DocumentCode :
2816000
Title :
Some tools for attacking secure communication systems employing chaotic carriers
Author :
Ogorzatek, Maciej J. ; Dedieu, Hervé
Author_Institution :
Dept. of Electr. Eng., Univ. of Mining & Metall., Krakow, Poland
Volume :
4
fYear :
1998
fDate :
31 May-3 Jun 1998
Firstpage :
522
Abstract :
We present a review of methods which can be used to uncover the information signal hidden using one of so-called chaos communication methodologies. All of the known secure communication methods employing chaotic carriers are shown to be of very low security. Hidden messages can be found using extremely simple reasoning and straightforward computational methods. We point out also that none of the methodologies proposed so far uses the properties of the chaotic signal. The only property exploited is the sensitivity (instability) of the transmitter/receiver pair to parameter and initial condition changes
Keywords :
chaos; cryptography; CSK; chaos communication methodologies; chaotic carriers; hidden information signal; instability; low security; secure communication systems; secure system attack; sensitivity; transmitter/receiver pair; Binary sequences; Chaotic communication; Circuits and systems; Costs; Electronic mail; Frequency; Information security; Signal generators; Stability; Transmitters;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Circuits and Systems, 1998. ISCAS '98. Proceedings of the 1998 IEEE International Symposium on
Conference_Location :
Monterey, CA
Print_ISBN :
0-7803-4455-3
Type :
conf
DOI :
10.1109/ISCAS.1998.698970
Filename :
698970
Link To Document :
بازگشت