Abstract
The term chaos theory is used widely to describe an emerging scientific discipline whose boundaries are not clearly defined. In this paper, we report implementation of encryption of signal in networked environment using synchronized chaos. We utilize this unpredictable, random phenomenon called chaos to code our information using superimposition. We applied this approach to different formats of data and results were positive in the sense that decoded files were run without error. Specifically, we have discussed, in detail, the implementation of such system for off-line as well as on-line applications. We observed that the size of the encrypted file is proportional to the size of the original file and there, infact, exists a linear relationship. The testing scenario encourages use of chaos in information coding across networks. It is shown that, in this environment, the security breach may not be possible even if hacker/intruder has compatible encoder/decoder, and the key is also accessible.
Original language | English |
---|---|
Pages (from-to) | 498-505 |
Number of pages | 8 |
Journal | Computer Communications |
Volume | 26 |
Issue number | 6 |
DOIs | |
Publication status | Published - Apr 15 2003 |
Externally published | Yes |
Keywords
- Chaotic signals
- Decryption
- Encryption
- Network security
- Synchronized chaos
ASJC Scopus subject areas
- Computer Networks and Communications