Secure point-to-point communication using chaos
This article presents an alternative for resolving the existing vulnerability of systems that implement masking by means of chaotic synchronization. This system avoids detection of the parameters used as the cipher key by an attacker on implementing encryption by means of synchronized chaotic-phase...
- Autores:
-
Rodríguez, Maricela Jiménez
González-Novoa, María Guadalupe
Estrada-Gutiérrez, Juan Carlos
Acosta-Lúa, Cuauhtemoc
Flores-Siordia, Octavio
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2016
- Institución:
- Universidad Nacional de Colombia
- Repositorio:
- Universidad Nacional de Colombia
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.unal.edu.co:unal/60536
- Acceso en línea:
- https://repositorio.unal.edu.co/handle/unal/60536
http://bdigital.unal.edu.co/58868/
- Palabra clave:
- 62 Ingeniería y operaciones afines / Engineering
authentication
data encryption
security
integrity
chaos
autenticación
encriptación de datos
seguridad
integridad
caos
- Rights
- openAccess
- License
- Atribución-NoComercial 4.0 Internacional
Summary: | This article presents an alternative for resolving the existing vulnerability of systems that implement masking by means of chaotic synchronization. This system avoids detection of the parameters used as the cipher key by an attacker on implementing encryption by means of synchronized chaotic-phase masks of the Rössler oscillator, for encoding and establishing synchronization among transmitterreceiver devices. In addition, it employs two ciphering keys: the first, with a recommended length of 2,048 characters, and the second, which is used as an initial value. Both keys are employed for continual modification of one of the oscillator’s parameters. This strengthens the security system and avoiding an attacker from obtaining the oscillator’s parametric values by calculating the least average synchronization error. The use of the system developed provides a cipher, which is resistant to statistical attacks. In addition, our system validates the data of the transmitter device (username, password, etc.) in order to authorize transmission. |
---|