Cryptanalyzing chaotic secure communications using return maps

被引:84
作者
Yang, T [1 ]
Yang, LB
Yang, CM
机构
[1] Univ Calif Berkeley, Elect Res Lab, Berkeley, CA 94720 USA
[2] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
[3] Univ E Zhou, Hubei 436000, Peoples R China
[4] China Construct Bank, Songjiang Sub Branch, Shanghai 201611, Peoples R China
[5] Everbeauty Houseware Shanghai Co Ltd, Shanghai 201612, Peoples R China
关键词
chaotic cryptanalysis; return map; chaos; Chua's circuit; chaotic secure communication; fuzzy mathematics;
D O I
10.1016/S0375-9601(98)00425-3
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In chaotic secure communications, message signals are scrambled by chaotic dynamical systems. The interaction between the message signals and the chaotic systems results in changes of different kinds of return maps. In this paper, we use return map based methods to unmask some chaotic secure communication systems; namely, chaotic shift keying (chaotic switching), chaotic parameter modulation and non-autonomous chaotic modulation. These methods are used without knowing the accurate knowledge of chaotic transmitters and without reconstructing the dynamics or identifying the parameters of chaotic transmitters. These methods also provide a criterion of deciding whether a chaotic secure communication scheme is secure or not. The effects of message signals on the changes of different return maps are studied. Fuzzy membership functions are used to characterize different kinds of changes of return maps. Fuzzy logic rules are used to extract message signals from the transmitted signal. The computer experimental results are provided. The results in this paper show that the security of chaotic secure communication not only depends on the complexity of the chaotic system but also depends on the way the message is scrambled. A more complex chaotic system is not necessary to provide a higher degree of security if the transmitted signal has simple and concentrated return maps. We also provide examples to show that a chaotic system with complicated return maps can achieve a higher degree of security to the attacks presented in this paper. (C) 1998 Elsevier Science B.V.
引用
收藏
页码:495 / 510
页数:16
相关论文
共 14 条
  • [1] BEKER HJ, 1982, CTRYPTOGRAPHY, P130
  • [2] CHUA CIRCUIT - AN OVERVIEW 10 YEARS LATER
    CHUA, LO
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 1994, 4 (02) : 117 - 159
  • [3] Synchronization through compound chaotic signal in Chua's circuit and Murali-Lakshmanan-Chua circuit
    Murali, K
    Lakshmanan, M
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1997, 7 (02): : 415 - 421
  • [4] EXTRACTING MESSAGES MASKED BY CHAOS
    PEREZ, G
    CERDEIRA, HA
    [J]. PHYSICAL REVIEW LETTERS, 1995, 74 (11) : 1970 - 1973
  • [5] Signal extraction from chaotic communications
    Short, KM
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1997, 7 (07): : 1579 - 1597
  • [6] Unmasking a modulated chaotic communications scheme
    Short, KM
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1996, 6 (02): : 367 - 375
  • [7] SHORT KM, 1994, INT J BIFURCAT CHAOS, V4, P957
  • [8] Simmons G. J., 1992, CONT CRYPTOLOGY SCI
  • [9] A SIMPLE WAY TO SYNCHRONIZE CHAOTIC SYSTEMS WITH APPLICATIONS TO SECURE COMMUNICATION SYSTEMS
    Wu, Chai Wah
    Chua, Leon O.
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1993, 3 (06): : 1619 - 1627
  • [10] On adaptive synchronization and control of nonlinear dynamical systems
    Wu, CW
    Yang, T
    Chua, LO
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1996, 6 (03): : 455 - 471