Abstract
Search for a key agreement algorithm not based on traditional number theoretic problem is a challenging area of research in information security. In this paper we present a new concept of key agreement, using synchronization based parameter estimation of two chaotic systems. In this short paper, we only introduce the concept, which shows promise of a new mechanism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Metzler, R., Kinzel, W., Kanter, I.: Interacting Neural Networks. Phys. Rev. E. 62, 2555 (2000)
Pecora, L.M., Carroll, T.L.: Driving systems with chaotic signals. Phys. Rev. A 44(4), 2374–2383 (1991)
Cuomo, K.M., Oppenheim, A.V., Strogatz, S.H.: Synchronization of Lorenz-based chaotic circuits with applications to communications. IEEE Trans. On Circuits Systems 40, 626–633 (1993)
Patra, G.K., Ramamohan, T.R., Anil Kumar, V., Thangavelu, R.P.: Improvement in Security Level of First Generation Chaotic Communication System by Mutual Synchronization. In: Proceedings ADCOM 2006, pp. 195–198. IEEE Press, Los Alamitos (2006)
Patra, G.K., Anil Kumar, V., Thangavelu, R.P.: Analysis of Synchronization-based Parameter Estimation Attack on Switched Bidirectional Chaotic Key Stream Generator. In: Proc. of ICIP-2007, pp. 298–307. I. K. International Publisher (2007)
Konnur, R.: Estimation of all parameters of model from discrete scalar time series measurement. Physics Letters A 346, 275–280 (2005)
Maybhate, A., Amritkar, R.E.: Use of synchronization and adaptive control in parameter estimation from a time series. Phys. Rev. E 59, 284 (1999)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Patra, G.K., Anil Kumar, V., Thangavelu, R.P. (2007). A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation. In: McDaniel, P., Gupta, S.K. (eds) Information Systems Security. ICISS 2007. Lecture Notes in Computer Science, vol 4812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77086-2_22
Download citation
DOI: https://doi.org/10.1007/978-3-540-77086-2_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77085-5
Online ISBN: 978-3-540-77086-2
eBook Packages: Computer ScienceComputer Science (R0)