Problems with the chaotic inverse system encryption approach

被引:72
作者
Zhou, H
Ling, XT
机构
[1] CAT Laboratory, Fudan University, Shanghai
来源
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-FUNDAMENTAL THEORY AND APPLICATIONS | 1997年 / 44卷 / 03期
基金
美国国家科学基金会;
关键词
chaotic inverse system approach; reconstruction; self-synchronization;
D O I
10.1109/81.557386
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This letter enumerates several defects in nowadays chaotic inverse system approaches, such as, the chaotic mapping may be reconstructed from a few plaintexts and their corresponding ciphertexts, and the self-synchronizing subsystem is so insensitive to its parameter mismatches that its parameters are generally not suitable for ciphers. Based upon Feldmann et al.'s model, we propose an enhanced model to overcome above problems. The new model is difficult to reconstruct and is sensitive to parameter mismatches, and the encrypted signal is shown to be uniformly distributed.
引用
收藏
页码:268 / 271
页数:4
相关论文
共 10 条
  • [1] Design of one-dimensional chaotic maps with prescribed statistical properties
    Baranovsky, A
    Daems, D
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1995, 5 (06): : 1585 - 1598
  • [2] SYNCHRONIZATION OF LORENZ-BASED CHAOTIC CIRCUITS WITH APPLICATIONS TO COMMUNICATIONS
    CUOMO, KM
    OPPENHEIM, AV
    STROGATZ, SH
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-ANALOG AND DIGITAL SIGNAL PROCESSING, 1993, 40 (10): : 626 - 633
  • [3] CHAOS SHIFT KEYING - MODULATION AND DEMODULATION OF A CHAOTIC CARRIER USING SELF-SYNCHRONIZING CHUA CIRCUITS
    DEDIEU, H
    KENNEDY, MP
    HASLER, M
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-ANALOG AND DIGITAL SIGNAL PROCESSING, 1993, 40 (10): : 634 - 642
  • [4] FELDMANN U, 1995, IEEE INT SYMP CIRC S, P680, DOI 10.1109/ISCAS.1995.521605
  • [5] CHAOTIC DIGITAL ENCODING - AN APPROACH TO SECURE COMMUNICATION
    FREY, DR
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 1993, 40 (10) : 660 - 666
  • [6] HABUTSU T, 1990, P IEICE, V76, P1041
  • [7] Matthews R., 1989, CRYPTOLOGIA, V13, P29, DOI DOI 10.1080/0161-118991863745
  • [8] STEPS TOWARD UNMASKING SECURE COMMUNICATIONS
    SHORT, KM
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1994, 4 (04): : 959 - 977
  • [9] WHELLER DD, 1991, CRYPTOLOGIA, V15, P140
  • [10] WHELLER DD, 1989, CRYPTOLOGIA, V13, P243