bibtype |
J -
Journal Article
|
ARLID |
0381701 |
utime |
20240111140820.7 |
mtime |
20121029235959.9 |
WOS |
000309921800030 |
SCOPUS |
84867503681 |
DOI |
10.1142/S0218127412502318 |
title
(primary) (eng) |
Desynchronization Chaos Shift Keying Method Based on the Error Second Derivative and Its Security Analysis |
specification |
page_count |
11 s. |
media_type |
DVD Rom |
|
serial |
ARLID |
cav_un_epca*0256776 |
ISSN |
0218-1274 |
title
|
International Journal of Bifurcation and Chaos |
volume_id |
22 |
volume |
9 (2012) |
publisher |
name |
World Scientific Publishing |
|
|
keyword |
Nonlinear system |
keyword |
desynchronization |
keyword |
chaos shift keying |
keyword |
generalized Lorenz system |
author
(primary) |
ARLID |
cav_un_auth*0101074 |
name1 |
Čelikovský |
name2 |
Sergej |
full_dept (cz) |
Teorie řízení |
full_dept (eng) |
Department of Control Theory |
department (cz) |
TŘ |
department (eng) |
TR |
institution |
UTIA-B |
full_dept |
Department of Control Theory |
fullinstit |
Ústav teorie informace a automatizace AV ČR, v. v. i. |
|
author
|
ARLID |
cav_un_auth*0215855 |
name1 |
Lynnyk |
name2 |
Volodymyr |
full_dept (cz) |
Teorie řízení |
full_dept |
Department of Control Theory |
department (cz) |
TŘ |
department |
TR |
institution |
UTIA-B |
full_dept |
Department of Control Theory |
fullinstit |
Ústav teorie informace a automatizace AV ČR, v. v. i. |
|
source |
|
cas_special |
project |
project_id |
GAP103/12/1794 |
agency |
GA ČR |
country |
CZ |
ARLID |
cav_un_auth*0283207 |
|
abstract
(eng) |
This paper describes the chaos shift keying method based on the second derivative desynchronization error and provides its security analysis, especially against the attacks by power and return map analysis. Desynchronization chaos shift keying method (DECSK) uses methods to detect the correct bit by detecting the wrong bit. Various modifications are possible, here the method using sharp increase of error in the second derivative of synchronizing signal is used. The proposed method requires very reasonable amount of data to encrypt and time to decrypt one bit. Basically, to encrypt one bit, only one iteration (i.e. only one real number of six valid digits) is needed. At the same time, thanks to the desynchronization detection based on the synchronization error second derivative, almost 100% of the carrying chaotic signal can be used. The security of the proposed method can be systematically investigated showing its good resistance against typical decryption attacks. |
reportyear |
2013 |
RIV |
BC |
num_of_auth |
2 |
mrcbC52 |
4 A 4a 20231122135233.5 |
inst_support |
RVO:67985556 |
permalink |
http://hdl.handle.net/11104/0212112 |
mrcbT16-e |
MATHEMATICSINTERDISCIPLINARYAPPLICATIONS|MULTIDISCIPLINARYSCIENCES |
mrcbT16-f |
1.019 |
mrcbT16-g |
0.263 |
mrcbT16-h |
8.2 |
mrcbT16-i |
0.00894 |
mrcbT16-j |
0.385 |
mrcbT16-k |
4121 |
mrcbT16-l |
353 |
mrcbT16-q |
63 |
mrcbT16-s |
0.551 |
mrcbT16-y |
25.16 |
mrcbT16-x |
1.05 |
mrcbT16-4 |
Q1 |
mrcbT16-B |
22.785 |
mrcbT16-C |
57.945 |
mrcbT16-D |
Q4 |
mrcbT16-E |
Q3 |
arlyear |
2012 |
mrcbTft |
\nSoubory v repozitáři: celikovsky-0381701.pdf |
mrcbU14 |
84867503681 SCOPUS |
mrcbU34 |
000309921800030 WOS |
mrcbU56 |
textový dokument 524 kB |
mrcbU63 |
cav_un_epca*0256776 International Journal of Bifurcation and Chaos 0218-1274 1793-6551 Roč. 22 č. 9 2012 , 1250231-1-1250231-11 World Scientific Publishing |
|