2009
DOI: 10.1016/j.chaos.2009.04.032
|View full text |Cite
|
Sign up to set email alerts
|

An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 27 publications
(11 citation statements)
references
References 48 publications
0
11
0
Order By: Relevance
“…(11), and the result, outlined in Eq. (12) completes the design of the modified secure communication system.…”
Section: Design Of the Parameter Update Lawmentioning
confidence: 98%
See 1 more Smart Citation
“…(11), and the result, outlined in Eq. (12) completes the design of the modified secure communication system.…”
Section: Design Of the Parameter Update Lawmentioning
confidence: 98%
“…This method was distinguished by the fact that only one chaotic attractor in the transmitter side was used, in contrast to many attractors in the case of parameter modulation. Although these two techniques (second generation) had a relatively higher security, compared to the previously discussed methods, they still lack robustness against intruder attacks using frequency-based filtering techniques, as exemplified by [11], especially in the case when the dominant frequency of the secret message is far away from that of the chaotic system. Motivated by the generation of cipher keys for the use of pseudo-chaotic systems in cryptography [12] and the poor security level of the second generation of chaos-based communication systems, a third generation emerged called chaotic cryptosystems.…”
Section: Introductionmentioning
confidence: 96%
“…This is due to the fact that chaotic dynamics, given by both autonomous and nonautonomous systems, are still deterministic, and with the proper use of control techniques, transmitters and receivers can be synchronized, despite their critical dependency on initial conditions [16].…”
Section: A Secure Communication Case Studymentioning
confidence: 99%
“…This made it very suitable for transmitting digital signal, where the secret message corresponds to either of its two binary states [7]. Implementation CSK systems proved to be efficient, either in analog or digital hardware, as reconstructing the secret message can be done using a two-stage process consisting of low-pass filtering followed by thresholding [8].…”
Section: Introductionmentioning
confidence: 99%
“…Starting from the early work in [10], other forms of CSK were developed using both continuous and discrete systems. DCSK, BPSK, QPSK, and QCSK are variants of the classical CSK method that are developed with the aim of having better noise rejection and increased data transmission rates [11], or improved security public communication channels that are vulnerable to attacks from intruders [1,3,7,9].…”
Section: Introductionmentioning
confidence: 99%