Message Signal Encryption Based on Qi Hyper-Chaos System

Author(s):  
Dennis Luke Owuor ◽  
Guoyuan Qi
2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Mei Zhang ◽  
Danling Wang ◽  
Lequan Min ◽  
Xue Wang

Firstly, this study introduces a definition of generalized stability (GST) in discrete-time nonautonomous chaos system (DNCS), which is an extension for chaos generalized synchronization. Secondly, a constructive theorem of DNCS has been proposed. As an example, a GST DNCS is constructed based on a novel 4-dimensional discrete chaotic map. Numerical simulations show that the dynamic behaviors of this map have chaotic attractor characteristics. As one application, we design a chaotic pseudorandom number generator (CPRNG) based on the GST DNCS. We use the SP800-22 test suite to test the randomness of four 100-key streams consisting of 1,000,000 bits generated by the CPRNG, the RC4 algorithm, the ZUC algorithm, and a 6-dimensional CGS-based CPRNG, respectively. The numerical results show that the randomness performances of the two CPRNGs are promising. In addition, theoretically the key space of the CPRNG is larger than 21116. As another application, this study designs a stream avalanche encryption scheme (SAES) in RGB image encryption. The results show that the GST DNCS is able to generate the avalanche effects which are similar to those generated via ideal CPRNGs.


2018 ◽  
Vol 26 (17) ◽  
pp. 22491 ◽  
Author(s):  
Mengfan Cheng ◽  
Xingxing Jiang ◽  
Chenkun Luo ◽  
Yudi Fu ◽  
Fengguang Luo ◽  
...  
Keyword(s):  

2021 ◽  
Author(s):  
Yonas Endailalu

Two integrating techniques and topologies for fiber optic network systems such as RoF and FTTH have been studied and presented in this project. Two digital signals with data rate 622Mb/s and 1.25Gb/s are considered as the two service signals to be hybrid. Both signals are first modulated in electrical domain by 25GHz and 5GHz sinusoidal sub carriers respectively, in order to give them enough spectral separation. Two architectures have been studied to modulate the optical carrier with these two service signals. The first model is to sum the two service signals in the electric domain and use a single leg Mach Zender Modulator (JlvlZM) to modulate the optical carrier with the electrical message signal. In the second case, the two service signals are first sent to a two leg MZM and separately modulate the light wave carrier, then the two emerging light wave signals mix at the other end of the Y branch of the MZM. The mathematical equations that represent the function of the two kinds of MZM have been formulated. Simulations of the integration of the two hybrid services have been made in MATLAB-Simulink environment and the results are shown. The developed mathematical models are used to represent the MZMs in the MATLAB program. Detector models for each architecture have been developed in order to evaluated the SNR and compare performance using Bit Error Rate (BER). The BER plots for different input setup have been plotted and presented in this project.


2011 ◽  
Vol 60 (10) ◽  
pp. 104213
Author(s):  
Zhu Jin-Chuan ◽  
Li Chen-Ren ◽  
Qi Jia-Yu ◽  
Ren Xu-Dong ◽  
Yue Xi-Shuang

2017 ◽  
Vol 6 (3) ◽  
pp. 219-227
Author(s):  
Edwin R. Arboleda ◽  
Joel L. Balaba ◽  
John Carlo L. Espineli

Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.


Sign in / Sign up

Export Citation Format

Share Document