DOI QR코드

DOI QR Code

Encryption Communication Protocol Design Using Unidirectional Synchronization of the Chaos System

혼돈계의 단방향 동기화를 이용한 보안 프로토콜 설계

  • 조창호 (배재대학교 전기공학과) ;
  • 임거수 (배재대학교 전기공학과)
  • Received : 2014.08.28
  • Accepted : 2014.10.17
  • Published : 2014.10.31

Abstract

The quantity and quality of contents containing information are sharply increasing with the rising network speed. In line with this rapid growth of information volume, a new communication protocol using the chaotic signal that can protect contents in communication is proposed as follows. The chaos system has the characteristic of unpredictability due to the sensitive initial values and the similarity of the signals with noise. We configured two chaos systems $F(X_n,Y_n)$ and $G(A_n,B_n)$ that have such characteristics and designed a data communication method using as encryption channel the same chaos signals generated by synchronizing the chaos system G with the F signals. The proposed method was verified with the encryption and decryption of images. The proposed method is different from the existing encrypted communication methods and is expected to lay the foundation for future studies in related areas.is an example of ABSTRACT format.

네트워크의 속도가 향상 되면서 정보를 담고 있는 콘텐츠의 양과 질이 급격히 증가 하고 있다. 이런 정보의 급격한 변화에 맞추어 콘텐츠를 통신상에서 보호할 수 있는 혼돈신호를 이용한 새로운 통신 프로토콜을 다음과 같이 제안한다. 혼돈시스템은 초기치 민감성과 발생된 신호가 잡음과 유사하여 예측이 불가능한 특성을 가지고 있다. 우리는 이런 특성을 갖고 있는 두 개의 혼돈시스템 $F(X_n,Y_n)$$G(A_n,B_n)$를 구성하고 F 혼돈시스템의 신호로 G 혼돈시스템을 동기화시켜 발생되는 동일한 혼돈신호를 대칭키로 사용하고, 이렇게 구성된 암호 채널로 데이터를 송수신 하는 방법을 설계 하였다. 제안된 방법을 검증하기 위해 이미지의 암호화 및 복호화로 그 결과를 보였다. 우리가 제안한 방법은 기존의 암호화 통신과 다른 방법으로 추후 관련 분야의 연구에 초석이 될 것으로 생각된다.

Keywords

References

  1. C.-S. Lee, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no, 4, 2012. pp. 797-780.
  2. C.-K. Lee and W.-Y. Jeong, "A Study on Authentication Algorithm for NFC Security Channel," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no, 4, 2012. pp. 805-810.
  3. S.-J. Park and J.-H. Park, "Current Status and Analysis of Domestic Security Monitoring Systems," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 2, 2014. pp. 261-266. https://doi.org/10.13067/JKIECS.2014.9.2.261
  4. F. C. M. Lau and C. K. Tse, Chaos-Based Digital Communication Systems. Berlin: Springer, 2003.
  5. H. Zhang, D, Liu, and Z, Wang, Controlling Chaos. London: Springer, 2009.
  6. L. Kocarev and S. Lian, Chaos-Based Cryptography. Berlin: Springer, 2011.
  7. G.-S. Yim and H.-S. Kim, "Chaos-based Image Encryption Scheme using Noise-induced Synchronization," J. of the Korea Society of Computer and Information, vol. 13, no. 5, 2008, pp. 155-162.
  8. G.-S. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameters Chaotic System," Korea Information Assurance Society, vol. 8. no. 3, 2008, pp. 57-64.
  9. H.-S. Kim and G.-S. Yim, "Design of a digital photo frame for close-range security using the chaotic signals synchronization," J. of the Korea Society of Computer and Information, vol. 16, no. 2, 2011, pp. 201-206. https://doi.org/10.9708/jksci.2011.16.2.201
  10. H. G. Schuster, Deterministic Chaos an Introduction. 2nd, Weinheim: VCH, 1988.
  11. G. P. Williams, Chaos Theory Tamed. London: Taylor & Francis, 1997.
  12. E. Ott, Chaos in dynamical systems. New York: Cambridge University Press, 1993.
  13. G. L. Baker and J. P. Gollub, Chaotic Dynamics 2nd. New York: Cambridge University Press, 1996.
  14. A. H. Nayfeh and B. Balachandran, Applied Nonlinear Dynamics. Toronto: Wiley-Interscience, 1995.
  15. J. C. Yen and J. I. Guo "A new chaotic key-based design for image encryption and decryption," The 2000 IEEE Int. Symp. on Circuits and Systems, Geneva, Switzerland, May 2000, pp. 49-52.
  16. H. E. Ahmed, H. M. Kalash, and O. S. Farag Allah, "An Efficient Chaos-Based Feedbacks Stream Cipher for Image Encryption and Decryption," Information, vol. 31, 2007. pp. 121-129.
  17. F. Fu, Z. Zhang, Y. Chen, and X. Wang, "An Improved Chaos-Based Image Encryption Scheme," Int. Conf. on Computer Science 2007, Beijing, China, June 2007, pp. 575-582.