Visible to the public Chaotic secure digital communication scheme using auxiliary systems

TitleChaotic secure digital communication scheme using auxiliary systems
Publication TypeConference Paper
Year of Publication2016
AuthorsKharel, R., Raza, U., Ijaz, M., Ekpo, S., Busawon, K.
Conference Name2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)
Date PublishedJuly 2016
PublisherIEEE
ISBN Number978-1-5090-2526-8
Keywordsauxiliary chaotic systems, Auxiliary transmitters, chaotic communication, chaotic cryptography, chaotic secure digital communication scheme, chaotic synchronization, composability, cryptography, digital communication, Digital signal processing, discrete time systems, dynamical left inversion technique, encrypted message, Encryption, encryption function, hyperchaotic discrete primary chaotic systems, inclusion technique, Metrics, modified Henon hyperchaotic discrete-time system, observer, Observers, pubcrawl, radio receivers, radio transmitters, receiver side, Receivers, Resiliency, secure message transmission scheme, security, telecommunication security, transmitter parameters, transmitter side
Abstract

In this paper, we present a new secure message transmission scheme using hyperchaotic discrete primary and auxiliary chaotic systems. The novelty lies on the use of auxiliary chaotic systems for the encryption purposes. We have used the modified Henon hyperchaotic discrete-time system. The use of the auxiliary system allows generating the same keystream in the transmitter and receiver side and the initial conditions in the auxiliary systems combined with other transmitter parameters suffice the role of the key. The use of auxiliary systems will mean that the information of keystream used in the encryption function will not be present on the transmitted signal available to the intruders, hence the reconstructing of the keystream will not be possible. The encrypted message is added on to the dynamics of the transmitter using inclusion technique and the dynamical left inversion technique is employed to retrieve the unknown message. The simulation results confirm the robustness of the method used and some comments are made about the key space from the cryptographic viewpoint.

URLhttps://ieeexplore.ieee.org/document/7574014/
DOI10.1109/CSNDSP.2016.7574014
Citation Keykharel_chaotic_2016