Secure communication using ergodic chaotic parameter modulation

Author(s):  
Boyuan Li ◽  
Henry Leung ◽  
Chatura Seneviratne
2006 ◽  
Vol 16 (05) ◽  
pp. 1557-1568 ◽  
Author(s):  
SHUJUN LI ◽  
GUANRONG CHEN ◽  
GONZALO ÁLVAREZ

As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes. Recently, a simple defensive mechanism was presented to enhance the security of chaotic parameter modulation schemes against return-map attacks. Two techniques are combined in the proposed defensive mechanism: Multistep parameter modulation and alternative driving of two different transmitter variables. This paper restudies the security of this proposed defensive mechanism against return-map attacks, and points out that the security was much over-estimated in the original publication for both ciphertext-only attack and known/chosen-plaintext attacks. It is found that a deterministic relationship exists between the shape of the return map and the modulated parameter, and that such a relationship can be used to dramatically enhance return-map attacks thereby making them quite easy to break the defensive mechanism.


2016 ◽  
Vol 2016 ◽  
pp. 1-11 ◽  
Author(s):  
Lilian Huang ◽  
Donghai Shi ◽  
Jie Gao

A new Lorenz-like chaotic system with varying parameter is proposed by adding a state feedback function. The structure of the new designed system is simple and has more complex dynamic behaviors. The chaos behavior of the new system is studied by theoretical analysis and numerical simulation. And the bifurcation diagram shows a chaos-cycle-chaos evolution when the new parameter changes. Then a new synchronization scheme by a single state variable drive is given based on the new system and a chaotic parameter modulation digital secure communication system is also constructed. The results of simulation demonstrate that the new proposed system could be well applied in secure communication. Otherwise, based on the new system, the encryption and decryption of image could be achieved also.


Sign in / Sign up

Export Citation Format

Share Document