Cryptographic requirements for chaotic secure communications

نویسندگان

  • Gonzalo Álvarez
  • Shujun Li
چکیده

In recent years, a great amount of secure communications systems based on chaotic synchronization have been published. Most of the proposed schemes fail to explain a number of features of fundamental importance to all cryptosystems, such as implementation details, or key definition, characterization, and generation. As a consequence, the proposed ciphers are difficult to realize in practice with a reasonable degree of security. Likewise, they are seldom accompanied by a security analysis. Thus, it is hard for the reader to have a hint about their security and performance. In this work we provide a set of guidelines that every new cryptosystem would benefit from adhering to. The proposed guidelines address these two main gaps, i.e., correct key management and security analysis, among other topics, to help new cryptosystems be presented in a more rigorous cryptographic way. Also some recommendations are made regarding some practical aspects of communications, such as implementation, channel noise, limited bandwith, and attenuation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

طراحی سیستم مخابراتی امن با استفاده از سنکرونکردن سیستمهای آشوبی

In this paper, the concept of secure synchronization of chaotic systems using adaptive and robust techniques , has been discussed and then a new secure communication scheme, based on secure synchronization of a general class of chaotic systems called Generalized Lorenz System, are presented. This communication scheme is combination of conventional cryptographic methods and chaotic modulation me...

متن کامل

LMI Fuzzy Observer Design for Cryptography in Wireless Mobile Communications

Recently the engineering community began to seek the possibly application of chaos. The fact that the cryptographic community had used discrete pseudo-chaotic systems for a long time to generate cipher keys that leads to the initiation of applying chaos to secure communications. This paper presents a schematic design methodology for a fuzzy observer based secure communication of hyper chaotic s...

متن کامل

Synchronization Chaotic Communications with Closed Cryptographic Systems

In this paper the adaptive synchronization law with a single variable coupling is developed to ensure partial synchronization of two non identical dynamical systems. We need some cryptographic concepts to secure communications. We present a new simple way to synchronize two identical chaotic systems via another signal of non identical system, using an adaptive feedback controller. First, to ach...

متن کامل

Pattern Language for Cryptographic Key Management

Many services in a distributed public network like the Internet require secure communications. Security in communications consists of confidentiality, integrity, authenticity, and non-repudiability. These aims can be achieved with cryptography. Key management plays a fundamental role in secure communications, as it is the basis of all cryptographic functions. This paper describes a pattern lang...

متن کامل

A Survey of Chaotic Secure Communication Systems

Secure communication using synchronization between chaotic systems(chaotic secure communication, for short) is a new concept of secure communication. The great potentials of this kind of “hardware key” secure communication systems had driven the progress of this field rapidly. Since 1992, chaotic secure communication had evolved four generations. In this paper, a detailed history of chaotic sec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003