On chaos synchronization and secure communication

Author(s):  
W. Kinzel ◽  
A. Englert ◽  
I. Kanter

Chaos synchronization, in particular isochronal synchronization of two chaotic trajectories to each other, may be used to build a means of secure communication over a public channel. In this paper, we give an overview of coupling schemes of Bernoulli units deduced from chaotic laser systems, different ways to transmit information by chaos synchronization and the advantage of bidirectional over unidirectional coupling with respect to secure communication. We present the protocol for using dynamical private commutative filters for tap-proof transmission of information that maps the task of a passive attacker to the class of non-deterministic polynomial time-complete problems.

2009 ◽  
Vol 23 (32) ◽  
pp. 5949-5964 ◽  
Author(s):  
XINGYUAN WANG ◽  
MINGJUN WANG

This paper studies chaos synchronization via unidirectional coupling. The self-synchronization of Lorenz systems, modified coupled dynamos systems and hyperchaotic Chen systems is studied by three methods: the Lyapunov function method, the global synchronization method and the numerical calculation of the largest Lyapunov exponent method. In regard to application to communication, we show that via transmitting single signal the synchronization of the drive system and the response system can be achieved. An example of applying self-synchronization of hyperchaotic Chen systems to chaotic masking secure communication is presented in this paper. Simulation results show the effectiveness of the method.


2013 ◽  
Vol 798-799 ◽  
pp. 570-573
Author(s):  
Qiang Ke

Using the idea of drive-response synchronization, we discuss the principle, numerical simulation of chaotic laser communication. Compared to traditional communications systems, the chaotic laser communication system has a well-kept secret performance, but the chaos synchronization requirements are very strict.


2015 ◽  
Vol 6 (2) ◽  
pp. 133-143 ◽  
Author(s):  
Masanobu Inubushi ◽  
Kazuyuki Yoshimura ◽  
Kenichi Arai ◽  
Peter Davis

2013 ◽  
Vol 401-403 ◽  
pp. 1657-1660
Author(s):  
Bin Zhou ◽  
Xiang Wang ◽  
Yu Gao ◽  
Shao Cheng Qu

An adaptive controller with adaptive rate is presented to synchronize two chaos systems and to apply to secure communication. Based on Lyapunov stability theory, a sufficient condition and adaptive control parameters are obtained. Finally, the simulation with synchronization and secure communication is given to show the effectiveness of the proposed method. Keywords: adaptive; synchronization; observer; controller.


2015 ◽  
Vol 2015 ◽  
pp. 1-9 ◽  
Author(s):  
Eunro Kim ◽  
Inseok Yang ◽  
Dongik Lee

The time-delay robust nonlinear dynamic inversion (TDRNDI) control technique is proposed to synchronize time-delay Chen systems. The time-delay Chen circuit is simple but exhibits complex irregular (chaotic) behavior. For this reason, this circuit can be efficiently used to encrypt messages for secure communication. In this paper, the nonlinear control-based chaos synchronization problem is considered. The proposed TDRNDI controller is a modified version of a robust nonlinear dynamic inversion (RNDI) applicable to chaotic systems, including time-delay systems. The performance and feasibility of the proposed TDRNDI controller are demonstrated by conducting numerical simulations with application to a secure communication network.


2005 ◽  
Vol 24 (3) ◽  
pp. 775-783 ◽  
Author(s):  
G. Álvarez ◽  
Shujun Li ◽  
F. Montoya ◽  
G. Pastor ◽  
M. Romera

2011 ◽  
Vol 135-136 ◽  
pp. 960-963
Author(s):  
Jie Xu ◽  
Juan Chang ◽  
Lian Zhang ◽  
Yong Sun

Secure communication with the hyper-chaos synchronization approach is the popular investigation. In this paper the fifth-order Cellular Neural Networks(CNN) hyper-chaos equation of continuous time was discreted. The innovation was that the synchronization of the hyper-chaos system was realized with the discreted reduced order state observer. Finally, the system stabilizing to zero after fugacious transition and achieving synchronization were validated by simulations, which showed the algorithm’s availability.


Sign in / Sign up

Export Citation Format

Share Document