Using discrete-time hyperchaotic-based asymmetric encryption and decryption keys for secure signal transmission

In this paper, a framework for the synchronization of two non-identical discrete-time hyperchaotic systems, namely the 3D Baier-Klein and the 3D Hitzel-Zele maps, based on the use of hybrid output feedback concept and aggregation techniques, is employed to design a two-channel secure communication system. New sufficient conditions for synchronization are obtained by the use of Borne and Gentina practical criterion for stabilization study associated to the forced arrow form matrix for system description. The efficiency of the proposed approach to confidentially recover the transmitted message signal is shown via an application to the hyperchaotic Baier-Klein and Hitzel-Zele systems, considered as generators of asymmetric encryption and decryption keys.

[1]  Jean-Pierre Barbot,et al.  Discrete-time Normal Form for Left Invertibility Problem , 2009, Eur. J. Control.

[2]  Mohamed Djemai,et al.  Cryptography by discrete-time hyperchaotic systems , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[3]  Giuseppe Grassi,et al.  Dead-beat full state hybrid projective synchronization for chaotic maps using a scalar synchronizing signal , 2012 .

[4]  Louis M. Pecora,et al.  Synchronizing chaotic circuits , 1991 .

[5]  Henry Leung,et al.  A chaos secure communication scheme based on multiplication modulation , 2010 .

[6]  G. Grassi,et al.  Theory and experimental realization of observer-based discrete-time hyperchaos synchronization , 2002 .

[7]  Mohamed Benrejeb,et al.  On the synchronization of identical and non-identical 4-D chaotic systems using arrow form matrix , 2009 .

[8]  Ihsan Pehlivan,et al.  Nonlinear Sprott94 Case A chaotic equation: Synchronization and masking communication applications , 2010, Comput. Electr. Eng..

[9]  Jean-Pierre Barbot,et al.  Observability quadratic normal form for discrete-time systems , 2005, IEEE Transactions on Automatic Control.

[10]  Guanrong Chen,et al.  A simple global synchronization criterion for coupled chaotic systems , 2003 .

[11]  Xiao-Song Yang,et al.  Concepts of synchronization in dynamical systems , 1999 .

[12]  Rupak Kharel,et al.  Secure digital communication using discrete-time chaotic systems via indirect coupling synchronization , 2010, Proceedings of the 2010 American Control Conference.

[13]  S. Hammami Security Analysis of High Dimensional Chaotic-Based Cryptosystem via its Key Sensitivity Study , 2013 .

[14]  Ö. Morgül,et al.  A chaotic masking scheme by using synchronized chaotic systems , 1999 .

[15]  Mohamed Benrejeb,et al.  Feedback control design for Rössler and Chen chaotic systems anti-synchronization , 2010 .

[16]  Driss Boutat,et al.  New Type of Data Transmission Using a Synchronization of Chaotic Systems , 2005, Int. J. Bifurc. Chaos.

[17]  Zhiming Wang,et al.  Controlled synchronization for chaotic systems via limited information with data packet dropout , 2013, Autom..

[18]  G. Baier,et al.  Maximum hyperchaos in generalized Hénon maps , 1990 .

[19]  Louis M Pecora,et al.  Synchronization of chaotic systems. , 2015, Chaos.

[20]  M. Siewe Siewe,et al.  Secure communication via parameter modulation in a class of chaotic systems , 2007 .

[21]  Mohamed Djemai,et al.  Synchronization of Discrete-Time Chaotic Systems for Secured Data Transmission , 2005 .

[22]  Hammami Sonia,et al.  Coexistence of Synchronization and Anti-Synchronization for Chaotic Systems via Feedback Control , 2011 .

[23]  J. Daafouz,et al.  An observer-based approach for input-independent global chaos synchronization of discrete-time switched systems , 2003 .

[24]  Michael Peter Kennedy,et al.  Chaos shift keying : modulation and demodulation of a chaotic carrier using self-sychronizing chua"s circuits , 1993 .

[25]  Teh-Lu Liao,et al.  Adaptive synchronization of chaotic systems and its application to secure communications , 2000 .

[26]  Sonia Hammami,et al.  Hybrid synchronization of discrete-time hyperchaotic systems based on aggregation techniques for image encryption , 2013, 14th International Conference on Sciences and Techniques of Automatic Control & Computer Engineering - STA'2013.