Zhao Bai-shan, Zhu Yi-sheng. An Improved Secure Communication System Based on Chaotic Masking[J]. Journal of Electronics & Information Technology, 2007, 29(3): 699-701. doi: 10.3724/SP.J.1146.2005.00842
Citation:
Zhao Bai-shan, Zhu Yi-sheng. An Improved Secure Communication System Based on Chaotic Masking[J]. Journal of Electronics & Information Technology, 2007, 29(3): 699-701. doi: 10.3724/SP.J.1146.2005.00842
Zhao Bai-shan, Zhu Yi-sheng. An Improved Secure Communication System Based on Chaotic Masking[J]. Journal of Electronics & Information Technology, 2007, 29(3): 699-701. doi: 10.3724/SP.J.1146.2005.00842
Citation:
Zhao Bai-shan, Zhu Yi-sheng. An Improved Secure Communication System Based on Chaotic Masking[J]. Journal of Electronics & Information Technology, 2007, 29(3): 699-701. doi: 10.3724/SP.J.1146.2005.00842
This paper discusses the reason of the security weakness of generalized state-space observers-based approaches for secure communication, using chaotic masking and chaotic nodulation of a Lorenz system and proposes a method to solve this problem. Theoretical analysis and simulation show this improvement realized chaotic masking. By comparison with the original system,this method improves the performance of secure communication system based on chaotic masking.
[1] Boutayeb M, Darouach M, and Rafaralahy H. Generalized state-space observers for chaotic synchronization and secure communication[J].. IEEE Trans. Circuits Syst. I.2002, 49:345-349 [2] 李建芬, 李农. 一种新的蔡氏混沌掩盖通信方法[J]. 系统工程与电子技术, 2002, 24(4): 37-410. Li Jian-fen and Li Nong. A new chaotic masking method for secure communications based on Chua's circuit. Systems Engineering and Electronics, 2002, 24(4): 37-410. [3] 吴敏, 丘水生. 一个混沌保密通信方案的改进[J]. 通信技术, 2003, (1): 103-105. [4] 朱双鹤, 李小春等. 一种新的混沌掩盖保密通信方案[J]. 空军工程大学学报(自然科学版), 2002, 3(6): 37-41. Zhu Shuang-he and Li Xiao-chun, et al.. A new chaotic masking scheme with applications to secure communications. Journal of Air Force Engineering University (Natural Science Edition), 2002, 3(6): 37-41. [5] Alvarez G, Montoya F, Romera M, and Pastor G. Breaking two secure communication systems based on chaotic masking[J].. IEEE Trans. Circuits Syst. II.2004, 51:505-506 [6] Liao T and Huang N. An observer-based approach for chaotic synchronization with applications to secure communications[J].. IEEE Trans. Circuits Syst. I.1999, 46:1144-1150