{"title":"A self-synchronous stream cipher based on composite discrete chaos","authors":"Weng Yifang, Zheng Rong, Chen Yi","doi":"10.1109/COGINF.2009.5250746","DOIUrl":null,"url":null,"abstract":"A new methodology by combining chaotic generalized synchronization technique with composite discrete chaotic mappings for self-synchronous stream cipher is proposed to meet the need of secure communication in distributed virtual reality battlefield. The work also concerns the decline of sensitivity to initial conditions caused by synchronization mechanism. The encryption algorithm is developed with it. Since it belongs to asymmetric cryptosystem, it is safe in architecture. The numerical simulation results show that the sequences keep high sensitivity to initial conditions. They are close to ideal randomness with uniform distribution and nice correlation properties. Therefore the validity and feasibility of the proposed methodology are verified.","PeriodicalId":420853,"journal":{"name":"2009 8th IEEE International Conference on Cognitive Informatics","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 8th IEEE International Conference on Cognitive Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COGINF.2009.5250746","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
A new methodology by combining chaotic generalized synchronization technique with composite discrete chaotic mappings for self-synchronous stream cipher is proposed to meet the need of secure communication in distributed virtual reality battlefield. The work also concerns the decline of sensitivity to initial conditions caused by synchronization mechanism. The encryption algorithm is developed with it. Since it belongs to asymmetric cryptosystem, it is safe in architecture. The numerical simulation results show that the sequences keep high sensitivity to initial conditions. They are close to ideal randomness with uniform distribution and nice correlation properties. Therefore the validity and feasibility of the proposed methodology are verified.