Browse > Article
http://dx.doi.org/10.13067/JKIECS.2014.9.10.1125

Encryption Communication Protocol Design Using Unidirectional Synchronization of the Chaos System  

Cho, Chang-Ho (배재대학교 전기공학과)
Yim, Geo-Su (배재대학교 전기공학과)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.9, no.10, 2014 , pp. 1125-1130 More about this Journal
Abstract
The quantity and quality of contents containing information are sharply increasing with the rising network speed. In line with this rapid growth of information volume, a new communication protocol using the chaotic signal that can protect contents in communication is proposed as follows. The chaos system has the characteristic of unpredictability due to the sensitive initial values and the similarity of the signals with noise. We configured two chaos systems $F(X_n,Y_n)$ and $G(A_n,B_n)$ that have such characteristics and designed a data communication method using as encryption channel the same chaos signals generated by synchronizing the chaos system G with the F signals. The proposed method was verified with the encryption and decryption of images. The proposed method is different from the existing encrypted communication methods and is expected to lay the foundation for future studies in related areas.is an example of ABSTRACT format.
Keywords
Encryption; Decryption; Secure Channel; Chaos; Pseudorandom Number;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 C.-S. Lee, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no, 4, 2012. pp. 797-780.   과학기술학회마을
2 C.-K. Lee and W.-Y. Jeong, "A Study on Authentication Algorithm for NFC Security Channel," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no, 4, 2012. pp. 805-810.   과학기술학회마을
3 S.-J. Park and J.-H. Park, "Current Status and Analysis of Domestic Security Monitoring Systems," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 2, 2014. pp. 261-266.   과학기술학회마을   DOI
4 F. C. M. Lau and C. K. Tse, Chaos-Based Digital Communication Systems. Berlin: Springer, 2003.
5 H. Zhang, D, Liu, and Z, Wang, Controlling Chaos. London: Springer, 2009.
6 L. Kocarev and S. Lian, Chaos-Based Cryptography. Berlin: Springer, 2011.
7 G.-S. Yim and H.-S. Kim, "Chaos-based Image Encryption Scheme using Noise-induced Synchronization," J. of the Korea Society of Computer and Information, vol. 13, no. 5, 2008, pp. 155-162.   과학기술학회마을
8 G.-S. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameters Chaotic System," Korea Information Assurance Society, vol. 8. no. 3, 2008, pp. 57-64.   과학기술학회마을
9 H.-S. Kim and G.-S. Yim, "Design of a digital photo frame for close-range security using the chaotic signals synchronization," J. of the Korea Society of Computer and Information, vol. 16, no. 2, 2011, pp. 201-206.   과학기술학회마을   DOI
10 H. G. Schuster, Deterministic Chaos an Introduction. 2nd, Weinheim: VCH, 1988.
11 G. P. Williams, Chaos Theory Tamed. London: Taylor & Francis, 1997.
12 E. Ott, Chaos in dynamical systems. New York: Cambridge University Press, 1993.
13 G. L. Baker and J. P. Gollub, Chaotic Dynamics 2nd. New York: Cambridge University Press, 1996.
14 A. H. Nayfeh and B. Balachandran, Applied Nonlinear Dynamics. Toronto: Wiley-Interscience, 1995.
15 J. C. Yen and J. I. Guo "A new chaotic key-based design for image encryption and decryption," The 2000 IEEE Int. Symp. on Circuits and Systems, Geneva, Switzerland, May 2000, pp. 49-52.
16 H. E. Ahmed, H. M. Kalash, and O. S. Farag Allah, "An Efficient Chaos-Based Feedbacks Stream Cipher for Image Encryption and Decryption," Information, vol. 31, 2007. pp. 121-129.
17 F. Fu, Z. Zhang, Y. Chen, and X. Wang, "An Improved Chaos-Based Image Encryption Scheme," Int. Conf. on Computer Science 2007, Beijing, China, June 2007, pp. 575-582.