Application of neural networks to unmasking chaotic secure communication (Q1809429): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Recovery of digital signals from chaotic switching / rank
 
Normal rank
Property / cites work
 
Property / cites work: TRANSMISSION OF DIGITAL SIGNALS BY CHAOTIC SYNCHRONIZATION / rank
 
Normal rank
Property / cites work
 
Property / cites work: UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME / rank
 
Normal rank
Property / cites work
 
Property / cites work: STEPS TOWARD UNMASKING SECURE COMMUNICATIONS / rank
 
Normal rank
Property / cites work
 
Property / cites work: HYPERCHAOTIC ATTRACTORS OF UNIDIRECTIONALLY-COUPLED CHUA’S CIRCUITS / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic Nonperiodic Flow / rank
 
Normal rank

Revision as of 09:48, 29 May 2024

scientific article
Language Label Description Also known as
English
Application of neural networks to unmasking chaotic secure communication
scientific article

    Statements

    Application of neural networks to unmasking chaotic secure communication (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    24 August 2003
    0 references
    The paper deals with chaotic shift keying (or chaotic switching) which is the most robust secure communication scheme. In the shift keying a binary information signal is hidden into chaotic time series generated by two different chaotic attractors. To make both indistinguishable from the transmitted signal is the basic idea to achieve security of chaotic shift keying. The security considerations done previously only from the time domain turn out to be not enough because an information leak in the spectral domain could cause fatal failures. The chaotic shift keying is unmasked by using two simple single-layer neural networks with known text strategy which reveal information leaks and thus break this chaotic secure communication scheme from the spectral space. In the first step of the proposed algorithm the time series of the transmitted signal are transferred into the spectral-temporal space by using a spectrogram (the moving window fast Fourier transformation of the time series). So the chaotic cryptanalysis problem becomes a two-dimensional pattern classification problem which is solved in the second step by the single-layer neural networks. One network reduces the two-dimensional spectrogram pattern to a one-dimensional characteristic signal which is fed into the other network. This network refines and optimizes the signal to give the second intermediate decision from which the final decision is very easily obtained by low-pass filtering and thresholding. The authors use Chua's circuit and the Lorenz system as transmitters and give various computer experimental results.
    0 references
    spectrograms
    0 references
    chaotic shift keying
    0 references
    chaotic switching
    0 references
    single-layer neural networks
    0 references
    Chua's circuit
    0 references
    Lorenz system
    0 references

    Identifiers