Cryptographic requirements for chaotic secure communications
نویسندگان
چکیده
In recent years, a great amount of secure communications systems based on chaotic synchronization have been published. Most of the proposed schemes fail to explain a number of features of fundamental importance to all cryptosystems, such as implementation details, or key definition, characterization, and generation. As a consequence, the proposed ciphers are difficult to realize in practice with a reasonable degree of security. Likewise, they are seldom accompanied by a security analysis. Thus, it is hard for the reader to have a hint about their security and performance. In this work we provide a set of guidelines that every new cryptosystem would benefit from adhering to. The proposed guidelines address these two main gaps, i.e., correct key management and security analysis, among other topics, to help new cryptosystems be presented in a more rigorous cryptographic way. Also some recommendations are made regarding some practical aspects of communications, such as implementation, channel noise, limited bandwith, and attenuation.
منابع مشابه
طراحی سیستم مخابراتی امن با استفاده از سنکرونکردن سیستمهای آشوبی
In this paper, the concept of secure synchronization of chaotic systems using adaptive and robust techniques , has been discussed and then a new secure communication scheme, based on secure synchronization of a general class of chaotic systems called Generalized Lorenz System, are presented. This communication scheme is combination of conventional cryptographic methods and chaotic modulation me...
متن کاملLMI Fuzzy Observer Design for Cryptography in Wireless Mobile Communications
Recently the engineering community began to seek the possibly application of chaos. The fact that the cryptographic community had used discrete pseudo-chaotic systems for a long time to generate cipher keys that leads to the initiation of applying chaos to secure communications. This paper presents a schematic design methodology for a fuzzy observer based secure communication of hyper chaotic s...
متن کاملSynchronization Chaotic Communications with Closed Cryptographic Systems
In this paper the adaptive synchronization law with a single variable coupling is developed to ensure partial synchronization of two non identical dynamical systems. We need some cryptographic concepts to secure communications. We present a new simple way to synchronize two identical chaotic systems via another signal of non identical system, using an adaptive feedback controller. First, to ach...
متن کاملPattern Language for Cryptographic Key Management
Many services in a distributed public network like the Internet require secure communications. Security in communications consists of confidentiality, integrity, authenticity, and non-repudiability. These aims can be achieved with cryptography. Key management plays a fundamental role in secure communications, as it is the basis of all cryptographic functions. This paper describes a pattern lang...
متن کاملA Survey of Chaotic Secure Communication Systems
Secure communication using synchronization between chaotic systems(chaotic secure communication, for short) is a new concept of secure communication. The great potentials of this kind of “hardware key” secure communication systems had driven the progress of this field rapidly. Since 1992, chaotic secure communication had evolved four generations. In this paper, a detailed history of chaotic sec...
متن کامل