Secure point-to-point communication using chaos
This article presents an alternative for resolving the existing vulnerability of systems that implement masking by means of chaotic synchronization. This system avoids detection of the parameters used as the cipher key by an attacker on implementing encryption by means of synchronized chaotic-phase...
- Autores:
-
Rodríguez, Maricela Jiménez
González-Novoa, María Guadalupe
Estrada-Gutiérrez, Juan Carlos
Acosta-Lúa, Cuauhtemoc
Flores-Siordia, Octavio
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2016
- Institución:
- Universidad Nacional de Colombia
- Repositorio:
- Universidad Nacional de Colombia
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.unal.edu.co:unal/60536
- Acceso en línea:
- https://repositorio.unal.edu.co/handle/unal/60536
http://bdigital.unal.edu.co/58868/
- Palabra clave:
- 62 Ingeniería y operaciones afines / Engineering
authentication
data encryption
security
integrity
chaos
autenticación
encriptación de datos
seguridad
integridad
caos
- Rights
- openAccess
- License
- Atribución-NoComercial 4.0 Internacional
id |
UNACIONAL2_c74b00308412782fa9806e491e079177 |
---|---|
oai_identifier_str |
oai:repositorio.unal.edu.co:unal/60536 |
network_acronym_str |
UNACIONAL2 |
network_name_str |
Universidad Nacional de Colombia |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Secure point-to-point communication using chaos |
title |
Secure point-to-point communication using chaos |
spellingShingle |
Secure point-to-point communication using chaos 62 Ingeniería y operaciones afines / Engineering authentication data encryption security integrity chaos autenticación encriptación de datos seguridad integridad caos |
title_short |
Secure point-to-point communication using chaos |
title_full |
Secure point-to-point communication using chaos |
title_fullStr |
Secure point-to-point communication using chaos |
title_full_unstemmed |
Secure point-to-point communication using chaos |
title_sort |
Secure point-to-point communication using chaos |
dc.creator.fl_str_mv |
Rodríguez, Maricela Jiménez González-Novoa, María Guadalupe Estrada-Gutiérrez, Juan Carlos Acosta-Lúa, Cuauhtemoc Flores-Siordia, Octavio |
dc.contributor.author.spa.fl_str_mv |
Rodríguez, Maricela Jiménez González-Novoa, María Guadalupe Estrada-Gutiérrez, Juan Carlos Acosta-Lúa, Cuauhtemoc Flores-Siordia, Octavio |
dc.subject.ddc.spa.fl_str_mv |
62 Ingeniería y operaciones afines / Engineering |
topic |
62 Ingeniería y operaciones afines / Engineering authentication data encryption security integrity chaos autenticación encriptación de datos seguridad integridad caos |
dc.subject.proposal.spa.fl_str_mv |
authentication data encryption security integrity chaos autenticación encriptación de datos seguridad integridad caos |
description |
This article presents an alternative for resolving the existing vulnerability of systems that implement masking by means of chaotic synchronization. This system avoids detection of the parameters used as the cipher key by an attacker on implementing encryption by means of synchronized chaotic-phase masks of the Rössler oscillator, for encoding and establishing synchronization among transmitterreceiver devices. In addition, it employs two ciphering keys: the first, with a recommended length of 2,048 characters, and the second, which is used as an initial value. Both keys are employed for continual modification of one of the oscillator’s parameters. This strengthens the security system and avoiding an attacker from obtaining the oscillator’s parametric values by calculating the least average synchronization error. The use of the system developed provides a cipher, which is resistant to statistical attacks. In addition, our system validates the data of the transmitter device (username, password, etc.) in order to authorize transmission. |
publishDate |
2016 |
dc.date.issued.spa.fl_str_mv |
2016-05-01 |
dc.date.accessioned.spa.fl_str_mv |
2019-07-02T18:32:49Z |
dc.date.available.spa.fl_str_mv |
2019-07-02T18:32:49Z |
dc.type.spa.fl_str_mv |
Artículo de revista |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.coarversion.spa.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/ART |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
publishedVersion |
dc.identifier.issn.spa.fl_str_mv |
ISSN: 2346-2183 |
dc.identifier.uri.none.fl_str_mv |
https://repositorio.unal.edu.co/handle/unal/60536 |
dc.identifier.eprints.spa.fl_str_mv |
http://bdigital.unal.edu.co/58868/ |
identifier_str_mv |
ISSN: 2346-2183 |
url |
https://repositorio.unal.edu.co/handle/unal/60536 http://bdigital.unal.edu.co/58868/ |
dc.language.iso.spa.fl_str_mv |
spa |
language |
spa |
dc.relation.spa.fl_str_mv |
https://revistas.unal.edu.co/index.php/dyna/article/view/53506 |
dc.relation.ispartof.spa.fl_str_mv |
Universidad Nacional de Colombia Revistas electrónicas UN Dyna Dyna |
dc.relation.references.spa.fl_str_mv |
Rodríguez, Maricela Jiménez and González-Novoa, María Guadalupe and Estrada-Gutiérrez, Juan Carlos and Acosta-Lúa, Cuauhtemoc and Flores-Siordia, Octavio (2016) Secure point-to-point communication using chaos. DYNA, 83 (197). pp. 180-186. ISSN 2346-2183 |
dc.rights.spa.fl_str_mv |
