A Novel Method for Authentication Using Chaotic Behaviour of Chua's Oscillator in (n,k) Secret Shared Data Scheme for Secure Communication

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS(2023)

引用 2|浏览9
暂无评分
摘要
In the current scenario, the utilization, and advancement of security algorithms in communication models have been increased. The use of chaotic circuit-based secure algorithms can give a new direction to develop a highly secure communication model. Security in any communication model can be provided by various available methods. The main feature of any security method is to introduce randomness at every step of the algorithm. Generally, the security algorithms deal with random numbers that are generated using a random number generator with predefined logic in the conventional secure communication model. In this article, the chaotic behavioral circuit is used to handle the randomness. The three main classifications of security control are management security, operational security, and physical security controls. The chaotic behavior of high-dimensional Chua's circuit has been used to implement these three security controls. The challenging task is to design and deploy (n, k ) secret sharing scheme using Chua's oscillator. The novel authenticator code function based on Chua's oscillator is proposed in this paper. This authenticator code function is having almost the same characteristics as of hash code, but with a higher degree of security.
更多
查看译文
关键词
Chaotic communication,Oscillators,Synchronization,Cryptography,Communication systems,Encryption,Codes,Chua's oscillator,(n, k) secret scheme,secure communication,hash code,aunthication,modular arithmatic
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要