Design and Virtex-7-Based Implementation of Video Chaotic Secure Communications

2020 ◽  
Vol 30 (05) ◽  
pp. 2050075
Author(s):  
Baoju Chen ◽  
Simin Yu ◽  
Ping Chen ◽  
Liangshan Xiao ◽  
Jinhu Lü

In this paper, a Virtex-7-based video chaotic secure communication scheme is investigated. First, the network sending and receiving controller Intellectual Property (IP) cores are designed. Next, the chaotic encryption and decryption IP cores are implemented using fixed-point algorithm, pipeline operation, and state machine control. Thus, video capturing, video displaying, network sending, network receiving, chaotic encrypting, and chaotic decrypting can be achieved via IP core integration design. An improved 7D chaotic stream cipher algorithm for resisting divide-and-conquer attack is then designed and realized on a Virtex-7 high-end FPGA platform. Hardware experimental results are also given to verify the feasibility of the scheme.

2005 ◽  
Vol 342 (4) ◽  
pp. 305-308 ◽  
Author(s):  
Changchun Hua ◽  
Bo Yang ◽  
Gaoxiang Ouyang ◽  
Xinping Guan

2019 ◽  
Vol 2019 ◽  
pp. 1-16 ◽  
Author(s):  
Salahuddin Abdul Rahman ◽  
Mohamed Zribi ◽  
Nejib Smaoui

This paper deals with the projective synchronization (PS) of two identical discrete-time generalized four-dimensional (4D) hyperchaotic Henon maps using a master-slave configuration. A discrete sliding mode controller (DSMC) scheme is proposed to synchronize the master and the slave systems. The performance of the controlled systems is simulated; the simulation results indicate that the proposed controller works well. In addition, a secure communication scheme is proposed based on the developed control scheme. The validity of the proposed scheme is tested by transmitting an image and simulating the results. The simulation results clearly indicate the effectiveness of the proposed secure communication scheme.


2011 ◽  
Vol 216 ◽  
pp. 609-612
Author(s):  
Tian Yun Yan ◽  
Kai Kuo Xu ◽  
Min Wei ◽  
Jia He

The theory and technology of cryptography including the block cipher, stream cipher and public-key cryptosystem. The usual cryptographic algorithms, such as DES, RSA, AES and message digest algorithms are discussed. Basing on these studies, a design of secure communication is presented. It combines the data encryption with the authentication, can be applied to principal and subordinate system. It can provide a reliable protection for the secure communications for embedded devices. Finally, the core source code is shown.


2008 ◽  
Vol 372 (33) ◽  
pp. 5442-5447 ◽  
Author(s):  
Yonghui Sun ◽  
Jinde Cao ◽  
Gang Feng

2014 ◽  
Vol 543-547 ◽  
pp. 2535-2538
Author(s):  
Chun Yan Nie ◽  
Hua Tian ◽  
Hai Xin Sun

In this paper, we propose a new secure communication synchronization system which exploits the combination of the fourth-order hyper-chaotic system and the synchronization theory. We study the fast encryption and decryption methods of the images and the performance analysis of the secure communication based on the hyper-chaotic system. The simulation results show that the proposed hyper-chaotic secure communication generates the unpredicted pseudorandom sequences which have greater complexity and better randomness characteristics comparing to the traditional chaotic encryption schemes. Furthermore, it has larger key space and higher safety performance. Since the proposed system provides a new thought for the synchronization problems of the hyper-chaotic system, it is regarded as a potential scheme for resisting the popular attack means.


Sign in / Sign up

Export Citation Format

Share Document