Cryptography based on Chaotic Synchronization: Round III
Citeseer
Abstract
This paper discusses cryptography based on the property of chaotic synchronization. Specifically, it is about Round III of such a cryptographic method. Round I showed the feasibility of using chaotic synchronization for cryptography. Round II consisted of a method to counter attack. This paper is Round III and shows how to counter the counter attacks. First, we show numerical evidence that synchronization is possible between two Lorenz systems if one system sends information about x0 at a slower rate. The second system evolves on its own, except that when it receives a signal from the first system, it replaces its own value of y0 by the received x0. We have found that the two systems eventually synchronize, but often after a long time. Therefore, we have devised a technique to speed-up this synchronization. Once this is done, it is possible for the authorized receiver (with the possession of the initial super-key) to keep synchronizing with slowly sampled inputs, whereas the known methods of Round II do not help an eavesdropper.
References (7)
- L. M. Pecora and T. L. Carroll, Phys. Rev. Lett. 64, 821 (1990)
- Rong He and P. G. Vaidya, Analysis and synthesis of synchronous periodic and chaotic systems, Phys. Rev. A46, 7387-7392 (1992)
- P. G. Vaidya, Monitoring and speeding up chaotic synchronization Chaos, Solitons and Fractals, Volume 17, Number 2, July 2003, pp. 433-439(7)
- Rong He and P. G. Vaidya, Implementation of chaotic cryptography with chaotic synchronization, Phys. Rev. E57, 1532-1535 (1998)
- K. M. Cuomo and A. V. Oppenheim, Phys. Rev. Lett. 71, 65 (1993
- M. Lakshmanan and S. Rajasekar, Nonlinear Dynamics: Integrability, Chaos, and Patterns, Springer-Verlag, 2003, Ch. 16, India
- P.G. Vaidya and Savita Angadi, Decoding chaotic cryptography without access to the super key. Chaos, Solitons and Fractals 17(2-3), 379-386, (2003)