2016
DOI: 10.1109/tcomm.2016.2628060
|View full text |Cite
|
Sign up to set email alerts
|

Secure Key Distribution based on Dynamic Chaos Synchronization of Cascaded Semiconductor Laser Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 42 publications
0
8
0
Order By: Relevance
“…Increasing the number of possible parameter values (i.e., key space) for establishing the chaos synchronization can also improve the security, as reported by Yi et al [50] and Wang et al [51]. Except for improving the security from the hardware point of view, the legitimate users can also use the independent and random private keys to switch the synchronization states to increase the difficulty of the eavesdropper in achieving the synchronization, as demonstrated by Uchida et al [20] and Jiang et al [25]. At last, we examined the statistical randomness of the two correlated random bit streams by using the NIST and Diehard test suites.…”
Section: B Generation and Analysis Of Correlated Random Bitsmentioning
confidence: 95%
See 1 more Smart Citation
“…Increasing the number of possible parameter values (i.e., key space) for establishing the chaos synchronization can also improve the security, as reported by Yi et al [50] and Wang et al [51]. Except for improving the security from the hardware point of view, the legitimate users can also use the independent and random private keys to switch the synchronization states to increase the difficulty of the eavesdropper in achieving the synchronization, as demonstrated by Uchida et al [20] and Jiang et al [25]. At last, we examined the statistical randomness of the two correlated random bit streams by using the NIST and Diehard test suites.…”
Section: B Generation and Analysis Of Correlated Random Bitsmentioning
confidence: 95%
“…characterized with wide bandwidth, large amplitude noise-like oscillation and synchronization possibility [2]. Such merits make them attractive for security-oriented applications, such as high-speed physical random bit generation [3][4][5][6][7][8][9][10][11], secure communication [12][13][14][15][16][17][18][19] and key distribution [20][21][22][23][24][25][26].…”
mentioning
confidence: 99%
“…These methods can be divided into two categories. One is the chaotic feedback laser such as secure key distribution [9], laser exclusive or (XOR) operation [10] and delay signature-suppressed in semiconductor lasers [11], and the typical application in chaotic feedback laser and microwave photonic chaotic communication [12], [13]. These methods require two sets of chaos generation equipment to be as identical as possible, which are difficult to achieve chaos synchronization for all the modulation parameters.…”
Section: Introductionmentioning
confidence: 99%
“…Owing to this, the fractional-order discrete chaotic system has become a new hot topic [ 8 , 9 , 10 , 11 , 12 , 13 , 14 ], especially for its synchronization [ 11 , 12 , 13 , 14 ]. Chaos synchronization has great significance in secure communication [ 15 , 16 , 17 ], and it plays an important role in nonlinear science [ 18 , 19 , 20 , 21 ]. Up to now, existing chaos synchronization methods for fractional-order discrete chaotic systems are based on known parameters and fractional orders of an original system [ 11 , 12 , 13 , 14 ].…”
Section: Introductionmentioning
confidence: 99%