Wideband complex-enhanced bidirectional phase chaotic secure communication with time-delay signature concealment

2020 ◽  
Vol 30 (9) ◽  
pp. 093138
Author(s):  
Tianfeng Lu ◽  
Hongxiang Wang ◽  
Yuefeng Ji
Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 516
Author(s):  
Yanqiang Guo ◽  
Tong Liu ◽  
Tong Zhao ◽  
Haojie Zhang ◽  
Xiaomin Guo

By frequency-band extracting, we experimentally and theoretically investigate time-delay signature (TDS) suppression and entropy growth enhancement of a chaotic optical-feedback semiconductor laser under different injection currents and feedback strengths. The TDS and entropy growth are quantified by the peak value of autocorrelation function and the difference of permutation entropy at the feedback delay time. At the optimal extracting bandwidth, the measured TDS is suppressed up to 96% compared to the original chaos, and the entropy growth is higher than the noise-dominated threshold, indicating that the dynamical process is noisy. The effects of extracting bandwidth and radio frequencies on the TDS and entropy growth are also clarified experimentally and theoretically. The experimental results are in good agreements with the theoretical results. The skewness of the laser intensity distribution is effectively improved to 0.001 with the optimal extracting bandwidth. This technique provides a promising tool to extract randomness and prepare desired entropy sources for chaotic secure communication and random number generation.


2015 ◽  
Vol 2015 ◽  
pp. 1-9 ◽  
Author(s):  
Eunro Kim ◽  
Inseok Yang ◽  
Dongik Lee

The time-delay robust nonlinear dynamic inversion (TDRNDI) control technique is proposed to synchronize time-delay Chen systems. The time-delay Chen circuit is simple but exhibits complex irregular (chaotic) behavior. For this reason, this circuit can be efficiently used to encrypt messages for secure communication. In this paper, the nonlinear control-based chaos synchronization problem is considered. The proposed TDRNDI controller is a modified version of a robust nonlinear dynamic inversion (RNDI) applicable to chaotic systems, including time-delay systems. The performance and feasibility of the proposed TDRNDI controller are demonstrated by conducting numerical simulations with application to a secure communication network.


Author(s):  
Kehui Sun

Chaos is characterized by aperiodic, wideband, random-like, and ergodicity. Chaotic secure communication has become one of the hot topics in nonlinear dynamics since the early 1990s exploiting the technique of chaos synchronization. As distinguished by the type of information being carried, chaos-based communication systems can be categorized into analogy and digital, including four popular techniques such as Chaos Masking, Chaos Shift Keying, Chaos Modulation, and Chaos Spreading Spectrum. In this chapter, the principles of these schemes and their modifications are analyzed by theoretical analysis as well as dynamic simulation. In addition, chaos-based cryptography is a new approach to encrypt information. After analyzing the performances of chaotic sequence and designing an effective chaotic sequence generator, the authors briefly presented the principle of two classes of chaotic encryption schemes, chaotic sequence encryption and chaotic data stream encryption.


2020 ◽  
Vol 30 (05) ◽  
pp. 2050075
Author(s):  
Baoju Chen ◽  
Simin Yu ◽  
Ping Chen ◽  
Liangshan Xiao ◽  
Jinhu Lü

In this paper, a Virtex-7-based video chaotic secure communication scheme is investigated. First, the network sending and receiving controller Intellectual Property (IP) cores are designed. Next, the chaotic encryption and decryption IP cores are implemented using fixed-point algorithm, pipeline operation, and state machine control. Thus, video capturing, video displaying, network sending, network receiving, chaotic encrypting, and chaotic decrypting can be achieved via IP core integration design. An improved 7D chaotic stream cipher algorithm for resisting divide-and-conquer attack is then designed and realized on a Virtex-7 high-end FPGA platform. Hardware experimental results are also given to verify the feasibility of the scheme.


Sign in / Sign up

Export Citation Format

Share Document