Security improvement for CSK via breaking time correlation among state variables

This paper presents a novel method to improve the security of the modulation technique of chaos shift keying (CSK). The strategy developed in the method is to remove correlation among state variables by means of applying delays to state variables in constitution of transmitted signal. The proposed method is tested under several applicable breaking techniques, i.e. of return map, power analysis, and generalized synchronization. It is shown that the proposed method can resist from conventional attacking techniques. Numerical simulation will be demonstrated with Lorenzpsilas system to verify the effectiveness of the method.

[1]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[2]  Tao Yang,et al.  A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .

[3]  Chi K. Tse,et al.  Chaos-Based Digital Communication Systems: Operating Principles, Analysis Methods, and Performance Evaluation , 2003 .

[4]  Guanrong Chen,et al.  Breaking a chaos-based secure communication scheme designed by an improved modulation method , 2004, nlin/0411007.

[5]  Alan V. Oppenheim,et al.  Circuit implementation of synchronized chaos with applications to communications. , 1993, Physical review letters.

[6]  Ta-lun Yang,et al.  Breaking chaotic switching using generalized synchronization: examples , 1998 .

[7]  G. Álvarez,et al.  Breaking parameter modulated chaotic secure communication system , 2003, nlin/0311041.

[8]  Bing-Hong Wang,et al.  Improving the security of chaotic encryption by using a simple modulating method , 2004 .

[9]  Thang Manh Hoang,et al.  New Encoding Model for Chaos-Based Secure Communication (Cross-disciplinary Physics and Related Areas of Science and Technology) , 2006 .

[10]  Leon O. Chua,et al.  Transmission of Digital signals by Chaotic Synchronization , 1992, Chua's Circuit.

[11]  Laurent Larger,et al.  Optical Cryptosystem Based on Synchronization of Hyperchaos Generated by a Delayed Feedback Tunable Laser Diode , 1998 .

[12]  G. Álvarez,et al.  Cryptanalyzing an improved security modulated chaotic encryption scheme using ciphertext absolute value , 2004, nlin/0406065.

[13]  Adonis Bogris,et al.  Chaos-based communications at high bit rates using commercial fibre-optic links , 2006, SPIE/OSA/IEEE Asia Communications and Photonics.

[14]  Pérez,et al.  Extracting messages masked by chaos. , 1995, Physical review letters.

[15]  S. Bishop,et al.  A zero-crossing approach to uncover the mask by chaotic encryption with periodic modulation , 2004 .

[16]  Hanping Hu,et al.  Analyzing and improving a chaotic encryption method , 2004 .

[17]  Carroll,et al.  Synchronization in chaotic systems. , 1990, Physical review letters.