Derechos reservados - Universidad Nacional de Colombia |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.license.spa.fl_str_mv |
Atribución-NoComercial 4.0 Internacional |
dc.rights.uri.spa.fl_str_mv |
http://creativecommons.org/licenses/by-nc/4.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
Atribución-NoComercial 4.0 Internacional Derechos reservados - Universidad Nacional de Colombia http://creativecommons.org/licenses/by-nc/4.0/ http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Universidad Nacional de Colombia (Sede Medellín). Facultad de Minas. |
institution |
Universidad Nacional de Colombia |
bitstream.url.fl_str_mv |
https://repositorio.unal.edu.co/bitstream/unal/60536/1/53506-297391-1-PB.pdf https://repositorio.unal.edu.co/bitstream/unal/60536/2/53506-297391-1-PB.pdf.jpg |
bitstream.checksum.fl_str_mv |
181c06f885caa832009b05a63e4d7781 c39b646e06797113ed627dddade37a35 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional Universidad Nacional de Colombia |
repository.mail.fl_str_mv |
repositorio_nal@unal.edu.co |
_version_ |
1814089751437770752 |
spelling |
Atribución-NoComercial 4.0 InternacionalDerechos reservados - Universidad Nacional de Colombiahttp://creativecommons.org/licenses/by-nc/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Rodríguez, Maricela Jiménez580e2406-da81-468e-be31-79081cc8349c300González-Novoa, María Guadalupe3ac00c35-7ab2-410c-bbf0-25e6511bec65300Estrada-Gutiérrez, Juan Carlos39e06e98-f050-44bc-a142-015e42840796300Acosta-Lúa, Cuauhtemoc35fca769-3362-461f-9382-7744407d26f0300Flores-Siordia, Octavio9c2970ca-cc59-48a6-a7c6-b7a499da25903002019-07-02T18:32:49Z2019-07-02T18:32:49Z2016-05-01ISSN: 2346-2183https://repositorio.unal.edu.co/handle/unal/60536http://bdigital.unal.edu.co/58868/This article presents an alternative for resolving the existing vulnerability of systems that implement masking by means of chaotic synchronization. This system avoids detection of the parameters used as the cipher key by an attacker on implementing encryption by means of synchronized chaotic-phase masks of the Rössler oscillator, for encoding and establishing synchronization among transmitterreceiver devices. In addition, it employs two ciphering keys: the first, with a recommended length of 2,048 characters, and the second, which is used as an initial value. Both keys are employed for continual modification of one of the oscillator’s parameters. This strengthens the security system and avoiding an attacker from obtaining the oscillator’s parametric values by calculating the least average synchronization error. The use of the system developed provides a cipher, which is resistant to statistical attacks. In addition, our system validates the data of the transmitter device (username, password, etc.) in order to authorize transmission.Este artículo presenta una alternativa para resolver la vulnerabilidad existente en los sistemas que implementan el enmascaramiento mediante la sincronización caótica, este sistema evita que los parámetros utilizados como clave de cifrado puedan ser detectados por un atacante al implementar el modelo matemático caótico del oscilador de Rössler para codificar y establecer la sincronización entre los dispositivos transmisor-receptor; además usa dos llaves de cifrado: la primera con una longitud recomendable de 2048 caracteres y la segunda se utiliza como un valor inicial. Ambas llaves se emplean para modificar continuamente uno de los parámetros del oscilador, esto fortalece la seguridad del sistema y evita que un atacante obtenga los valores del parámetro del oscilador calculando el error de sincronización promedio menor. El uso del sistema desarrollado proporciona un cifrado resistente a ataques estadísticos, además valida datos del dispositivo transmisor (nombre de usuario, password, etc.) para autorizar la transmisión hacia el destino.application/pdfspaUniversidad Nacional de Colombia (Sede Medellín). Facultad de Minas.https://revistas.unal.edu.co/index.php/dyna/article/view/53506Universidad Nacional de Colombia Revistas electrónicas UN DynaDynaRodríguez, Maricela Jiménez and González-Novoa, María Guadalupe and Estrada-Gutiérrez, Juan Carlos and Acosta-Lúa, Cuauhtemoc and Flores-Siordia, Octavio (2016) Secure point-to-point communication using chaos. DYNA, 83 (197). pp. 180-186. ISSN 2346-218362 Ingeniería y operaciones afines / Engineeringauthenticationdata encryptionsecurityintegritychaosautenticaciónencriptación de datosseguridadintegridadcaosSecure point-to-point communication using chaosArtículo de revistainfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85Texthttp://purl.org/redcol/resource_type/ARTORIGINAL53506-297391-1-PB.pdfapplication/pdf818419https://repositorio.unal.edu.co/bitstream/unal/60536/1/53506-297391-1-PB.pdf181c06f885caa832009b05a63e4d7781MD51THUMBNAIL53506-297391-1-PB.pdf.jpg53506-297391-1-PB.pdf.jpgGenerated Thumbnailimage/jpeg9177https://repositorio.unal.edu.co/bitstream/unal/60536/2/53506-297391-1-PB.pdf.jpgc39b646e06797113ed627dddade37a35MD52unal/60536oai:repositorio.unal.edu.co:unal/605362024-04-13 23:10:55.61Repositorio Institucional Universidad Nacional de Colombiarepositorio_nal@unal.edu.co |