Breaking projective chaos synchronization secure communication using filtering and generalized synchronization

This paper describes the security weaknesses of a recently proposed secure communication method based on chaotic masking using projective synchronization of two chaotic systems. We show that the system is insecure and how to break it in two different ways, by high-pass filtering and by generalized synchronization.

[1]  X. Mou,et al.  Improving security of a chaotic encryption approach , 2001, Physics Letters A.

[3]  Louis M. Pecora,et al.  Synchronizing chaotic circuits , 1991 .

[4]  Robert L. Devaney,et al.  A First Course in Chaotic Dynamical Systems , 2020 .

[5]  Harry F. Olson,et al.  Music, Physics and Engineering , 1967 .

[6]  Alan V. Oppenheim,et al.  Circuit implementation of synchronized chaos with applications to communications. , 1993, Physical review letters.

[7]  Alan V. Oppenheim,et al.  Chaotic signals and systems for communications , 1993, 1993 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[8]  Parlitz,et al.  Generalized synchronization, predictability, and equivalence of unidirectionally coupled dynamical systems. , 1996, Physical review letters.

[9]  Leon O. Chua,et al.  Secure Communications via Chaotic Synchronization II: Noise Reduction by Cascading Two Identical Receivers , 1993 .

[10]  Gonzalo Alvarez,et al.  Cryptanalysis of a chaotic secure communication system , 2003 .

[11]  Ta-lun Yang,et al.  Breaking chaotic switching using generalized synchronization: examples , 1998 .

[12]  Carroll,et al.  Driving systems with chaotic signals. , 1991, Physical review. A, Atomic, molecular, and optical physics.

[13]  John M. Eargle,et al.  Music, sound, and technology , 1990 .

[14]  L. Tsimring,et al.  Generalized synchronization of chaos in directionally coupled chaotic systems. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[15]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[16]  Zhen Ji,et al.  Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems , 2003, Int. J. Bifurc. Chaos.

[17]  Kevin M. Short,et al.  Steps Toward Unmasking Secure Communications , 1994 .

[18]  G. Á. Marañón,et al.  Cryptanalysis of a novel cryptosystem based on chaotic oscillators and feedback inversion , 2003, nlin/0311042.

[19]  Daolin Xu,et al.  Controlled Projective Synchronization in Nonpartially-Linear Chaotic Systems , 2002, Int. J. Bifurc. Chaos.

[20]  Chang-song Zhou,et al.  Extracting information masked by chaos and contaminated with noise: Some considerations on the security of communication approaches using chaos , 1997 .

[21]  Carroll,et al.  Synchronization in chaotic systems. , 1990, Physical review letters.

[22]  G. Álvarez,et al.  Breaking parameter modulated chaotic secure communication system , 2003, nlin/0311041.

[23]  Tao Yang,et al.  A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .

[24]  Ronnie Mainieri,et al.  Projective Synchronization In Three-Dimensional Chaotic Systems , 1999 .

[25]  Garry Tamlyn,et al.  Music , 1993 .

[26]  G. Álvarez,et al.  Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .

[27]  X. Mou,et al.  On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .

[28]  Douglas P. Boyd,et al.  PHYSICS AND ENGINEERING , 1979 .

[29]  Chai Wah Wu,et al.  A Simple Way to Synchronize Chaotic Systems with Applications to , 1993 .

[30]  Daolin Xu,et al.  A secure communication scheme using projective chaos synchronization , 2004 .