{"title":"Optimal H-infinity fuzzy control of chaotic synchronization cryptosystems: An NN-based approach","authors":"Feng-Hsiag Hsiao","doi":"10.1049/cth2.12722","DOIUrl":null,"url":null,"abstract":"<p>This study combines the ElGamal encryption algorithm and chaotic synchronization to enhance security by means of double encryption techniques. The ElGamal encryption system is an asymmetric key encryption algorithm for the public key cryptography, based on the Diffie-Hellman key exchange. With the rapid progress of science and technology, quantum computers are becoming universal, and due to their mighty computing power, traditional cryptosystems can be easily cracked; therefore, this study introduces a chaotic synchronization to prevent the security problems caused by quantum computers. Using the chaotic characteristics of disarray and irregularities as an auxiliary for encryption can enhance ElGamal security. Moreover, chaotic systems could be affected by external disturbances. Accordingly, this study focuses on fuzzy control for the optimal <i>H</i><b><sup>∞</sup></b> exponential synchronization of multiple time-delay chaotic systems via the neural network-based approach. Finally, the effectiveness of the proposed approach is demonstrated by an example with simulations.</p>","PeriodicalId":50382,"journal":{"name":"IET Control Theory and Applications","volume":"19 1","pages":""},"PeriodicalIF":2.2000,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cth2.12722","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Control Theory and Applications","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cth2.12722","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This study combines the ElGamal encryption algorithm and chaotic synchronization to enhance security by means of double encryption techniques. The ElGamal encryption system is an asymmetric key encryption algorithm for the public key cryptography, based on the Diffie-Hellman key exchange. With the rapid progress of science and technology, quantum computers are becoming universal, and due to their mighty computing power, traditional cryptosystems can be easily cracked; therefore, this study introduces a chaotic synchronization to prevent the security problems caused by quantum computers. Using the chaotic characteristics of disarray and irregularities as an auxiliary for encryption can enhance ElGamal security. Moreover, chaotic systems could be affected by external disturbances. Accordingly, this study focuses on fuzzy control for the optimal H∞ exponential synchronization of multiple time-delay chaotic systems via the neural network-based approach. Finally, the effectiveness of the proposed approach is demonstrated by an example with simulations.
期刊介绍:
IET Control Theory & Applications is devoted to control systems in the broadest sense, covering new theoretical results and the applications of new and established control methods. Among the topics of interest are system modelling, identification and simulation, the analysis and design of control systems (including computer-aided design), and practical implementation. The scope encompasses technological, economic, physiological (biomedical) and other systems, including man-machine interfaces.
Most of the papers published deal with original work from industrial and government laboratories and universities, but subject reviews and tutorial expositions of current methods are welcomed. Correspondence discussing published papers is also welcomed.
Applications papers need not necessarily involve new theory. Papers which describe new realisations of established methods, or control techniques applied in a novel situation, or practical studies which compare various designs, would be of interest. Of particular value are theoretical papers which discuss the applicability of new work or applications which engender new theoretical applications.