Application of neural networks to unmasking chaotic secure communication (Q1809429): Difference between revisions
From MaRDI portal
Set profile property. |
ReferenceBot (talk | contribs) Changed an Item |
||
Property / cites work | |||
Property / cites work: Recovery of digital signals from chaotic switching / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: TRANSMISSION OF DIGITAL SIGNALS BY CHAOTIC SYNCHRONIZATION / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: STEPS TOWARD UNMASKING SECURE COMMUNICATIONS / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: HYPERCHAOTIC ATTRACTORS OF UNIDIRECTIONALLY-COUPLED CHUA’S CIRCUITS / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Deterministic Nonperiodic Flow / rank | |||
Normal rank |
Revision as of 09:48, 29 May 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Application of neural networks to unmasking chaotic secure communication |
scientific article |
Statements
Application of neural networks to unmasking chaotic secure communication (English)
0 references
24 August 2003
0 references
The paper deals with chaotic shift keying (or chaotic switching) which is the most robust secure communication scheme. In the shift keying a binary information signal is hidden into chaotic time series generated by two different chaotic attractors. To make both indistinguishable from the transmitted signal is the basic idea to achieve security of chaotic shift keying. The security considerations done previously only from the time domain turn out to be not enough because an information leak in the spectral domain could cause fatal failures. The chaotic shift keying is unmasked by using two simple single-layer neural networks with known text strategy which reveal information leaks and thus break this chaotic secure communication scheme from the spectral space. In the first step of the proposed algorithm the time series of the transmitted signal are transferred into the spectral-temporal space by using a spectrogram (the moving window fast Fourier transformation of the time series). So the chaotic cryptanalysis problem becomes a two-dimensional pattern classification problem which is solved in the second step by the single-layer neural networks. One network reduces the two-dimensional spectrogram pattern to a one-dimensional characteristic signal which is fed into the other network. This network refines and optimizes the signal to give the second intermediate decision from which the final decision is very easily obtained by low-pass filtering and thresholding. The authors use Chua's circuit and the Lorenz system as transmitters and give various computer experimental results.
0 references
spectrograms
0 references
chaotic shift keying
0 references
chaotic switching
0 references
single-layer neural networks
0 references
Chua's circuit
0 references
Lorenz system
0 references