Ming-Xuan SunNonlinear Masking and Iterative Learning Decryption for Secure Communications. International Journal of Automation and Computing, vol. 12, no. 3, pp. 297-306, 2015. https://doi.org/10.1007/s11633-015-0887-9
Citation: Ming-Xuan SunNonlinear Masking and Iterative Learning Decryption for Secure Communications. International Journal of Automation and Computing, vol. 12, no. 3, pp. 297-306, 2015. https://doi.org/10.1007/s11633-015-0887-9

Nonlinear Masking and Iterative Learning Decryption for Secure Communications

doi: 10.1007/s11633-015-0887-9
Funds:

This work was supported by National Natural Science Foundation of China (No. 61174034).

  • Received Date: 2014-04-29
  • Rev Recd Date: 2014-10-28
  • Publish Date: 2015-06-01
  • Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking methodology, applicable to the conventional schemes. In the proposed cryptographic scheme, the plaintext spans over a pre-specified finite-time interval, which is modulated through parameter modulation, and masked chaotically by a nonlinear mechanism. An efficient iterative learning algorithm is exploited for decryption, and the sufficient condition for convergence is derived, by which the learning gain can be chosen. Case studies are conducted to demonstrate the effectiveness of the proposed masking method.

     

  • loading
  • [1]
    L. M. Pecora, T. L. Carroll. Synchronization in chaotic systems. Physical Preview Letters, vol. 64, no. 8, pp. 821-824, 1990.
    [2]
    K. M. Cuomo, A. V. Oppenheim. Circuit implementation of synchronized chaos with applications to communications. Physical Review Letters, vol. 71, no. 1, pp. 65-68, 1993.
    [3]
    G. R. Chen, X. N. Dong. From Chaos to Order: Methodologies, Perspectives and Applications, Singapore: World Scientific, 1998.
    [4]
    A. L. Fradkov, R. J. Evans. Control of chaos: Methods and applications in engineering. Annual Reviews in Control, vol. 29, no. 1, pp. 33-56, 2005.
    [5]
    T. Yang, L. O. Chua. Secure communication via chaotic parameter modulation. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 43, no. 9, pp. 817-819, 1996.
    [6]
    N. J. Corron, D. W. Hahs. A new approach to communications using chaotic signals. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 44, no. 5, pp. 373-382, 1997.
    [7]
    L. Kocarev, U. Parlitz. General approach for chaotic synchronization with applications to communication. Physical Preview Letters, vol. 74, no. 25, pp. 5028-5031, 1995.
    [8]
    T. Yang, C. W. Wu, L. O. Chua. Cryptography based on chaotic systems. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 44, no. 5, pp. 469-472, 1997.
    [9]
    H. Nijmeijer, I. M. Y. Mareels. An observer looks at synchronization. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 44, no. 10, pp. 882-890, 1997.
    [10]
    H. Huijberts, H. Nijmeijer, R. Willems. System identification in communication with chaotic systems. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 47, no. 6, pp. 800-808, 2000.
    [11]
    S. Arimoto, S. Kawamura, F. Miyazaki. Bettering operation of robots by learning. Journal of Robotic Systems, vol.1, no. 2, pp. 123-140, 1984.
    [12]
    D. A. Bristow, M. Tharayil, A. G. Alleyne. A survey of iterative learning control. IEEE Control Systems Magazine, vol. 26, no. 3, pp. 96-114, 2006.
    [13]
    M. X. Sun, D. W. Wang. Closed-loop iterative learning control for non-linear systems with initial shifts. International Journal of Adaptive Control and Signal Processing, vol. 16, no. 7, pp. 515-538, 2002.
    [14]
    D. P. Huang, J. X. Xu, V. Venkataramanan, T. C. T. Huynh. High-performance tracking of piezoelectric positioning stage using current-cycle iterative learning control with gain scheduling. IEEE Transactions on Industrial Electronics, vol. 61, no. 2, pp. 1085-1098, 2014.
    [15]
    M. X. Sun. Chaotic communication systems: An iterative learning perspective. In Proceedings of the International Conference on Electrical and Control Engineering, IEEE, Wuhan, China, pp. 573-577, 2010.
    [16]
    U. Feldmann, M. Hasler, W. Schwaz. Communication by chaotic signals: The inverse system approach. International Journal of Circuit Theory and Applications, vol. 24, no. 5, pp. 551-579, 1996.
    [17]
    H. Zhou, X. T. Ling. Problems with the chaotic inverse system encryption approach. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 44, no. 3, pp. 268-271, 1997.
    [18]
    Y. Zheng, G. R. Chen, C. Y. Zhu. A system inversion approach to chaos-based secure speech communication. International Journal of Bifurcation and Chaos, vol. 15, no. 8, pp. 2569-2582, 2005.
    [19]
    J. H. Lü, G. R. Chen, D. Z. Cheng, S. Celikovsky. Bridge the gap between the Lorenz system and the Chen system. International Journal of Bifurcation and Chaos, vol. 12, no. 12, pp. 2917-2926, 2002.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    用微信扫码二维码

    分享至好友和朋友圈

    Article Metrics

    Article views (4691) PDF downloads(1321) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return