scholarly journals Secure Communication WHT Using Chaotic Encryption and Decryption for Protecting Sensitive POC

Author(s):  
Shilpa et al., Shilpa et al., ◽  
2011 ◽  
Vol 204-210 ◽  
pp. 508-511
Author(s):  
Hong He ◽  
Hong Dong ◽  
Tong Yang ◽  
Lin He ◽  
Yi Wu

In resent years, secure communication is becoming one of the study hotspot in information safety. Secure communication is a way of correspondence, which transmits the desired information in the channel by adopting encryption measure, and then carries on decryption in receiver to recover the messages. Chaotic encryption is making use of random-like characteristic of the chaotic signal to encrypt the plaintext, and secure the real time communication. Taking one sine and square wave signal for examples respectively, the information can be encrypted by using the model of one-way coupled map lattice. Also, it is available to actualize encryption and decryption of the information by choose different keys when the model requires the matching keys precisely.


2020 ◽  
Vol 13 (44) ◽  
pp. 4483-4489
Author(s):  
C Beaula ◽  

Background/Objective: The Coronavirus Covid-19 has affected almost all the countries and millions of people got infected and more deaths have been reported everywhere. The uncertainty and fear created by the pandemic can be used by hackers to steal the data from both private and public systems. Hence, there is an urgent need to improve the security of the systems. This can be done only by building a strong cryptosystem. So many researchers started embedding different topics of mathematics like algebra, number theory, and so on in cryptography to keep the system, safe and secure. In this study, a cryptosystem using graph theory has been attempted, to strengthen the security of the system. Method: A new graph is constructed from the given graph, known as a double vertex graph. The edge labeling of this double vertex graph is used in encryption and decryption. Findings: A new cryptosystem using the amalgamation of the path, its double vertex graph and edge labeling has been proposed. From the double vertex graph of a path, we have given a method to find the original path. To hack such an encrypted key, the knowledge of graph theory is important, which makes the system stronger. Applications:The one-word encryption method will be useful in every security system that needs a password for secure communication or storage or authentication. Keywords: Double vertex graphs; path; adjacency matrix; encryption; cryptography


2020 ◽  
Vol 30 (05) ◽  
pp. 2050075
Author(s):  
Baoju Chen ◽  
Simin Yu ◽  
Ping Chen ◽  
Liangshan Xiao ◽  
Jinhu Lü

In this paper, a Virtex-7-based video chaotic secure communication scheme is investigated. First, the network sending and receiving controller Intellectual Property (IP) cores are designed. Next, the chaotic encryption and decryption IP cores are implemented using fixed-point algorithm, pipeline operation, and state machine control. Thus, video capturing, video displaying, network sending, network receiving, chaotic encrypting, and chaotic decrypting can be achieved via IP core integration design. An improved 7D chaotic stream cipher algorithm for resisting divide-and-conquer attack is then designed and realized on a Virtex-7 high-end FPGA platform. Hardware experimental results are also given to verify the feasibility of the scheme.


2016 ◽  
Vol 2016 ◽  
pp. 1-11 ◽  
Author(s):  
Lilian Huang ◽  
Donghai Shi ◽  
Jie Gao

A new Lorenz-like chaotic system with varying parameter is proposed by adding a state feedback function. The structure of the new designed system is simple and has more complex dynamic behaviors. The chaos behavior of the new system is studied by theoretical analysis and numerical simulation. And the bifurcation diagram shows a chaos-cycle-chaos evolution when the new parameter changes. Then a new synchronization scheme by a single state variable drive is given based on the new system and a chaotic parameter modulation digital secure communication system is also constructed. The results of simulation demonstrate that the new proposed system could be well applied in secure communication. Otherwise, based on the new system, the encryption and decryption of image could be achieved also.


