Number of the records: 1  

Efficient chaos shift keying method based on the second error derivative anti-synchronization detection

  1. 1.
    SYSNO ASEP0334195
    Document TypeC - Proceedings Paper (int. conf.)
    R&D Document TypeConference Paper
    TitleEfficient chaos shift keying method based on the second error derivative anti-synchronization detection
    TitleEfektivní metoda chaotického kódování založená na detekci anti-synchronizace pomocí druhé derivace synchronizační odchylky
    Author(s) Čelikovský, Sergej (UTIA-B) RID, ORCID
    Lynnyk, Volodymyr (UTIA-B) RID, ORCID
    Source TitleProceedings of the Seventh IEEE International Conference on Control and Automation, Library Catalog Number: CFP09537-CDR. - Christchurch : IEEE, 2009 - ISBN 978-1-4244-4707-7
    Pagess. 530-535
    Number of pages6 s.
    Publication formDVD Rom - DVD Rom
    ActionSeventh IEEE International Conference on Control and Automation
    Event date09.12.2009-11.12.2009
    VEvent locationChristchurch
    CountryNZ - New Zealand
    Event typeWRD
    Languageeng - English
    CountryNZ - New Zealand
    Keywordschaos shift keying ; chaos synchronization ; efficient chaos
    Subject RIVBC - Control Systems Theory
    R&D ProjectsGA102/08/0186 GA ČR - Czech Science Foundation (CSF)
    CEZAV0Z10750506 - UTIA-B (2005-2011)
    AnnotationThis paper studies yet another improvement of the anti-synchronization chaos shift keying scheme for the secure encryption and decryption of the digital data. A new concept of the detection of the correct binary value in the receiver is introduced here. The proposed method requires very reasonable amount of data to encrypt and time to decrypt one bit. Basically, to encrypt one bit, only one iteration (i.e. only one real number of 6 valid digits) is needed. At the same time, thanks to the anti-synchronization detection based on the synchronization error second derivative, almost 100% of the carrying chaotic signal can be used. The security of the proposed method can be systematically investigated showing its good resistance against typical decryption attacks. The theoretical analysis of the introduced method is supported by the numerical experiments with digital data encryption.
    WorkplaceInstitute of Information Theory and Automation
    ContactMarkéta Votavová, votavova@utia.cas.cz, Tel.: 266 052 201.
    Year of Publishing2010
Number of the records: 1  

  This site uses cookies to make them easier to browse. Learn more about how we use cookies.