bibtype J - Journal Article
ARLID 0381701
utime 20240111140820.7
mtime 20121029235959.9
WOS 000309921800030
SCOPUS 84867503681
DOI 10.1142/S0218127412502318
title (primary) (eng) Desynchronization Chaos Shift Keying Method Based on the Error Second Derivative and Its Security Analysis
specification
page_count 11 s.
media_type DVD Rom
serial
ARLID cav_un_epca*0256776
ISSN 0218-1274
title International Journal of Bifurcation and Chaos
volume_id 22
volume 9 (2012)
publisher
name World Scientific Publishing
keyword Nonlinear system
keyword desynchronization
keyword chaos shift keying
keyword generalized Lorenz system
author (primary)
ARLID cav_un_auth*0101074
name1 Čelikovský
name2 Sergej
full_dept (cz) Teorie řízení
full_dept (eng) Department of Control Theory
department (cz)
department (eng) TR
institution UTIA-B
full_dept Department of Control Theory
fullinstit Ústav teorie informace a automatizace AV ČR, v. v. i.
author
ARLID cav_un_auth*0215855
name1 Lynnyk
name2 Volodymyr
full_dept (cz) Teorie řízení
full_dept Department of Control Theory
department (cz)
department TR
institution UTIA-B
full_dept Department of Control Theory
fullinstit Ústav teorie informace a automatizace AV ČR, v. v. i.
source
source_type textový dokument
url http://library.utia.cas.cz/separaty/2012/TR/celikovsky-0381701.pdf
url http://dx.doi.org/10.1142/S0218127412502318
source_size 524 kB
cas_special
project
project_id GAP103/12/1794
agency GA ČR
country CZ
ARLID cav_un_auth*0283207
abstract (eng) This paper describes the chaos shift keying method based on the second derivative desynchronization error and provides its security analysis, especially against the attacks by power and return map analysis. Desynchronization chaos shift keying method (DECSK) uses methods to detect the correct bit by detecting the wrong bit. Various modifications are possible, here the method using sharp increase of error in the second derivative of synchronizing signal is used. The proposed method requires very reasonable amount of data to encrypt and time to decrypt one bit. Basically, to encrypt one bit, only one iteration (i.e. only one real number of six valid digits) is needed. At the same time, thanks to the desynchronization detection based on the synchronization error second derivative, almost 100% of the carrying chaotic signal can be used. The security of the proposed method can be systematically investigated showing its good resistance against typical decryption attacks.
reportyear 2013
RIV BC
num_of_auth 2
mrcbC52 4 A 4a 20231122135233.5
inst_support RVO:67985556
permalink http://hdl.handle.net/11104/0212112
mrcbT16-e MATHEMATICSINTERDISCIPLINARYAPPLICATIONS|MULTIDISCIPLINARYSCIENCES
mrcbT16-f 1.019
mrcbT16-g 0.263
mrcbT16-h 8.2
mrcbT16-i 0.00894
mrcbT16-j 0.385
mrcbT16-k 4121
mrcbT16-l 353
mrcbT16-q 63
mrcbT16-s 0.551
mrcbT16-y 25.16
mrcbT16-x 1.05
mrcbT16-4 Q1
mrcbT16-B 22.785
mrcbT16-C 57.945
mrcbT16-D Q4
mrcbT16-E Q3
arlyear 2012
mrcbTft \nSoubory v repozitáři: celikovsky-0381701.pdf
mrcbU14 84867503681 SCOPUS
mrcbU34 000309921800030 WOS
mrcbU56 textový dokument 524 kB
mrcbU63 cav_un_epca*0256776 International Journal of Bifurcation and Chaos 0218-1274 1793-6551 Roč. 22 č. 9 2012 , 1250231-1-1250231-11 World Scientific Publishing