Parallel distributed compensation scheme for chaotic masking system via Rivest cipher 4 stream cipher
نویسندگان
چکیده
This study presents a design methodology for Takagi-Sugeno (T-S) fuzzy models-based secure communications in multiple time-delay chaotic (MTDC) systems with Rivest cipher 4 (RC4) algorithm. The main advantage of the RC4 algorithm is that key length does not affect encryption and decryption speeds. To block hacker from stealing message, this proposes increasing complexity an encrypted message (ciphertext) using method double masking. As result, more system can effectively defend (ciphertext). First, are used to encrypt initial (plaintext). enhance security, then converted into signal, which Additionally, improved genetic (IGA) adopted study, it seek better feedback gains controllers speed up synchronization. In accordance IGA, model-based controller synthesized exponentially stabilize error so trajectories slave approach those master systems. Finally, numerical example simulations provided illustrate effectiveness proposed method.
منابع مشابه
A Stream Cipher Based on Chaotic Permutations
In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...
متن کاملMulti-Map Orbit Hopping Chaotic Stream Cipher
Abstract In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum mechanism for secure digital communications and fundamental chaos characteristics of mixing, unpredictable, and extremely sensitive to initial conditions. The design, key and subkeys, and detail implementation of the system are addressed. A variable number of well studied ...
متن کاملChaos for Stream Cipher
This paper discusses mixing of chaotic systems as a dependable method for secure communication. Distribution of the entropy function for steady state as well as plaintext input sequences are analyzed. It is shown that the mixing of chaotic sequences results in a sequence that does not have any state dependence on the information encrypted by them. The generated output states of such a cipher ap...
متن کاملThe rakaposhi Stream Cipher
In this paper, we introduce the rakaposhi stream cipher. The algorithm is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources. The rakaposhi stream cipher offers 128-bit security, and aims to complement the current eSTREAM portfolio of hardware-oriented stream ciphers.
متن کاملThe Stream Cipher Rabbit
1 This is version 1.1 of the cipher specification as submitted to the eStream project. The only changes in comparison to version 1.0 are some additions to section 7 on computational efficiency and a new appendix A, which describes an 80-bit key setup.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Iet Control Theory and Applications
سال: 2023
ISSN: ['1751-8644', '1751-8652']
DOI: https://doi.org/10.1049/cth2.12471