Security analysis of communication system based on the synchronization of different order chaotic systems

This Letter analyzes the security weakness of a recently proposed communication method based on chaotic modulation and masking using synchronization of two chaotic systems with different orders. It is shown that its application to secure communication is unsafe, because it can be broken in two different ways, by high-pass filtering and by reduced order system synchronization, without knowing neither the system parameter values nor the system key.

[1]  F. Harris On the use of windows for harmonic analysis with the discrete Fourier transform , 1978, Proceedings of the IEEE.

[2]  Gonzalo Alvarez,et al.  Cryptanalysis of a chaotic secure communication system , 2003 .

[3]  S. Bowong Stability analysis for the synchronization of chaotic systems with different order: application to secure communications , 2004 .

[4]  X. Mou,et al.  Improving security of a chaotic encryption approach , 2001, Physics Letters A.

[5]  Shuzhi Sam Ge,et al.  Synchronization of Two uncertain Chaotic Systems via Adaptive backstepping , 2001, Int. J. Bifurc. Chaos.

[6]  G. Álvarez,et al.  Breaking parameter modulated chaotic secure communication system , 2003, nlin/0311041.

[7]  Robert L. Devaney,et al.  A First Course in Chaotic Dynamical Systems , 2020 .

[8]  R. Femat,et al.  Synchronization of chaotic systems with different order. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[9]  Choy Heng Lai,et al.  On the synchronization of different chaotic oscillators , 2000 .

[10]  Tom E. Bishop,et al.  Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[11]  Leon O. Chua,et al.  Secure Communications via Chaotic Synchronization II: Noise Reduction by Cascading Two Identical Receivers , 1993 .

[12]  X. Mou,et al.  On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .

[13]  Chai Wah Wu,et al.  A Simple Way to Synchronize Chaotic Systems with Applications to , 1993 .

[14]  Carroll,et al.  Synchronization in chaotic systems. , 1990, Physical review letters.

[15]  Zhen Ji,et al.  Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems , 2003, Int. J. Bifurc. Chaos.

[16]  G. Álvarez,et al.  Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .

[17]  Alan V. Oppenheim,et al.  Chaotic signals and systems for communications , 1993, 1993 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[18]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[19]  Chang-song Zhou,et al.  Extracting information masked by chaos and contaminated with noise: Some considerations on the security of communication approaches using chaos , 1997 .

[20]  Alan V. Oppenheim,et al.  Circuit implementation of synchronized chaos with applications to communications. , 1993, Physical review letters.

[21]  Kevin M. Short,et al.  Steps Toward Unmasking Secure Communications , 1994 .

[22]  G Alvarez,et al.  Estimating short-time period to break different types of chaotic modulation based secure communications , 2004, nlin/0406039.