• Title/Summary/Keyword: Chaos-based Security

Search Result 29, Processing Time 0.018 seconds

Design and Implementation of a Web Security System using a Chaos Cipher Algorithm (카오스 암호화 알고리즘을 이용한 웹 보안 시스템 설계 및 구현)

  • Lee, Bong-Hwan;Kim, Cheol-Min;Yun, Dong-Won;Chae, Yong-Ung;Kim, Hyeon-Gon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.585-596
    • /
    • 2001
  • In this paper, a new stream cipher algorithm based on the chaos theory is proposed and is applied to a Web security system. The Web security system is composed of three parts: certificate authority (CA), Web client, and Web server. The Web client and server system include a secure proxy client (SPC) and a secure management server (SMS), respectively, for data encryption and decryption between them. The certificate is implemented based on X.509 and the RSA public key algorithm is utilized for key creation and distribution to certify both the client and server. Once a connection is established between the client and server, outgoing and incoming data are encrypted and decrypted, respectively, using one of the three cipher algorithms: chaos, SEED, and DES. The proposed chaos algorithm outperforms the other two conventional algorithms in processing time and complexity. Thus, the developed Web security system can be widely used in electronic commerce (EC) and Internet banking.

  • PDF

Design and Implementation of Image Encryption Method for Multi-Parameter Chaotic System (다중변수 혼돈계를 이용한 이미지 암호화 방법의 설계 및 구현)

  • Yim, Geo-Su
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.57-64
    • /
    • 2008
  • The Security of digital images has become increasingly more important in highly computerized and interconnected world. Therefore, The chaos-based encryption algorithms have suggested some new and efficient ways to develop secure image encryption method. This paper is described for the point at issue in all chaos-based encryption method for distribution of a chaotic signals. It has a method for generation of uniformly distributed chaotic signals that we designed secure algorithm of multi-parameter chaotic systems. So we are present validity of the theoretical models for results of image encryption and decryption for proposed method.

  • PDF

Microcontroller-based Chaotic Signal Generator for Securing Power Line Communication: Part I-A System View (전력선 암호화 통신을 위한 마이크로콘트롤러 기반 카오스 신호 발생기: 1부 - 시스템 뷰)

  • Al-Shidaifat, Ala'aDdin;Jayawickrama, Chamindra;Ji, Sunghyun;Nguyen, Van Ha;Kwon, Yoo-Jin;Song, Hanjung
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.2 no.4
    • /
    • pp.563-567
    • /
    • 2016
  • In this paper, the chaos-based secure scheme for power line communication is proposed for the first time. A digitalized chaotic generator based Lorenz system is utilized for generating nonlinear dynamic chaotic signal for masking the information signal instead of reported analog chaotic generators. A simple method of encryption and decryption is also given. In order to confirm the feasibility of the proposed scheme, the system is simulated using a simplified encryption/decryption method in Proteus. The gained results from simulation demonstrated that by using the chaos-based security method, the data can be encrypted and easily transmitted through the power line network efficiently.

Efficient Image Chaotic Encryption Algorithm with No Propagation Error

  • Awad, Abir;Awad, Dounia
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.774-783
    • /
    • 2010
  • Many chaos-based encryption methods have been presented and discussed in the last two decades, but very few of them are suitable to secure transmission on noisy channels or respect the standard of the National Institute of Standards and Technology (NIST). This paper tackles the problem and presents a novel chaos-based cryptosystem for secure transmitted images. The proposed cryptosystem overcomes the drawbacks of existing chaotic algorithms such as the Socek, Xiang, Yang, and Wong methods. It takes advantage of the increasingly complex behavior of perturbed chaotic signals. The perturbing orbit technique improves the dynamic statistical properties of generated chaotic sequences, permits the proposed algorithm reaching higher performance, and avoids the problem of error propagation. Finally, many standard tools, such as NIST tests, are used to quantify the security level of the proposed cryptosystem, and experimental results prove that the suggested cryptosystem has a high security level, lower correlation coefficients, and improved entropy.

Chaos-based Image Encryption Scheme using Noise-induced Synchronization (잡음으로 동기화 된 혼돈신호를 이용한 이미지 암호화 방법)

  • Yim, Geo-Su;Kim, Hong-Sop
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.155-162
    • /
    • 2008
  • The security of digital image has become increasingly important with the development of the computing performance and internet. Therefore, the encryption algorithms exploiting chaos signal have recently attracted considerable attentions as a new method of image-encryption techniques. In this Paper, it is demonstrated that two different chaotic systems are synchronized by the methods of noise-induced synchronization. Based on this synchronization method, an image-encryption system is implemented and an image of Seok-Ga-Tap is encrypted as a verification of the performance of our system. The method suggested in this paper in which the noise is used as the key of decryption is superior to the existing methods in the aspect of the degree of encryption. In this paper, we Propose that the method is a new effective encryption algorithm as well as an easily applicable one.

