Secure point-to-point communication using chaos

This article presents an alternative for resolving the existing vulnerability of systems that implement masking by means of chaotic synchronization. This system avoids detection of the parameters used as the cipher key by an attacker on implementing encryption by means of synchronized chaotic-phase...

Full description

Autores:
Rodríguez, Maricela Jiménez
González-Novoa, María Guadalupe
Estrada-Gutiérrez, Juan Carlos
Acosta-Lúa, Cuauhtemoc
Flores-Siordia, Octavio
Tipo de recurso:
Article of journal
Fecha de publicación:
2016
Institución:
Universidad Nacional de Colombia
Repositorio:
Universidad Nacional de Colombia
Idioma:
spa
OAI Identifier:
oai:repositorio.unal.edu.co:unal/60536
Acceso en línea:
https://repositorio.unal.edu.co/handle/unal/60536
http://bdigital.unal.edu.co/58868/
Palabra clave:
62 Ingeniería y operaciones afines / Engineering
authentication
data encryption
security
integrity
chaos
autenticación
encriptación de datos
seguridad
integridad
caos
Rights
openAccess
License
Atribución-NoComercial 4.0 Internacional
id UNACIONAL2_c74b00308412782fa9806e491e079177
oai_identifier_str oai:repositorio.unal.edu.co:unal/60536
network_acronym_str UNACIONAL2
network_name_str Universidad Nacional de Colombia
repository_id_str
dc.title.spa.fl_str_mv Secure point-to-point communication using chaos
title Secure point-to-point communication using chaos
spellingShingle Secure point-to-point communication using chaos
62 Ingeniería y operaciones afines / Engineering
authentication
data encryption
security
integrity
chaos
autenticación
encriptación de datos
seguridad
integridad
caos
title_short Secure point-to-point communication using chaos
title_full Secure point-to-point communication using chaos
title_fullStr Secure point-to-point communication using chaos
title_full_unstemmed Secure point-to-point communication using chaos
title_sort Secure point-to-point communication using chaos
dc.creator.fl_str_mv Rodríguez, Maricela Jiménez
González-Novoa, María Guadalupe
Estrada-Gutiérrez, Juan Carlos
Acosta-Lúa, Cuauhtemoc
Flores-Siordia, Octavio
dc.contributor.author.spa.fl_str_mv Rodríguez, Maricela Jiménez
González-Novoa, María Guadalupe
Estrada-Gutiérrez, Juan Carlos
Acosta-Lúa, Cuauhtemoc
Flores-Siordia, Octavio
dc.subject.ddc.spa.fl_str_mv 62 Ingeniería y operaciones afines / Engineering
topic 62 Ingeniería y operaciones afines / Engineering
authentication
data encryption
security
integrity
chaos
autenticación
encriptación de datos
seguridad
integridad
caos
dc.subject.proposal.spa.fl_str_mv authentication
data encryption
security
integrity
chaos
autenticación
encriptación de datos
seguridad
integridad
caos
description This article presents an alternative for resolving the existing vulnerability of systems that implement masking by means of chaotic synchronization. This system avoids detection of the parameters used as the cipher key by an attacker on implementing encryption by means of synchronized chaotic-phase masks of the Rössler oscillator, for encoding and establishing synchronization among transmitterreceiver devices. In addition, it employs two ciphering keys: the first, with a recommended length of 2,048 characters, and the second, which is used as an initial value. Both keys are employed for continual modification of one of the oscillator’s parameters. This strengthens the security system and avoiding an attacker from obtaining the oscillator’s parametric values by calculating the least average synchronization error. The use of the system developed provides a cipher, which is resistant to statistical attacks. In addition, our system validates the data of the transmitter device (username, password, etc.) in order to authorize transmission.
publishDate 2016
dc.date.issued.spa.fl_str_mv 2016-05-01
dc.date.accessioned.spa.fl_str_mv 2019-07-02T18:32:49Z
dc.date.available.spa.fl_str_mv 2019-07-02T18:32:49Z
dc.type.spa.fl_str_mv Artículo de revista
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/article
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.coarversion.spa.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.content.spa.fl_str_mv Text
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/ART
format http://purl.org/coar/resource_type/c_6501
status_str publishedVersion
dc.identifier.issn.spa.fl_str_mv ISSN: 2346-2183
dc.identifier.uri.none.fl_str_mv https://repositorio.unal.edu.co/handle/unal/60536
dc.identifier.eprints.spa.fl_str_mv http://bdigital.unal.edu.co/58868/
identifier_str_mv ISSN: 2346-2183
url https://repositorio.unal.edu.co/handle/unal/60536
http://bdigital.unal.edu.co/58868/
dc.language.iso.spa.fl_str_mv spa
language spa
dc.relation.spa.fl_str_mv https://revistas.unal.edu.co/index.php/dyna/article/view/53506
dc.relation.ispartof.spa.fl_str_mv Universidad Nacional de Colombia Revistas electrónicas UN Dyna
Dyna
dc.relation.references.spa.fl_str_mv Rodríguez, Maricela Jiménez and González-Novoa, María Guadalupe and Estrada-Gutiérrez, Juan Carlos and Acosta-Lúa, Cuauhtemoc and Flores-Siordia, Octavio (2016) Secure point-to-point communication using chaos. DYNA, 83 (197). pp. 180-186. ISSN 2346-2183
