Please wait a minute...
Chinese Physics, 2007, Vol. 16(8): 2254-2258    DOI: 10.1088/1009-1963/16/8/016
GENERAL Prev   Next  

Application of periodic orbit theory in chaos-based security analysis

Long Min(龙敏)a) and Qiu Shui-Sheng(丘水生)b)
a College of Computer and Communication, Changsha University of Science and Technology, Changsha 410076, China; b College of Electronic & Engineering, South China Univ. of Technology, Guangzhou 510640, China
Abstract  Chaos-based encryption schemes have been studied extensively, while the security analysis methods for them are still problems to be resolved. Based on the periodic orbit theory, this paper proposes a novel security analysis method. The periodic orbits theory indicates that the fundamental frequency of the spiraling orbits is the natural frequency of associated linearized system, which is decided by the parameters of the chaotic system. Thus, it is possible to recover the plaintext of secure communication systems based on chaotic shift keying by getting the average time on the spiraling orbits. Analysis and simulation results show that the security analysis method can break chaos shift keying secure communication systems, which use the parameters as keys.
Keywords:  periodic orbit theory      secure communication      chaos-based security analysis  
Received:  22 August 2006      Revised:  20 November 2006      Accepted manuscript online: 
PACS:  05.45.Vx (Communication using chaos)  

Cite this article: 

Long Min(龙敏) and Qiu Shui-Sheng(丘水生) Application of periodic orbit theory in chaos-based security analysis 2007 Chinese Physics 16 2254

[1] Novel traveling quantum anonymous voting scheme via GHZ states
Wenhao Zhao(赵文浩) and Min Jiang(姜敏). Chin. Phys. B, 2023, 32(2): 020303.
[2] Secure communication based on spatiotemporal chaos
Ren Hai-Peng (任海鹏), Bai Chao (白超). Chin. Phys. B, 2015, 24(8): 080503.
[3] A long-distance quantum key distribution scheme based on pre-detection of optical pulse with auxiliary state
Quan Dong-Xiao (权东晓), Zhu Chang-Hua (朱畅华), Liu Shi-Quan (刘世全), Pei Chang-Xing (裴昌幸). Chin. Phys. B, 2015, 24(5): 050309.
[4] Finite-time sliding mode synchronization of chaotic systems
Ni Jun-Kang (倪骏康), Liu Chong-Xin (刘崇新), Liu Kai (刘凯), Liu Ling (刘凌). Chin. Phys. B, 2014, 23(10): 100504.
[5] Synchronization of spatiotemporal chaotic systems and application to secure communication of digital image
Wang Xing-Yuan(王兴元), Zhang Na(张娜),Ren Xiao-Li(任小丽),and Zhang Yong-Lei(张永雷) . Chin. Phys. B, 2011, 20(2): 020507.
[6] Improvement on generalised synchronisation of chaotic systems
Zhu Hui-Bin(朱会宾),Qiu Fang(邱芳), and Cui Bao-Tong(崔宝同). Chin. Phys. B, 2010, 19(3): 030515.
[7] Generalized projective synchronization via the state observer and its application in secure communication
Wu Di(吴迪) and Li Juan-Juan(李娟娟). Chin. Phys. B, 2010, 19(12): 120505.
[8] A simple method to simultaneously achieve synchronization and anti-synchronization in chaotic systems
Li Rui-Hong(李瑞红), Chen Wei-Sheng(陈为胜), and Li Shuang(李爽) . Chin. Phys. B, 2010, 19(1): 010508.
[9] Extraction of periodic signals in chaotic secure communication using Duffing oscillators
Wang Yun-Cai(王云才), Zhao Qing-Chun(赵清春), and Wang An-Bang(王安帮). Chin. Phys. B, 2008, 17(7): 2373-2376.
[10] Adaptive projective synchronization of unified chaotic systems and its application to secure communication
Hu Man-Feng(胡满峰) and Xu Zhen-Yuan(徐振源 ). Chin. Phys. B, 2007, 16(11): 3231-3237.
[11] Synchronization of chaotic erbium-doped fibre lasers and its application in secure communication
Zhang Sheng-Hai (张胜海), Shen Ke (沈柯). Chin. Phys. B, 2004, 13(8): 1215-1220.
[12] A secure communication method for a high-power information signal based on chaotic masking
Li Jian-Fen (李建芬), Li Nong (李农). Chin. Phys. B, 2002, 11(11): 1124-1127.
No Suggested Reading articles found!