  • PDF

Chaos based Communication System Using Reverse DCSK (역방향 DCSK를 이용한 카오스기반 통신 시스템)

  • Jang, Eun-Young
    • Journal of IKEEE
    • /
    • v.23 no.3
    • /
    • pp.934-940
    • /
    • 2019
  • In this paper, we propose a Reverse Differential Chaos Shift Keying (RE-DCSK) system for low cost, high reliability and high data rate non-coherent chaos communication .In RE-DCSK, reference signals are transmitted in the first slot as in the conventional differential chaos shift modulation scheme (DCSK) and in the second slot a time inversion block strengthens the autocorrelation of the chaos signal and uses the orthogonality of the two signals to obtain the information signal. RE-DCSK enables relatively double the data rate compared to DCSK and also improves the security of communications without any additional cost of system complexity.To prove its effectiveness, we analyze it through Rayleigh fading channel and additional white Gaussian noise (AWGN) channel based on the derived BER expression. The BER performance of the proposed system is improved when compared with the CDSK and DCSK system using AWGN channel.

A Novel Transmitter and Receiver Design of CDSK-Based Chaos Communication System (CDSK 방식의 카오스 통신 시스템의 새로운 송·수신기 설계)

  • Lee, Jun-Hyun;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.10
    • /
    • pp.987-993
    • /
    • 2013
  • Chaos communication system has characteristics of non-periodic, non-predictability, broadband signal and easy implementation. Also, chaos communication system is sensitive to the initial value, because completely another signal is generated when initial value of chaos equation is changed subtly. By these characteristics, security of chaos communication system is generally evaluated better than other digital communication systems. However, BER(Bit Error Rate) performance is worse than other digital communication systems, because transmitter and receiver of existing chaos communication system are strongly influenced by reference signal and noise. So, studies in order to improve the BER performance of chaos communication system is continuously performed. In this paper, We will propose a new CDSK (Correlation Delay Shift Keying) receiver in order to improve the BER performance. After we compare to the performance of existing receiver and proposed receiver, BER performance of proposed receiver evaluate. A novel receiver has characteristic that BER performance is better than existing receiver. However, if existing transmitter is used, existing receiver is possible to recover information bits even though BER performance is bad. Therefore, we propose a novel CDSK transmitter in order to improve the security of proposed receiver. When information bits are transmitted by using proposed transmitter, existing receiver is impossible to recover information bits, and proposed receiver is possible to recover information bits.

An EEG Encryption Scheme for Authentication System based on Brain Wave (뇌파 기반의 인증시스템을 위한 EEG 암호화 기법)

  • Kim, Jung-Sook;Chung, Jang-Young
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.3
    • /
    • pp.330-338
    • /
    • 2015
  • Gradually increasing the value of the technology, the techniques of the various security systems to protect the core technology have been developed. The proposed security scheme, which uses both a Password and the various devices, is always open by malicious user. In order to solve that problem, the biometric authentication systems are introduced but they have a problem which is the secondary damage to the user. So, the authentication methods using EEG(Electroencephalography) signals were developed. However, the size of EEG signals is big and it cause a lot of problems for the real-time authentication. And the encryption method is necessary. In this paper, we proposed an efficient real-time authentication system applied encryption scheme with junk data using chaos map on the EEG signals.

Design and Implementation of a Improved Cipher Web Mail System using a Chaos Cipher (카오스 암호를 이용한 개선된 암호화 웹 메일 시스템의 설계와 구현)

  • Kim Dae-Young;Kim Tae-Sik
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.437-444
    • /
    • 2006
  • A chaos cipher system that focuses on the stream cipher system has a demerit that the longer the text is, the slower the speed of the encryption and description and the transmission and reception. On this study, we designed the cipher web mail system showing much better capabilities than the existing web mail system as the text is longer. In the embodiment of the cipher web mail system, we developed the key stream, the encryption and description of the text and the inside and outside mail viewer and so on. After the efficiency test, it was valued high in the respect of the speed of the encryption and description and the transmission and reception. And it made up for the defect of the stream cipher system. We expect that we can use it through the persistent applied study in the server system security, the file security, the security of the internet information, the protection of the e-commerce system information and other fields based on the cipher technique as the wide use cipher system that can replace the block cipher system.

Machine Learning-Based Reversible Chaotic Masking Method for User Privacy Protection in CCTV Environment

  • Jimin Ha;Jungho Kang;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.767-777
    • /
    • 2023
  • In modern society, user privacy is emerging as an important issue as closed-circuit television (CCTV) systems increase rapidly in various public and private spaces. If CCTV cameras monitor sensitive areas or personal spaces, they can infringe on personal privacy. Someone's behavior patterns, sensitive information, residence, etc. can be exposed, and if the image data collected from CCTV is not properly protected, there can be a risk of data leakage by hackers or illegal accessors. This paper presents an innovative approach to "machine learning based reversible chaotic masking method for user privacy protection in CCTV environment." The proposed method was developed to protect an individual's identity within CCTV images while maintaining the usefulness of the data for surveillance and analysis purposes. This method utilizes a two-step process for user privacy. First, machine learning models are trained to accurately detect and locate human subjects within the CCTV frame. This model is designed to identify individuals accurately and robustly by leveraging state-of-the-art object detection techniques. When an individual is detected, reversible chaos masking technology is applied. This masking technique uses chaos maps to create complex patterns to hide individual facial features and identifiable characteristics. Above all, the generated mask can be reversibly applied and removed, allowing authorized users to access the original unmasking image.