2018 ◽  
Vol 32 (24) ◽  
pp. 1850287 ◽  
Author(s):  
Manman Yuan ◽  
Weiping Wang ◽  
Xiong Luo ◽  
Lixiang Li

This paper is concerned with the asymptotic anti-synchronization problem of the memristor-based bidirectional associative memory neural networks (MBAMNNs) and its application in network secure communication. First, we propose a new model of MBAMNNs with probabilistic delays. By establishing a Bernoulli distributed stochastic variable, the information of transmittal time-varying delays is studied. Second, in order to provide a more robust and secure system, we develop a new anti-synchronization model based on the MBAMNNs. The adaptive laws are carefully designed to confirm the process of encryption and decryption in networks secure communication system. Finally, several numerical examples are presented to demonstrate the effectiveness and applicability of our proposed mechanism.


2010 ◽  
Vol 20 (12) ◽  
pp. 4097-4101
Author(s):  
REZA MAZROOEI-SEBDANI ◽  
MEHDI DEHGHAN

The close relationship between chaos and cryptography makes chaotic encryption a natural candidate for secure communication and cryptography. In this manuscript, we prove that a class of maps that have been proposed as suitable for scrambling signals possess the property of sensitive dependence on initial conditions (s.d.i.c.) necessary for chaos and cryptography. Our result can also be used for generating other maps with s.d.i.c., through a suitable semiconjugacy between their input and output parts. Using the condition of semiconjugacy we also establish for this class of maps rigorous criteria for the existence and stability of their fixed points and limit cycles.


2013 ◽  
Vol 433-435 ◽  
pp. 1752-1755 ◽  
Author(s):  
Yan Ling Zhao

The Internet of Things is currently the most popular field of communication and information research directions. Their application in the amount of information involved, are extremely large amount of data. How to ensure the transmission efficiency of business information under the premise of improving networking applications data security to protect the user's privacy data will be particularly important. Paper uses a custom data packet encapsulation mechanism, reducing the overhead of data resources; another based on their cross-platform communication features, combined with secure encryption and decryption, signature and authentication algorithm, the establishment of a secure communication system of things model for the differentiation of things communications environment, providing a standard packet structure, namely smart business security IOT application Protocol intelligent Service Security Application Protocol (ISSAP).


Network security has been great concern with recent technical advancement in wireless communication. And for that, a secured system is to be developed to provide data security over wireless transmission. This paper presents wireless body area network (WBAN) with cryptographic AES algorithm which monitors patient biomedical parameters based on sensors, Arduino and ZigBee. WBAN provides real-time measurements of patients health based on biomedical sensor. AES cryptographic algorithm is implemented for secure communication over wireless network by encryption and decryption of physiological parameters. Implementation of algorithm using Arduino has been communicated by ZigBee network to provide security to the encrypted data (cipher text) on medium cost devices. This ensures security of data for medical rehabilitation and monitoring of patients. The main purpose of this paper is to help a physician to treat patients during emergency by monitoring patients round the clock (24*7). This paper is helpful for elderly and disabled people with no assistance to measure and send the results to the doctor immediately


Author(s):  
Xuguang Chen ◽  
Hongbin Ma ◽  
Pujun Ji ◽  
Haiting Liu ◽  
Yan Liu

AbstractIn this paper, an adversarial encryption algorithm based on generating chaotic sequence by GAN is proposed. Starting from the poor leakage resistance of the basic adversarial encryption communication model based on GAN, the network structure was improved. Secondly, this paper used the generated adversarial network to generate chaotic-like sequences as the key K and entered the improved adversarial encryption model. The addition of the chaotic model further improved the security of the key. In the subsequent training process, the encryption and decryption party and the attacker confront each other and optimize, and then obtain a more secure encryption model. Finally, this paper analyzes the security of the proposed encryption scheme through the key and overall model security. After subsequent experimental tests, this encryption method can eliminate the chaotic periodicity to a certain extent and the model’s anti-attack ability has also been greatly improved. After leaking part of the key to the attacker, the secure communication can still be maintained.


2009 ◽  
Vol 42 (7) ◽  
pp. 104-109 ◽  
Author(s):  
Rupak Kharel ◽  
K. Busawon ◽  
Z. Ghassemlooy

Sign in / Sign up

Export Citation Format

Share Document