We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Chaos Synchronization based Data Transmission with Asymmetric Encryption

by Santo Banerjee, M. R. K Ariffin
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 37 - Number 12
Year of Publication: 2012
Authors: Santo Banerjee, M. R. K Ariffin
10.5120/4736-6953

Santo Banerjee, M. R. K Ariffin . Chaos Synchronization based Data Transmission with Asymmetric Encryption. International Journal of Computer Applications. 37, 12 ( January 2012), 6-9. DOI=10.5120/4736-6953

@article{ 10.5120/4736-6953,
author = { Santo Banerjee, M. R. K Ariffin },
title = { Chaos Synchronization based Data Transmission with Asymmetric Encryption },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 37 },
number = { 12 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume37/number12/4736-6953/ },
doi = { 10.5120/4736-6953 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:24:08.191241+05:30
%A Santo Banerjee
%A M. R. K Ariffin
%T Chaos Synchronization based Data Transmission with Asymmetric Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 37
%N 12
%P 6-9
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this article we consider the phenomena of chaos synchronization with bidirectional linear feedback coupling. The synchronized system can be used as a cryptosystem, where both the model can be considered as a transceiver. We have proposed an asymmetric cryptographic scheme for ensuring security of data being transmitted in the above manner. We utilize the recent disclosed ?AA?_? public key cryptosystem which has implementation speed of O(n^2 ). It is an asymmetric cryptographic scheme that utilizes the factorization problem of two large primes and is implemented only by using the multiplication operation for both encryption and decryption. With this simple mathematical structure, it would have low computational requirements and would have minimal impact on the continuity of data being transferred through chaos synchronization.

References
  1. Fujisaka H. and Yamada T. 1983. Stability theory of synchronized motion in coupled-oscillator systems; Pecora L. M. and Carroll T. L. 1990. Synchronization in chaotic systems.
  2. Carroll T. L. and Pecora L. M. 1991. Synchronizing chaotic Circuits.
  3. Agiza H. N. and Yassen M. T. 2001. Synchronization of Rossler and Chen Chaotic Dynamical Systems Using Active Control.; Chen H.-H. 2007. Adaptive synchronization of chaotic systems via linear balanced feedback control.
  4. Wang Y. W., Guan Z. H. and Wang H. 2003. Feedback and adaptive control for the synchronization of Chen system via a single variable.; Bowong S. 2007. Adaptive synchronization between two different chaotic dynamical systems.
  5. Alexeyev A. A. and Shalfeev V. D. 1995. Chaotic synchronization of mutually coupled generators with frequency-controlled feedback loop.
  6. Wu X., Guan Z. H., Wu Z. and Li T. 2007. Chaos synchronization between Chen system and Genesio sys- tem.
  7. Yang T. and Chua L. O. 1997. Impulsive control and synchronization of nonlinear dynamical systems and application to secure communication.
  8. S.Banerjee, J. A.Yorke and C.Grebogi. 1998. Robust Chaos.
  9. L.Stenflo. 1996. A Nonlinear equations for acoustic gravity waves.
  10. S. Banerjee, P.Saha and A. RoyChowdhury. 2001. Chaotic scenario in the Stenflo equations.
  11. S.Banerjee, L.Rondoni, S.Mukhopadhyay. 2011b. Synchronization of time delayed semiconductor lasers and its applications in digital cryptography.
  12. S.Banerjee , D.Ghosh, A.Ray and A.R. Chowdhury. 2008. Synchronization between two different time-delayed systems and image encryption.
  13. M.R.K.Ariffin , M.A.Asbullah and N.A.Abu. 2011. Security Features of an Asymmetric Cryptosystem based on the Diophantine Equation Hard Problem. arXiv:1103.4433v23
Index Terms

Computer Science
Information Sciences

Keywords

Chaotic encoding system asymmetric cryptosystem