2016
DOI: 10.15446/dyna.v83n197.53506
|View full text |Cite
|
Sign up to set email alerts
|

Secure point-to-point communication using chaos

Abstract: <p>Este artículo presenta una alternativa para resolver la vulnerabilidad existente en los sistemas que implementan el enmascaramiento mediante la sincronización caótica, este sistema evita que los parámetros utilizados como clave de cifrado puedan ser detectados por un atacante al implementar el modelo matemático caótico del oscilador de Rössler para codificar y establecer la sincronización entre los dispositivos transmisor-receptor; además usa dos llaves de cifrado: la primera con una longitud recomend… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…A breaking chaotic direct sequence spread spectrum with a modified unscented-Kalman-filter fitting has been proposed to implement the chaotic secure communication (JinFeng and JingBo 2008). Chaos synchronization method is also extensively utilized in handing chaotic secure communication (Miliou et al 2007;Zaher and Abu-Rezq 2011;N'Doye, Darouach, and Voos 2013;Jiménez-Rodríguez et al 2016). Jovic (2011) described an operation process of secure communication based on chaotic synchronization technique in detail.…”
Section: Introductionmentioning
confidence: 99%
“…A breaking chaotic direct sequence spread spectrum with a modified unscented-Kalman-filter fitting has been proposed to implement the chaotic secure communication (JinFeng and JingBo 2008). Chaos synchronization method is also extensively utilized in handing chaotic secure communication (Miliou et al 2007;Zaher and Abu-Rezq 2011;N'Doye, Darouach, and Voos 2013;Jiménez-Rodríguez et al 2016). Jovic (2011) described an operation process of secure communication based on chaotic synchronization technique in detail.…”
Section: Introductionmentioning
confidence: 99%