Chaotic secure digital communication scheme using auxiliary systems
Title | Chaotic secure digital communication scheme using auxiliary systems |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Kharel, R., Raza, U., Ijaz, M., Ekpo, S., Busawon, K. |
Conference Name | 2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP) |
Date Published | July 2016 |
Publisher | IEEE |
ISBN Number | 978-1-5090-2526-8 |
Keywords | auxiliary chaotic systems, Auxiliary transmitters, chaotic communication, chaotic cryptography, chaotic secure digital communication scheme, chaotic synchronization, composability, cryptography, digital communication, Digital signal processing, discrete time systems, dynamical left inversion technique, encrypted message, Encryption, encryption function, hyperchaotic discrete primary chaotic systems, inclusion technique, Metrics, modified Henon hyperchaotic discrete-time system, observer, Observers, pubcrawl, radio receivers, radio transmitters, receiver side, Receivers, Resiliency, secure message transmission scheme, security, telecommunication security, transmitter parameters, transmitter side |
Abstract | In this paper, we present a new secure message transmission scheme using hyperchaotic discrete primary and auxiliary chaotic systems. The novelty lies on the use of auxiliary chaotic systems for the encryption purposes. We have used the modified Henon hyperchaotic discrete-time system. The use of the auxiliary system allows generating the same keystream in the transmitter and receiver side and the initial conditions in the auxiliary systems combined with other transmitter parameters suffice the role of the key. The use of auxiliary systems will mean that the information of keystream used in the encryption function will not be present on the transmitted signal available to the intruders, hence the reconstructing of the keystream will not be possible. The encrypted message is added on to the dynamics of the transmitter using inclusion technique and the dynamical left inversion technique is employed to retrieve the unknown message. The simulation results confirm the robustness of the method used and some comments are made about the key space from the cryptographic viewpoint. |
URL | https://ieeexplore.ieee.org/document/7574014/ |
DOI | 10.1109/CSNDSP.2016.7574014 |
Citation Key | kharel_chaotic_2016 |
- inclusion technique
- transmitter side
- transmitter parameters
- telecommunication security
- security
- secure message transmission scheme
- Resiliency
- Receivers
- receiver side
- radio transmitters
- radio receivers
- pubcrawl
- Observers
- observer
- modified Henon hyperchaotic discrete-time system
- Metrics
- auxiliary chaotic systems
- hyperchaotic discrete primary chaotic systems
- encryption function
- encryption
- encrypted message
- dynamical left inversion technique
- discrete time systems
- digital signal processing
- digital communication
- Cryptography
- composability
- chaotic synchronization
- chaotic secure digital communication scheme
- chaotic cryptography
- chaotic communication
- Auxiliary transmitters