2016
DOI: 10.1142/s0218127416501406
|View full text |Cite
|
Sign up to set email alerts
|

Message Embedded Chaotic Masking Synchronization Scheme Based on the Generalized Lorenz System and Its Security Analysis

Abstract: This paper focuses on the design of the novel chaotic masking scheme via message embedded synchronization. A general class of the systems allowing the message embedded synchronization is presented here, moreover, it is shown that the generalized Lorenz system belongs to this class. Furthermore, the secure encryption scheme based on the message embedded synchronization is proposed. This scheme injects the embedded message into the dynamics of the transmitter as well, ensuring thereby synchronization with theore… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 54 publications
0
3
0
Order By: Relevance
“…All in all, our analysis shows that the cryptosystem defined in [Vidal et al, 2012] does not provide a sufficient protection against brute force attacks given the computational power of today's computers. In addition, the set of tools and the methodology applied in this paper can be very useful first to evaluate and perfect recent contributions in chaotic cryptography [ Čelikovskỳ & Lynnyk, 2016;Shakiba et al, 2016;Li, 2016;Xie et al, 2017], and second to guide the design of new proposals. Regarding this last concern, it is necessary to recall that the computer implementation of chaos is affected by finite precision matters, which erases the link between chaos and cryptography as it was implicitly established by Shannon [Alvarez et al, 2011].…”
Section: Discussionmentioning
confidence: 99%
“…All in all, our analysis shows that the cryptosystem defined in [Vidal et al, 2012] does not provide a sufficient protection against brute force attacks given the computational power of today's computers. In addition, the set of tools and the methodology applied in this paper can be very useful first to evaluate and perfect recent contributions in chaotic cryptography [ Čelikovskỳ & Lynnyk, 2016;Shakiba et al, 2016;Li, 2016;Xie et al, 2017], and second to guide the design of new proposals. Regarding this last concern, it is necessary to recall that the computer implementation of chaos is affected by finite precision matters, which erases the link between chaos and cryptography as it was implicitly established by Shannon [Alvarez et al, 2011].…”
Section: Discussionmentioning
confidence: 99%
“…1, March 2023: 347-356 348 method used, which is artificial neural network (ANN)-based chua chaotic system (CCS), was simpler, more effective, and produced good results as compared to other complex methods of image hiding, such as chaotic block image permutation and XOR operations are performed to achieve image encryption in [3]. Čelikovský and Lynnyk [4], introduced the chaotic masking scheme based on embedded message synchronization. An effective and high-security communication system based on two levels of encryption based on chaotic systems was proposed [5].…”
Section: Introductionmentioning
confidence: 99%
“…In the paper [3], a chaotic block image permutation and XOR operation are performed to achieve image encryption. The chaotic/masking scheme based on embedded message synchronization is introduced in [4]. An effective and high security/communication/system based on two levels of encryption based on chaotic systems was proposed in [5].…”
Section: Introductionmentioning
confidence: 99%