2008
DOI: 10.1142/s0218127408020483
|View full text |Cite
|
Sign up to set email alerts
|

Time Scaling of Chaotic Systems: Application to Secure Communications

Abstract: The paper deals with time-scaling transformations of dynamical systems. Such scaling functions operate a change of coordinates on the time axis of the system trajectories preserving its phase portrait. Exploiting this property, a chaos encryption technique to transmit a binary signal through an analog channel is proposed. The scheme is based on a suitable time-scaling function which plays the role of a private key. The encoded transmitted signal is proved to resist known decryption attacks offering a secure an… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
12
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…Variation of CSK method was proposed as in [18] where authors have tried to confuse the intruders by including some switching parameters. However, there are branches in RM if the RM is zoomed in as shown in [19]. Methods like [4] has also been proposed but broken easily later [16].…”
Section: Security Analysismentioning
confidence: 99%
“…Variation of CSK method was proposed as in [18] where authors have tried to confuse the intruders by including some switching parameters. However, there are branches in RM if the RM is zoomed in as shown in [19]. Methods like [4] has also been proposed but broken easily later [16].…”
Section: Security Analysismentioning
confidence: 99%
“…Famous features of the chaotic systems like strong dependence on the initial conditions, topological transitivity, wide spread spectrum of their signals, etc., directly suggested the idea of using chaotic systems to build up a new generation of the communication methods and to design the novel secure chaos-based communication schemes. Most of them are based on the synchronization of the chaotic systems [Materassi & Basso, 2008;Kocarev et al, 1992;Pecora & Carroll, 1990;Kolumbán et al, 1998]. Unfortunately the majority of the proposed methods are introduced without any cryptanalysis, they have rather weak security and they would be very likely broken later on [Li et al, 2005;Li et al, 2006;Perez & Cerdeira, 1995;Alvarez et al, 2004;Yang et al, 1998a;Short, 1994;Hu & Guo, 2008].…”
Section: Introductionmentioning
confidence: 99%
“…[Alvarez & Li, 2006;Cruz-Hernández et al, 2005;Cruz-Hernández & Romero-Haros, 2008;Materassi & Basso, 2008;Trejo-Guerra et al, 2008]. Although many kinds of chaotic oscillators have been introduced, in electronics, Chua's circuit has been widely used because it allows the development of new designs and applications [Barboza & Chua, 2008;Bilotta et al, 2007;Cafagna & Grassi, 2004;Caponetto et al, 2005;Chua, 1994;Demirkol et al, 2008;Kilic, 2003;Tlelo-Cuautle & Muñoz-Pacheco, 2007;Yu et al, 2007].…”
Section: Introductionmentioning
confidence: 99%