Chaotic cryptosystem based on inverse duffing circuit

We have studied experimentally a chaotic cryptosystem, which is based on the inverse system approach. We applied this method to a second order nonlinear circuit (master circuit), which is described by a Duffing equation. We present the implementation of the slave circuit with the inverse system approach and we demonstrate the decryption when the information signal has several forms (sinusoidal and rectangular). By appropriate choice of the parameters of the nonlinear oscillator, and the signal oscillator, it is possible to have a cryptosystem capable of transmitting information securely and recovering it accurately.

[1]  Adrian Leuciuc,et al.  The realization of inverse system for circuits containing nullors with applications in chaos synchronization , 1998, Int. J. Circuit Theory Appl..

[2]  Hong Zhou,et al.  Problems with the chaotic inverse system encryption approach , 1997 .

[3]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[4]  Luxi Yang,et al.  A robust digital secure communication scheme based on sporadic coupling chaos synchronization , 2000 .

[5]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[6]  D. R. Frey,et al.  Chaotic digital encoding: an approach to secure communication , 1993 .

[7]  Johannes A. Buchmann,et al.  Introduction to Cryptography , 2001 .

[8]  Andrew C. Lee Review of Introduction to cryptography by Johannes A. Buchmann. Springer Verlag, 2001. , 2003, SIGA.

[9]  Ioannis M. Kyprianidis,et al.  Synchronization of two chaotic duffing-type electrical oscillators , 2006 .

[10]  S. C. Coutinho The Mathematics of Ciphers: Number Theory and RSA Cryptography , 1999 .

[11]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[12]  A. Leuciuc,et al.  Information transmission using chaotic discrete-time filter , 2000 .

[13]  A. Leuciuc,et al.  The realization of inverse system for circuits containing nullors with applications in chaos synchronization , 1998 .

[14]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[15]  Jan C. A. van der Lubbe,et al.  Basic Methods of Cryptography , 1998 .

[16]  Anastasios Bezerianos,et al.  Secure Communication with Chaotic Systems of Difference Equations , 1997, IEEE Trans. Computers.

[17]  M.I. Aziz,et al.  Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.

[18]  Christos Volos,et al.  Designing a coupling scheme between two chaotic Duffing-type electrical oscillators , 2006 .