2022
DOI: 10.21203/rs.3.rs-2331476/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Reliable and Secure Memristor-based Chaotic Communication Against Eavesdroppers and Untrusted Foundries

Abstract: Chaos is a deterministic phenomenon that occurs in a non-linear dynamic system under the specific condition when the trajectories of the state vector become periodic and extremely sensitive to the initial conditions. While traditional resistor-based chaotic communications are primarily concerned with the safe transfer of information across networks, the transceivers themselves can be compromised due to outsourcing manufacturing. With the growth of wireless sensors in resource-constrained implantable and wearab… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 27 publications
0
0
0
Order By: Relevance
“…An alternate approach to using chaos-based techniques for designing cryptosystems can be implemented by creating a hyper-chaotic circuit and carefully choosing the components that will increase the key space for encryption. Once such an approach is demonstrated in [19] which uses memristive components as tunable keys and also implements the concept of logic locking [20] for enhanced security. However, the main challenge even after designing the encryption algorithm is retrieving the information at the destination (decryption), as during chaotic encryption, the original signal is mixed with the chaotic system.…”
mentioning
confidence: 99%
“…An alternate approach to using chaos-based techniques for designing cryptosystems can be implemented by creating a hyper-chaotic circuit and carefully choosing the components that will increase the key space for encryption. Once such an approach is demonstrated in [19] which uses memristive components as tunable keys and also implements the concept of logic locking [20] for enhanced security. However, the main challenge even after designing the encryption algorithm is retrieving the information at the destination (decryption), as during chaotic encryption, the original signal is mixed with the chaotic system.…”
mentioning
confidence: 99%