a detailed literature review on the topic of synchronization of chaotic communication systems. Furthermore, it presents the literature review on the general topic of chaotic synchronization and how those ideas led to the application of chaotic signals to secure chaotic communication systems. It therefore, in addition to presenting the state of the art systems, also presents a detailed history of chaotic communication systems. In summary, the book stands out in the field of synchronization techniques for chaotic communication systems.


Improving Security Communication Via Chaotic Synchronization [microform]

Improving Security Communication Via Chaotic Synchronization [microform]

Author: Weiguang Yao

Publisher: National Library of Canada = Bibliothèque nationale du Canada

Published: 2002

Total Pages: 147

ISBN-13: 9780612771246

DOWNLOAD EBOOK

Chaos produces a random-like wideband signal sensitive to initial conditions. When a chaotic signal is used as a "carrier" to send a message, the message is not only carried, but also "masked" by the carrier. The message may be recovered perfectly at a receiver that is synchronized with the transmitter by using the received signal. This method, called chaotic encryption, is an alternative way for secure communication.


Cybersecurity

Cybersecurity

Author: Ahmed A. Abd El-Latif

Publisher: Springer Nature

Published: 2022-03-25

Total Pages: 244

ISBN-13: 3030921662

DOWNLOAD EBOOK

This book presents techniques and security challenges of chaotic systems and their use in cybersecurity. It presents the state-of-the-art and the latest discoveries in the field of chaotic systems and methods and proposes new models, practical solutions, and technological advances related to new chaotic dynamical systems. The book can be used as part of the bibliography of the following courses: - Cybersecurity - Cryptography - Networks and Communications Security - Nonlinear Circuits - Nonlinear Systems and Applications


Chaos Synchronization and Its Application to Secure Communication

Chaos Synchronization and Its Application to Secure Communication

Author: Hongtao Zhang

Publisher:

Published: 2010

Total Pages: 187

ISBN-13:

DOWNLOAD EBOOK

Chaos theory is well known as one of three revolutions in physical sciences in 20th-century, as one physicist called it: Relativity eliminated the Newtonian illusion of absolute space and time; quantum theory eliminated the Newtonian dream of a controllable measurable process; and chaos eliminates the Laplacian fantasy of deterministic predictability". Specially, when chaos synchronization was found in 1991, chaos theory becomes more and more attractive. Chaos has been widely applied to many scientific disciplines: mathematics, programming, microbiology, biology, computer science, economics, engineering, finance, philosophy, physics, politics, population dynamics, psychology, and robotics. One of most important engineering applications is secure communication because of the properties of random behaviours and sensitivity to initial conditions of chaos systems. Noise-like dynamical behaviours can be used to mask the original information in symmetric cryptography. Sensitivity to initial conditions and unpredictability make chaotic systems very suitable to construct one-way function in public-key cryptography. In chaos-based secure communication schemes, information signals are masked or modulated (encrypted) by chaotic signals at the transmitter and the resulting encrypted signals are sent to the corresponding receiver across a public channel (unsafe channel). Perfect chaos synchronization is usually expected to recover the original information signals. In other words, the recovery of the information signals requires the receiver's own copy of the chaotic signals which are synchronized with the transmitter ones. Thus, chaos synchronization is the key technique throughout this whole process. Due to the difficulties of generating and synchronizing chaotic systems and the limit of digital computer precision, there exist many challenges in chaos-based secure communication. In this thesis, we try to solve chaos generation and chaos synchronization problems. Starting from designing chaotic and hyperchaotic system by first-order delay differential equation, we present a family of novel cell attractors with multiple positive Lyapunov exponents. Compared with previously reported hyperchaos systems with complex mathematic structure (more than 3 dimensions), our system is relatively simple while its dynamical behaviours are very complicated. We present a systemic parameter control method to adjust the number of positive Lyapunov exponents, which is an index of chaos degree. Furthermore, we develop a delay feedback controller and apply it to Chen system to generate multi-scroll attractors. It can be generalized to Chua system, Lorenz system, Jerk equation, etc.


Secure Communications Based on Chaotic Systems

Secure Communications Based on Chaotic Systems

Author: Mohamed Haroun

Publisher:

Published: 2015

Total Pages:

ISBN-13:

DOWNLOAD EBOOK

This dissertation provides methods to utilize chaos efficiently in secure communications. Chaos has many desirable characteristics such as ergodicity and sensitivity to initial conditions, and is considered an ideal candidate for use in cryptography and secure communications. On the other hand, it suffers from sensitivity to noise and fading if it is used for physical layer transmission, and errors due to the finite precision of the numerical algorithms in digital systems. This limits the use of chaos in cryptographic applications. Accordingly, this dissertation proposes new algorithms to enhance the security of modern communication systems using chaos. The focus is on developing chaotic cryptosystems for wireless systems that are reliable, secure, and have good performance.


Cryptology Transmitted Message Protection

Cryptology Transmitted Message Protection

Author: Igor Izmailov

Publisher: Springer

Published: 2016-06-24

Total Pages: 386

ISBN-13: 331930125X

DOWNLOAD EBOOK

This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, with nonlinearity playing a key "evolving" role. The proposed solutions allow the universal phenomenon of deterministic chaos to be discussed in the context of information security problems on the basis of examples of both electronic and optical systems. Further, the book presents the vortex detector and communication systems and describes mathematical models of the chaos oscillator as a coder in the synchronous chaotic communication and appropriate decoders, demonstrating their efficiency both analytically and experimentally. Lastly it discusses the cryptologic features of analyzed systems and suggests a series of new structures for confident communication.