Number of the records: 1
Efficient chaos shift keying method based on the second error derivative anti-synchronization detection
- 1.
SYSNO ASEP 0334195 Document Type C - Proceedings Paper (int. conf.) R&D Document Type Conference Paper Title Efficient chaos shift keying method based on the second error derivative anti-synchronization detection Title Efektivní metoda chaotického kódování založená na detekci anti-synchronizace pomocí druhé derivace synchronizační odchylky Author(s) Čelikovský, Sergej (UTIA-B) RID, ORCID
Lynnyk, Volodymyr (UTIA-B) RID, ORCIDSource Title Proceedings of the Seventh IEEE International Conference on Control and Automation, Library Catalog Number: CFP09537-CDR. - Christchurch : IEEE, 2009 - ISBN 978-1-4244-4707-7 Pages s. 530-535 Number of pages 6 s. Publication form DVD Rom - DVD Rom Action Seventh IEEE International Conference on Control and Automation Event date 09.12.2009-11.12.2009 VEvent location Christchurch Country NZ - New Zealand Event type WRD Language eng - English Country NZ - New Zealand Keywords chaos shift keying ; chaos synchronization ; efficient chaos Subject RIV BC - Control Systems Theory R&D Projects GA102/08/0186 GA ČR - Czech Science Foundation (CSF) CEZ AV0Z10750506 - UTIA-B (2005-2011) Annotation This paper studies yet another improvement of the anti-synchronization chaos shift keying scheme for the secure encryption and decryption of the digital data. A new concept of the detection of the correct binary value in the receiver is introduced here. The proposed method requires very reasonable amount of data to encrypt and time to decrypt one bit. Basically, to encrypt one bit, only one iteration (i.e. only one real number of 6 valid digits) is needed. At the same time, thanks to the anti-synchronization detection based on the synchronization error second derivative, almost 100% of the carrying chaotic signal can be used. The security of the proposed method can be systematically investigated showing its good resistance against typical decryption attacks. The theoretical analysis of the introduced method is supported by the numerical experiments with digital data encryption. Workplace Institute of Information Theory and Automation Contact Markéta Votavová, votavova@utia.cas.cz, Tel.: 266 052 201. Year of Publishing 2010
Number of the records: 1