Message Embedded Chaotic Masking Synchronization Scheme Based on the Generalized Lorenz System and Its Security Analysis

2016 ◽  
Vol 26 (08) ◽  
pp. 1650140 ◽  
Author(s):  
Sergej Čelikovský ◽  
Volodymyr Lynnyk

This paper focuses on the design of the novel chaotic masking scheme via message embedded synchronization. A general class of the systems allowing the message embedded synchronization is presented here, moreover, it is shown that the generalized Lorenz system belongs to this class. Furthermore, the secure encryption scheme based on the message embedded synchronization is proposed. This scheme injects the embedded message into the dynamics of the transmitter as well, ensuring thereby synchronization with theoretically zero synchronization error. To ensure the security, the embedded message is a sum of the message and arbitrary bounded function of the internal transmitter states that is independent of the scalar synchronization signal. The hexadecimal alphabet will be used to form a ciphertext making chaotic dynamics of the transmitter even more complicated in comparison with the transmitter influenced just by the binary step-like function. All mentioned results and their security are tested and demonstrated by numerical experiments.

2019 ◽  
Vol 29 (14) ◽  
pp. 1950197 ◽  
Author(s):  
P. D. Kamdem Kuate ◽  
Qiang Lai ◽  
Hilaire Fotsin

The Lorenz system has attracted increasing attention on the issue of its simplification in order to produce the simplest three-dimensional chaotic systems suitable for secure information processing. Meanwhile, Sprott’s work on elegant chaos has revealed a set of 19 chaotic systems all described by simple algebraic equations. This paper presents a new piecewise-linear chaotic system emerging from the simplification of the Lorenz system combined with the elegance of Sprott systems. Unlike the majority, the new system is a non-Shilnikov chaotic system with two nonhyperbolic equilibria. It is multiplier-free, variable-boostable and exclusively based on absolute value and signum nonlinearities. The use of familiar tools such as Lyapunov exponents spectra, bifurcation diagrams, frequency power spectra as well as Poincaré map help to demonstrate its chaotic behavior. The novel system exhibits inverse period doubling bifurcations and multistability. It has only five terms, one bifurcation parameter and a total amplitude controller. These features allow a simple and low cost electronic implementation. The adaptive synchronization of the novel system is investigated and the corresponding electronic circuit is presented to confirm its feasibility.


2021 ◽  
Vol 31 (08) ◽  
pp. 2130024
Author(s):  
Weisheng Huang ◽  
Xiao-Song Yang

We demonstrate in this paper a new chaotic behavior in the Lorenz system with periodically excited parameters. We focus on the parameters with which the Lorenz system has only two asymptotically stable equilibrium points, a saddle and no chaotic dynamics. A new mechanism of generating chaos in the periodically excited Lorenz system is demonstrated by showing that some trajectories can visit different attractor basins due to the periodic variations of the attractor basins of the time-varying stable equilibrium points when a parameter of the Lorenz system is varying periodically.


2019 ◽  
Vol 29 (14) ◽  
pp. 1930042
Author(s):  
Anna Wawrzaszek ◽  
Agata Krasińska

In the present study, we analyze the dynamics of a four-dimensional generalized Lorenz system with one variable describing the profile of the magnetic field induced in a convected magnetized fluid. In particular, we identify the subcritical Hopf bifurcation, at which the dimension of the unstable manifold is increased or reduced by two. Moreover, the new four-dimensional system behavior depending on the control parameters is considered and bidirectional bifurcation structures are revealed. The results show the existence of several windows of nonchaotic variation (windows of order), in particular period-3 windows at the edge of which type I intermittency is observed.


2019 ◽  
Vol 2019 ◽  
pp. 1-25 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Najam-ul-Islam Muhammad

The field of pervasive computing especially the Internet of Things (IoT) network is evolving due to high network speed and increased capacity offered by the 5G communication system. The IoT network identifies each device before giving it access to the network. The RFID system is one of the most prominent enabling technologies for the node identification. Since the communication between the node and the network takes place over an insecure wireless channel, an authentication mechanism is required to avoid the malicious devices from entering the network. This paper presents a brief survey on the authentication protocols along with the prominent cryptanalysis models for the EPC C1G2 RFID systems. A comparative analysis is provided to highlight the common weaknesses of the existing authentication algorithms and to emphasize on the lack of security standardization for the resource constraint IoT network perception layer. This paper is concluded by proposing an ultralightweight protocol that provides Extremely Good Privacy (EGP). The proposed EGP protocol avoids all the pitfalls highlighted by the cryptanalysis of the existing authentication protocols. The incorporation of the novel ultralightweight primitives, Per-XOR (Px) and Inverse Per-XOR (Px-1), makes the protocol messages more robust and irreversible for all types of adversaries. A comprehensive security analysis illustrates that the proposed protocol proves to be highly resistive against all possible attack scenarios and ensures the security optimally.


Entropy ◽  
2018 ◽  
Vol 20 (11) ◽  
pp. 843 ◽  
Author(s):  
Congxu Zhu ◽  
Guojun Wang ◽  
Kehui Sun

This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process. It was found that the equivalent key streams and all the unknown parameters of the cryptosystem can be recovered by our chosen-plaintext attack algorithm. Both a theoretical analysis and an experimental validation are given in detail. Based on the analysis of the defects in the original cryptosystem, an improved color image encryption scheme was further developed. By using an image content–related approach in generating diffusion arrays and the process of interweaving diffusion and confusion, the security of the cryptosystem was enhanced. The experimental results and security analysis demonstrate the security superiority of the improved cryptosystem.


2018 ◽  
Vol 29 (07) ◽  
pp. 1850058 ◽  
Author(s):  
Nabil Ben Slimane ◽  
Nahed Aouf ◽  
Kais Bouallegue ◽  
Mohsen Machhout

In this paper, an efficient scheme for image encryption based on the nested chaotic map and deoxyribonucleic acid (DNA) is introduced. In order to generate the initial condition values of the nested chaotic system, the Secure Hash Algorithm SHA-256 is used. The algorithm consists of two main layers: confusion and diffusion. In the first layer, the nested chaotic map is employed to create the scrambled image. The scrambled image is obtained through the ascending sorting of the first component of the nested chaotic index sequence. To ensure higher sensitivity, higher complexity and higher security, DNA sequence and DNA operator are employed additionally with the nested chaotic map and hash algorithm to modify the pixel values. The important advantages of our algorithm are the improvement of Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI) and entropy, which improve resistivity against several attacks. Experimental results and relevant security analysis demonstrated that our proposed encryption scheme has the highest security level because it is more complicated, and it has a sufficiently large key space. The proposed method is compared to other recent image encryption schemes using different security analysis factors, including NPCR, UACI, correlation coefficients (CCs), encryption quality (EQ) and entropy. It is also resistant to noise (Salt and Pepper, Gaussian and speckle) and data loss attacks. The illustrated results demonstrated that the proposed image encryption scheme is efficient, and can be adopted for image encryption and transmission.


Sign in / Sign up

Export Citation Format

Share Document