Analysis of single-valuedness of solutions to the inverse problems of chaotic dynamics for concealment of information in communication systems and networks

Authors

  • Pavlo Yu. Kostenko Ivan Kozhedub Kharkiv National Air Force University, Ukraine https://orcid.org/0000-0002-3382-0684
  • A. V. Antonov Kharkiv Air Force University, Ukraine
  • T. P. Kostenko Kharkiv Air Force University, Ukraine

DOI:

https://doi.org/10.3103/S0735272706080012

Abstract

The paper considers an approach to the problem of information reticence in communication systems and networks based on achievements of the chaotic dynamics. As distinct from traditional methods of information protection, relying on “computational complexity” of cryptoanalysis, the immunity to invasions in the new method is attained due to ambiguity of inversion of chaotic mapping. The features of computer-aided realization of the method are also considered. Assessment of required accuracy from the viewpoint of single-valuedness of crypto-transforms is carried out. It is shown that the uniqueness of transformations performed over real numbers is attained by introducing some redundancy in the ciphered text.

References

DIFFIE, W.; HELLMAN, M.E. "New directions in cryptography," IEEE Trans. Inf. Theory, v.22, n.6, р.644-654, 1976. DOI: https://doi.org/10.1109/TIT.1976.1055638.

RIVEST, R.L.; SHAMIR, A.; ADLEMAN, L. "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, v.21, n.2, p.120-126, 1978. DOI: https://doi.org/10.1145/359340.359342.

The Federal Information Processing Standard. FIPS PUB 186, NIST USA, 1996.

ELGAMAL, T. "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, v.31, n.4, р.469-472, 1985. DOI: https://doi.org/10.1109/TIT.1985.1057074.

SCHNORR, C.P. "Efficient signature generation by smart cards," J. Cryptology, v.4, n.3, p.161-174, 1991. DOI: https://doi.org/10.1007/BF00196725.

KOBLITZ, N. "Elliptic curve cryptosystems," Math. Comput., v.48, р.203-209, 1987. DOI: https://doi.org/10.1090/S0025-5718-1987-0866109-5.

COWIE, James; DODSON, Bruce; ELKENBRACHT-HUIZING, R. Marije; LENSTRA, Arjen K.; MONTGOMERY, Peter L.; ZAYER, Jörg. "A world wide number field Sieve factoring record: on to 512 Bits," Proc. ASIACRYPT’96, Nov. 1996. DOI: https://doi.org/10.1007/BFb0034863.

ODLYZKO, A. "The future of integer factorization," CryptoBytes, Sum. 1995.

WIENER, M.J. "Cryptanalysis of short RSA secret exponents," IEEE Trans. Inf. Theory, v.36, n.3, p.553-558, 1990. DOI: https://doi.org/10.1109/18.54902.

PTITSYN, N.I. Application of the Deterministic Chaos Theory in Cryptography [in Russian]. Moscow: MGTU, 2002.

KOCAREV, L. "Chaos-based cryptography: a brief overview," IEEE Circuits Systems Mag., v.1, n.3, р.6-21, 2001. DOI: https://doi.org/10.1109/7384.963463.

KOCAREV, L.; TASEV, Z. "Public-key encryption based on Chebyshev maps," Proc. of Int. Symp. on Circuits and Systems, 25-28 May 2003, Bangkok, Thailand. IEEE, 2003, v.3, р.28-31. DOI: https://doi.org/10.1109/ISCAS.2003.1204947.

MASUDA, N.; AIHARA, K. "Cryptosystems with discretized chaotic maps," IEEE Trans. Circuits, Syst. I: Fund. Theory Applications, v.49, n.1, р.28-39, 2002. DOI: https://doi.org/10.1109/81.974872.

KOTULSKI, Zbigniew; SZCZEPAŃSKI, Janusz; GÓRSKI, Karol; PASZKIEWICZ, Andrzej; ZUGAJ, Anna. "Application of discrete chaotic dynamical systems in cryptography — DCC method," Int. J. Bifurcation Chaos, v.9, n.6, р.1121-1135, 1999. DOI: https://doi.org/10.1142/S0218127499000778.

KOSTENKO, P.Y.; SIVASHCHENKO, S.I.; ANTONOV, A.V.; KOSTENKO, T.P. "Application of chaotic dynamics methods for concealment of information in communication systems and networks," Radioelectron. Commun. Syst., v.49, n.3, p.46-50, 2006. URI: http://radioelektronika.org/article/view/S0735272706030101.

KOSTENKO, P.Y.; ANTONOV, A.V.; KOSTENKO, T.P. "Analysis of effectiveness of measures for concealment of information in communication systems and networks by chaotic dynamics methods," Radioelectron. Commun. Syst., v.49, n.4, p.19-25, 2006. URI: http://radioelektronika.org/article/view/S0735272706040042.

KOSTENKO, P.Y.; ANTONOV, A.V.; SIVASHCHENKO, S.I. "Solution of the inverse task of chaotic dynamics as the most effective method of the analysis of an open key cryptography system," Recording, Storage and Processing of Data, v.8, n.1, p.103-113, 2006. URI: http://dspace.nbuv.gov.ua/handle/123456789/50833.

MOON, F.C. Chaotic Vibrations. An Introduction for Applied Scientists and Engineers. Wiley, 1987.

KOTULSKI, Z.A.; SZCZEPANSKI, Janusz; GÓRSKI, Karol; GÓRSKA, Anna; PASZKIEWICZ, Andrzej. "On constructive approach to chatic pseudorandom number generators," Proc. of Regional Conf. on Military Communication and Information Systems, CIS Solutions for an Enlarged NATO, RCMIS 2000.

Published

2006-08-01

Issue

Section

Research Articles