Synchronized choas for network security

Research output: Contribution to journalArticlepeer-review

18 Citations (Scopus)

Abstract

The term chaos theory is used widely to describe an emerging scientific discipline whose boundaries are not clearly defined. In this paper, we report implementation of encryption of signal in networked environment using synchronized chaos. We utilize this unpredictable, random phenomenon called chaos to code our information using superimposition. We applied this approach to different formats of data and results were positive in the sense that decoded files were run without error. Specifically, we have discussed, in detail, the implementation of such system for off-line as well as on-line applications. We observed that the size of the encrypted file is proportional to the size of the original file and there, infact, exists a linear relationship. The testing scenario encourages use of chaos in information coding across networks. It is shown that, in this environment, the security breach may not be possible even if hacker/intruder has compatible encoder/decoder, and the key is also accessible.

Original languageEnglish
Pages (from-to)498-505
Number of pages8
JournalComputer Communications
Volume26
Issue number6
DOIs
Publication statusPublished - Apr 15 2003
Externally publishedYes

Keywords

  • Chaotic signals
  • Decryption
  • Encryption
  • Network security
  • Synchronized chaos

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Synchronized choas for network security'. Together they form a unique fingerprint.

Cite this