EXPANDED LORENZ SYSTEMS AND CHAOTIC SECURE COMMUNICATION SYSTEMS DESIGN

2006 ◽  
Vol 15 (04) ◽  
pp. 607-614 ◽  
Author(s):  
LEONARDO ACHO

Using Lyapunov theory, the Lorenz chaotic system was partitioned in two parts, where one of them is globally asymptotically stable. This partition facilitated the state–space expansion of the Lorenz system from three to four-order. This new four-order Lorenz system, one of its states is synchronized with other. This expansion allows us to design a secure communication system where the dynamic of the receiver is just one-order. The proposed secure communication system uses two-lines of transmission. Simulation results are included to demonstrate the performance of this secure communication system based on this new four-order Lorenz system.

Mathematics ◽  
2021 ◽  
Vol 9 (20) ◽  
pp. 2593
Author(s):  
Zain-Aldeen S. A. Rahman ◽  
Basil H. Jasim ◽  
Yasir I. A. Al-Yasir ◽  
Yim-Fun Hu ◽  
Raed A. Abd-Alhameed ◽  
...  

This article presents a novel four-dimensional autonomous fractional-order chaotic system (FOCS) with multi-nonlinearity terms. Several dynamics, such as the chaotic attractors, equilibrium points, fractal dimension, Lyapunov exponent, and bifurcation diagrams of this new FOCS, are studied analytically and numerically. Adaptive control laws are derived based on Lyapunov theory to achieve chaos synchronization between two identical new FOCSs with an uncertain parameter. For these two identical FOCSs, one represents the master and the other is the slave. The uncertain parameter in the slave side was estimated corresponding to the equivalent master parameter. Next, this FOCS and its synchronization were realized by a feasible electronic circuit and tested using Multisim software. In addition, a microcontroller (Arduino Due) was used to implement the suggested system and the developed synchronization technique to demonstrate its digital applicability in real-world applications. Furthermore, based on the developed synchronization mechanism, a secure communication scheme was constructed. Finally, the security analysis metric tests were investigated through histograms and spectrograms analysis to confirm the security strength of the employed communication system. Numerical simulations demonstrate the validity and possibility of using this new FOCS in high-level security communication systems. Furthermore, the secure communication system is highly resistant to pirate attacks. A good agreement between simulation and experimental results is obtained, showing that the new FOCS can be used in real-world applications.


1996 ◽  
Vol 06 (12b) ◽  
pp. 2645-2652 ◽  
Author(s):  
TONI STOJANOVSKI ◽  
LJUPCO KOCAREV ◽  
ULRICH PARLITZ

In this paper we describe a simple method to reveal the parameters of the Lorenz system from time series of the x1 or x2 variable of the Lorenz system. The method is numerically tractable and extremely simple to apply. Furthermore, the method breaks secure communication systems like chaotic masking, chaos switching, and chaos modulation if they are based on the Lorenz system.


2021 ◽  
Vol 1764 (1) ◽  
pp. 012205
Author(s):  
Volodymyr Rusyn ◽  
Mujiarto ◽  
Mustafa Mamat ◽  
Firmansyah Azharul ◽  
W. S. Mada Sanjaya ◽  
...  

Author(s):  
Kehui Sun

Chaos is characterized by aperiodic, wideband, random-like, and ergodicity. Chaotic secure communication has become one of the hot topics in nonlinear dynamics since the early 1990s exploiting the technique of chaos synchronization. As distinguished by the type of information being carried, chaos-based communication systems can be categorized into analogy and digital, including four popular techniques such as Chaos Masking, Chaos Shift Keying, Chaos Modulation, and Chaos Spreading Spectrum. In this chapter, the principles of these schemes and their modifications are analyzed by theoretical analysis as well as dynamic simulation. In addition, chaos-based cryptography is a new approach to encrypt information. After analyzing the performances of chaotic sequence and designing an effective chaotic sequence generator, the authors briefly presented the principle of two classes of chaotic encryption schemes, chaotic sequence encryption and chaotic data stream encryption.


2009 ◽  
Vol 39 (4) ◽  
pp. 1578-1587 ◽  
Author(s):  
Shih-Kuen Changchien ◽  
Chuan-Kuei Huang ◽  
Hsiau-Hsian Nien ◽  
Hong-Wei Shieh

Sign in / Sign up

Export Citation Format

Share Document