Handbook of Chaos Control 2007
DOI: 10.1002/9783527622313.ch14
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communication with Chaos Synchronization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
2

Year Published

2010
2010
2014
2014

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 37 publications
0
6
0
2
Order By: Relevance
“…Therefore, methods to generate a secret key over a public channel are desired. Recently, the synchronization of mutually coupled lasers was suggested as a way to generate a private key in the two agents of a communication link in the framework of public channel cryptography (Klein, Gross, Kopelowitz et al, 2006;Kinzel and Kanter, 2008;Vicente, Mirasso, and Fischer, 2007).…”
Section: Applications Of Delay-coupled Lasersmentioning
confidence: 99%
“…Therefore, methods to generate a secret key over a public channel are desired. Recently, the synchronization of mutually coupled lasers was suggested as a way to generate a private key in the two agents of a communication link in the framework of public channel cryptography (Klein, Gross, Kopelowitz et al, 2006;Kinzel and Kanter, 2008;Vicente, Mirasso, and Fischer, 2007).…”
Section: Applications Of Delay-coupled Lasersmentioning
confidence: 99%
“…The unidirectional configuration has been realized in a communication network over 120 km [15]. In terms of chaos communication, where such a setup is called chaos masking [16], one can think of the perturbation being a message which shall be secretly transmitted on top of a chaotic carrier signal. The message is small compared to the carrier signal and for our purpose its content may be considered as random noise.…”
Section: The Two Units Setupmentioning
confidence: 99%
“…In the following the sender transmits a binary message of the form m t = ±M with M 1 and m = 0 which is reconstructed by the receiver by subtracting its own state from the received signal [16]. The recovered messagem t is then given bỹ…”
Section: B Bit Error Ratementioning
confidence: 99%
See 1 more Smart Citation
“…In many of these systems, the intended application is secure communications, for which it is often assumed that security is obtained by masking or encoding the information in the natural complexity of chaos. In practice, the level of security depends on the actual encoding used to embed the message in the chaotic waveform [15,16], and it is now generally recognized that chaos does not automatically provide the high level of security that was originally assumed [17][18][19].…”
Section: Introductionmentioning
confidence: 99%