dc.rights.spa.fl_str_mv Derechos reservados - Universidad Nacional de Colombia
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.license.spa.fl_str_mv Atribución-NoComercial 4.0 Internacional
dc.rights.uri.spa.fl_str_mv http://creativecommons.org/licenses/by-nc/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
rights_invalid_str_mv Atribución-NoComercial 4.0 Internacional
Derechos reservados - Universidad Nacional de Colombia
http://creativecommons.org/licenses/by-nc/4.0/
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Universidad Nacional de Colombia (Sede Medellín). Facultad de Minas.
institution Universidad Nacional de Colombia
bitstream.url.fl_str_mv https://repositorio.unal.edu.co/bitstream/unal/60536/1/53506-297391-1-PB.pdf
https://repositorio.unal.edu.co/bitstream/unal/60536/2/53506-297391-1-PB.pdf.jpg
bitstream.checksum.fl_str_mv 181c06f885caa832009b05a63e4d7781
c39b646e06797113ed627dddade37a35
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad Nacional de Colombia
repository.mail.fl_str_mv repositorio_nal@unal.edu.co
_version_ 1814089751437770752
spelling Atribución-NoComercial 4.0 InternacionalDerechos reservados - Universidad Nacional de Colombiahttp://creativecommons.org/licenses/by-nc/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Rodríguez, Maricela Jiménez580e2406-da81-468e-be31-79081cc8349c300González-Novoa, María Guadalupe3ac00c35-7ab2-410c-bbf0-25e6511bec65300Estrada-Gutiérrez, Juan Carlos39e06e98-f050-44bc-a142-015e42840796300Acosta-Lúa, Cuauhtemoc35fca769-3362-461f-9382-7744407d26f0300Flores-Siordia, Octavio9c2970ca-cc59-48a6-a7c6-b7a499da25903002019-07-02T18:32:49Z2019-07-02T18:32:49Z2016-05-01ISSN: 2346-2183https://repositorio.unal.edu.co/handle/unal/60536http://bdigital.unal.edu.co/58868/This article presents an alternative for resolving the existing vulnerability of systems that implement masking by means of chaotic synchronization. This system avoids detection of the parameters used as the cipher key by an attacker on implementing encryption by means of synchronized chaotic-phase masks of the Rössler oscillator, for encoding and establishing synchronization among transmitterreceiver devices. In addition, it employs two ciphering keys: the first, with a recommended length of 2,048 characters, and the second, which is used as an initial value. Both keys are employed for continual modification of one of the oscillator’s parameters. This strengthens the security system and avoiding an attacker from obtaining the oscillator’s parametric values by calculating the least average synchronization error. The use of the system developed provides a cipher, which is resistant to statistical attacks. In addition, our system validates the data of the transmitter device (username, password, etc.) in order to authorize transmission.Este artículo presenta una alternativa para resolver la vulnerabilidad existente en los sistemas que implementan el enmascaramiento mediante la sincronización caótica, este sistema evita que los parámetros utilizados como clave de cifrado puedan ser detectados por un atacante al implementar el modelo matemático caótico del oscilador de Rössler para codificar y establecer la sincronización entre los dispositivos transmisor-receptor; además usa dos llaves de cifrado: la primera con una longitud recomendable de 2048 caracteres y la segunda se utiliza como un valor inicial. Ambas llaves se emplean para modificar continuamente uno de los parámetros del oscilador, esto fortalece la seguridad del sistema y evita que un atacante obtenga los valores del parámetro del oscilador calculando el error de sincronización promedio menor. El uso del sistema desarrollado proporciona un cifrado resistente a ataques estadísticos, además valida datos del dispositivo transmisor (nombre de usuario, password, etc.) para autorizar la transmisión hacia el destino.application/pdfspaUniversidad Nacional de Colombia (Sede Medellín). Facultad de Minas.https://revistas.unal.edu.co/index.php/dyna/article/view/53506Universidad Nacional de Colombia Revistas electrónicas UN DynaDynaRodríguez, Maricela Jiménez and González-Novoa, María Guadalupe and Estrada-Gutiérrez, Juan Carlos and Acosta-Lúa, Cuauhtemoc and Flores-Siordia, Octavio (2016) Secure point-to-point communication using chaos. DYNA, 83 (197). pp. 180-186. ISSN 2346-218362 Ingeniería y operaciones afines / Engineeringauthenticationdata encryptionsecurityintegritychaosautenticaciónencriptación de datosseguridadintegridadcaosSecure point-to-point communication using chaosArtículo de revistainfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85Texthttp://purl.org/redcol/resource_type/ARTORIGINAL53506-297391-1-PB.pdfapplication/pdf818419https://repositorio.unal.edu.co/bitstream/unal/60536/1/53506-297391-1-PB.pdf181c06f885caa832009b05a63e4d7781MD51THUMBNAIL53506-297391-1-PB.pdf.jpg53506-297391-1-PB.pdf.jpgGenerated Thumbnailimage/jpeg9177https://repositorio.unal.edu.co/bitstream/unal/60536/2/53506-297391-1-PB.pdf.jpgc39b646e06797113ed627dddade37a35MD52unal/60536oai:repositorio.unal.edu.co:unal/605362024-04-13 23:10:55.61Repositorio Institucional Universidad Nacional de Colombiarepositorio_nal@unal.edu.co