skip to main content
10.1145/1655925.1656092acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicisConference Proceedingsconference-collections
research-article

Design and simulation of a modified perturbed digital chaotic signal generator for secure data communication

Published:24 November 2009Publication History

ABSTRACT

In this paper, we propose a new chaotic map, reconfigurable perturbed piecewise linear chaotic map (PWLCM) modified from perturbed PWLCM to be used in secure communication. The ship map is used as PWLCM in the proposed system. The principal difference between a chaotic carrier and a conventional periodic carrier is that the sample function for a given symbol is non periodic and is different from one symbol interval to the next. Thus, the transmitted waveform is never periodic, even if the same symbol is transmitted repeatedly. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. The performance of the proposed system is simulated by Matlab provides indicate approximately zero cross correlation, δ-like auto-correlation and super wide spread spectrum. The reconfigurable perturbed PWLCM that used in this paper provide long cycle width with excellent statistical properties in comparison with traditional perturbed PWLCM.

References

  1. M. Hasler, "Engineering chaos for secure communication systems," Phil. Trans. R. Soc. London A, no. 1701, p. 353, Oct. 1995.Google ScholarGoogle Scholar
  2. J. Cermák. Digital generators of chaos. Phys. Lett. A, 214:151--160, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  3. G. Jakimoski and L. Kocarev. Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., 48:163--169, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  4. C. Y. Li, J. S. Chen, and T. Y. Chang. A chaos-based pseudo random number generator using timing-based reseeding method. In IEEE International Symposium on Circuits and Systems, 2006. ISCAS 2006. Proceedings., pages 21--24, 2006.Google ScholarGoogle Scholar
  5. D. Socek, S. Li, S. M. Spyros, B. Furht, "Enhanced 1-D Chaotic Key Based Algorithm for Image Encryption," IEEE, Security and Privacy for Emerging Areas in Communications Networks, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. D. Wheeler. Problems with chaotic cryptosystems. Cryptologia, 13(3):243--250, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  7. S. Li, X. Mou, and Y. Cai. Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography. In Proceedings of Progress in Cryptology-IndoCrypt 2001, Lecture Notes in Computer Science, volume 2247, pages 316--329. Springer-Verlag, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Klomkarn, A. Jansri, and P. Sooraksa. A design of stream cipher based on multichaotic functions. In Proceedings of IEEE Int. Symp. Commmunications and Infor- mation Technology, volume 2, pages 26--29, 2004.Google ScholarGoogle Scholar
  9. H. Zhou, "A design methodology of chaotic stream ciphers and the realization problems in finite precision," Ph.D. thesis, Department of Electrical Engineering, Fudan University, Shanghai, China 1996.Google ScholarGoogle Scholar
  10. Li. Shujun, "Analyses and New Designs of Digital Chaotic Ciphers," PhD thesis, School of Electronic and Information Engineering, Xi'an Jiaotong University, 2003.Google ScholarGoogle Scholar
  11. S. Tao, W. Ruilli, Y. Yixun, "Perturbance based algorithm to expand cycle length of chaotic key stream," Electronics Letters, 34(9):pp. 873--874, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  12. S. El Assad, "Communications Numériques: Techniques Avancées," cours 5ème année, à Polytech 'Nantes, 2008.Google ScholarGoogle Scholar

Index Terms

  1. Design and simulation of a modified perturbed digital chaotic signal generator for secure data communication

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
            November 2009
            1479 pages
            ISBN:9781605587103
            DOI:10.1145/1655925

            Copyright © 2009 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 24 November 2009

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
          • Article Metrics

            • Downloads (Last 12 months)6
            • Downloads (Last 6 weeks)1

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader