1 / 23

CONTENTS

CONTENTS. 1.     Introduction 2.     Chaos - What is it? 3.     Types of systems 4.     Chaos - Early conception 5.     Chaos control 6.     History of Cryptology 7.     Chaotic encryption – An Overview 8.     An example of chaotic wave generation

odilia
Download Presentation

CONTENTS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CONTENTS 1.     Introduction 2.     Chaos - What is it? 3.     Types of systems 4.     Chaos - Early conception 5.     Chaos control 6.     History of Cryptology 7.     Chaotic encryption – An Overview 8.     An example of chaotic wave generation 9.     Chaotic Encryption – Ultimate in security 10. Robustness in synchronization 11. Chaotic synchronization 12. Open loop chaotic synchronization 13. The Set-Up 14. Drawbacks 15. Merits 16. Conclusion

  2. INTRODUCTION The idea of encrypting data can be dated back to the caesarian period where he used keys to encrypt alphabets one by one. The demand for better and foolproof encrypting technique led to immense research on encryption and now we have a large number of techniques of encryption of which chaotic encryption has proved to be the most promising one.

  3. CHAOS – What is it? Chaos refers to a type of complex dynamical behavior that possess some special features such as being extremely sensitive to small variations in initial conditions.It is said 20th century would be known for three things,quantum mechanics, relativity theorem, and the third and most recent chaos.

  4. Types of systems All systems can be basically divided into three types: 1.Deterministic systems These are systems for which for a given set of conditions the result can be predicted and the output does not vary much with change in initial conditions. 2. Stochastic systems These systems, which are not as reliable as deterministic systems. Their output can be predicted only for a certain range of values. 3. Chaotic systems Chaotic systems are the most unpredictable of the three systems. Moreover they are very sensitive to initial conditions and a small change in initial conditions can bring about a great change in its output.

  5. CHAOS - EARLY CONCEPTION– The journey from being a nuisance to the ultimate tool Due to its inherent instability chaos was considered to be neither controllable nor predictable and hence useless but ironically recent researches have proved that chaos can be harnessed for beneficial purposes.

  6. CHAOS CONTROL Chaos control refers to the situation where chaotic dynamics is weakened or eliminated by appropriate controls; while anti-control of chaos means that chaos is created, maintained, or enhanced when it is healthy and useful. Both control and anti-control of chaos can be accomplished via some conventional and nonconventional methods such as microscopic parameter perturbation, bifurcation monitoring, entropy reduction, state pinning, phase delay, and various feedback and adaptive controls. It has been shown that the sensitivity of chaotic systems to small perturbations can be used to direct system trajectories to a desired target quickly with very low and ideally minimum control energy Chaos may be used to enhance the artificial intelligence of neural networks, as well as increase coding- decoding efficiency in signal and image communications.

  7. HISTORY OF CRYPTOLOGY– Why the need for chaotic encryption ever came up? The first ideas of encryption came up in the caesarian period. The idea was to use keys to displace alphabets as shown. ABCDEFGHIJKLMNOPQRSTUVWXYZ CDEFGHIJKLMNOPQRSTUVWXYZAB As this was not much of a success newer ideas came up.

  8. The next step towards this direction was the use of scattered relationship between alphabets for coding. Scattered relationship between alphabets

  9. CHAOTIC Encryption – An overview. The basic idea of chaotic encryption is to modulate a chaotic wave with a massage so that the message remains in the transmitted wave remains invisible in both time and frequency domains.

  10. AN EXAMPLE OF CHAOTIC WAVEFORM GENERATION To get an idea about chaos and how a chaotic waveform would look like let us consider an example of a chaotic wave generated. In the given example the output wave follows the formula Xnew = Xold * a * (Xold-1) Where Xnew stands for the new state and Xold for the just previous state. Here as we can see every value depends on the previous state and hence going back the system on a whole depends on the initial conditions.

  11. As we can see no information is evident on the chaotic waveform and it looks absolutely random. Xnew = Xold * a * (Xold-1)

  12. CHAOTIC ENCRYPTION – ULTIMATE IN SECURITY Chaotic encryption is both technically simple and inexpensive to embed on a microchip -- two factors that make it attractive to any company looking for a low-cost way to protect data communications. It would also include the cellular phone industry, since all cellular phones contain microprocessors and since the encryption systems the industry now has in place have failed to stem an explosion in theft of service. For successful decryption of a chaotic encrypted data three elements should match at the transmitter and receiver end.

  13. Original conditions:- • Original condition is a value, chosen by the chaotic encryption system's proprietary protocol that gets plugged into a formula called a map. • 2. Map :- • The map is composed of parameters, and is shared by both the sender of a message, who uses it to scramble the underlying data, and by the receiver, who uses it as a descrambler. • 3. Parameters:- • The various parameters at the receiver and transmitter end should match. • Up to 10,000 maps can be hardwired into single microchip. • Any of the three parameters is kept changing frequently.

  14. ROBUSTNESS OF SYNCHRONISATION This is most crucial in chaotic synchronization. Good quality of synchronization does not guarantee good retrieval of message signal due to the sensitivity of the synchronized trace to any perturbation, including the perturbations caused by the intrinsic noise of the transmitter and that of the receiver .If some perturbation temporally desynchronizes the synchronized transmitter and receiver for a period of time, the message signal within this period cannot be recovered. Robust synchronization will not occur until the value of coupling strength index K is not above 0.15, but an increase of K thereafter does not necessarily result in an increase in robustness of synchronization. It has been found that optimum value of coupling strength for robust synchronization is = 0.4

  15. CHAOTIC SYNCHRONISATION As has been mentioned earlier the most demanding task in the process of chaotic encryption is to synchronize the transmitter and the receiver. Two ways to achieve this synchronization would be 1.  Use two- transmission channel system :- Here we have two separate channels, one to carry the encrypted signal and the other to carry the chaotic carrier wave for synchronization at the receiver side. 2. Single transmission channel :- Here the carrier chaotic waveform itself acts as driving signal for synchronizing the receiver with the transmitter.

  16. OPEN-LOOP CHAOTIC SYNCHRONISATION Both the above-mentioned techniques of synchronization make use of complex closed loops, and the former needs filters to make recovered message signal recognizable while the latter is limited to transmit a digital signal. Hence we came up with the idea of open loop chaotic synchronization. Here no optical feedback path exists. The transmitting laser is operated to chaos under proper injection conditions. Since the message signal is injected into transmitter The transmitter is driven from one chaotic state to another. Hence this makes the process of decryption by an eavesdropper totally impossible.

  17. THE SET-UP Here we consider a set-up for open loop chaotic synchroniosation of injection locked semiconductors. The given set-up can carry a message regardless of wheather it is analog or digital , by amplitude modulation frequency modulation for the input Ei(t) In the given set up for an input of Ei(t) we get an output given by E’I(t) = ( Kr/ Kt) * S(t) – Kr * A’(t)) = (Kr/ K) * (Ei(t) + K(A-A’))  (Kr/K) * Ei(t) ( K is kept low)

  18. where Kr is total measurement of coupling coefficient of receiver and transmission coefficient of BS3 Kt is total measurement of coupling coefficient of transmitter and transmission coefficient of BS2 (A-A’) is the synchronization error. In order to keep the signal buried under the chaotic signal we need to keep the message signal amplitude sufficiently low.   The output Ei(t) is recovered without any auxiliary optical or electronic filter provided the condition Ei(t) >> K(A-A’) is satisfied. K is taken small. Hence we see amplitude is affected by demand for privacy than quality.

  19. DRAWBACKS No system goes without any drawbacks however perfection is taken care of. Hence chaotic synchronization also has a few drawbacks to mention. They are mainly  .. Sensitivity to initial conditions :- It has been mentioned repeatedly the chaotic synchronization is extremely sensitive to its initial conditions and any small perturbation could lead to disastrous effects.

  20. Phase sensitivity :- This is again another drawback we face in chaotic encryption. By saying the system is phase sensitive we mean that for the signal K*Ei(t-t’) the corresponding chaotic wave should be Kt * A(t-t’). A successful circuit implementation in a chaotic environment is generally difficult, due to the extreme sensitivity of chaos to parameter variations and noise perturbations, and the nonrobustness of chaos to the structural stability, within the physical devices

  21. MERITS The merits we have by adopting chaotic encryption are many. As has been mentioned throughout the text chaotic encryption is accredited to be  1.    Ultimate in encryption. 2.    Cost effective 3.    Utilizes chaos, which was considered a nuisance.

  22. CONCLUSION Chaotic encryption is the technology of tomorrow. It is one solution to a cost-effective and foolproof encryption technique.

More Related