Secure point-to-point communication using chaos

This article presents an alternative for resolving the existing vulnerability of systems that implement masking by means of chaotic synchronization. This system avoids detection of the parameters used as the cipher key by an attacker on implementing encryption by means of synchronized chaotic-phase...

Full description

Autores:
Rodríguez, Maricela Jiménez
González-Novoa, María Guadalupe
Estrada-Gutiérrez, Juan Carlos
Acosta-Lúa, Cuauhtemoc
Flores-Siordia, Octavio
Tipo de recurso:
Article of journal
Fecha de publicación:
2016
Institución:
Universidad Nacional de Colombia
Repositorio:
Universidad Nacional de Colombia
Idioma:
spa
OAI Identifier:
oai:repositorio.unal.edu.co:unal/60536
Acceso en línea:
https://repositorio.unal.edu.co/handle/unal/60536
http://bdigital.unal.edu.co/58868/
Palabra clave:
62 Ingeniería y operaciones afines / Engineering
authentication
data encryption
security
integrity
chaos
autenticación
encriptación de datos
seguridad
integridad
caos
Rights
openAccess
License
Atribución-NoComercial 4.0 Internacional
Description
Summary:This article presents an alternative for resolving the existing vulnerability of systems that implement masking by means of chaotic synchronization. This system avoids detection of the parameters used as the cipher key by an attacker on implementing encryption by means of synchronized chaotic-phase masks of the Rössler oscillator, for encoding and establishing synchronization among transmitterreceiver devices. In addition, it employs two ciphering keys: the first, with a recommended length of 2,048 characters, and the second, which is used as an initial value. Both keys are employed for continual modification of one of the oscillator’s parameters. This strengthens the security system and avoiding an attacker from obtaining the oscillator’s parametric values by calculating the least average synchronization error. The use of the system developed provides a cipher, which is resistant to statistical attacks. In addition, our system validates the data of the transmitter device (username, password, etc.) in order to authorize transmission.