首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Cryptanalyzing chaotic secure communications using return maps
Institution:1. School of Astronautics, Harbin Institute of Technology, Mailbox 345, Harbin 150001, China;2. Department of Aerospace Science and Technology, Politecnico di Milano, Milano 20156, Italy;1. University of Santiago de Chile, Department of Mathematics and Computer Science, Faculty of Science, Av. Las Sophoras 173, Estación Central, Santiago 9170020, Chile.;2. Universidad Católica Silva Henríquez, Escuela de Educación en Ciencias del Movimiento y Deportes. Lo Cañas 3636, Santiago 8280354, Chile.;3. Universidad Bernardo O’Higgins, Facultad de Educación. Av. Viel 1497, Santiago 8370993, Chile.
Abstract:In chaotic secure communications, message signals are scrambled by chaotic dynamical systems. The interaction between the message signals and the chaotic systems results in changes of different kinds of return maps. In this paper, we use return map based methods to unmask some chaotic secure communication systems; namely, chaotic shift keying (chaotic switching), chaotic parameter modulation and non-autonomous chaotic modulation. These methods are used without knowing the accurate knowledge of chaotic transmitters and without reconstructing the dynamics or identifying the parameters of chaotic transmitters. These methods also provide a criterion of deciding whether a chaotic secure communication scheme is secure or not. The effects of message signals on the changes of different return maps are studied. Fuzzy membership functions are used to characterize different kinds of changes of return maps. Fuzzy logic rules are used to extract message signals from the transmitted signal. The computer experimental results are provided. The results in this paper show that the security of chaotic secure communication not only depends on the complexity of the chaotic system but also depends on the way the message is scrambled. A more complex chaotic system is not necessary to provide a higher degree of security if the transmitted signal has simple and concentrated return maps. We also provide examples to show that a chaotic system with complicated return maps can achieve a higher degree of security to the attacks presented in this paper.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号