Skip to main content

Applying Triple Data Encryption Algorithm to a Chaotic Systems: T-S Fuzzy Model-Based Approach

  • Conference paper
  • First Online:
  • 1493 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 514))

Abstract

In the age of explosive growth in information exchanges, there is indeed for message security. Data Encryption Standard (DES) is one of the symmetric encryption algorithms which kept the dominant position in the area of data encryption over the last few decades. Nowadays, with a rapid development in the field of computer, the security of DES is too low when encountering the brute-force method for decryption. Therefore, 3DES applies the DES encryption algorithm three times to each data block to strengthen the complexity of the cryptosystem. Nevertheless, due to the meet-in-the-middle attack, it reduces the effective security of the ciphertext. Many studies have shown that most of the existing methods are unreliable in the aspect of security. Accordingly, this study proposes a double encryption using the 3DES and chaotic synchronization to increase the strength of the encryption. A design methodology for Takagi-Sugeno (T-S) fuzzy model-based secure communication in multiple time-delay chaotic (MTDC) systems is presented. The proposed encryption method produces a more secure communications system, while effectively protecting the encrypted message.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Hu C, Jiang H, Teng Z (2011) General impulsive control of chaotic systems based on a TS fuzzy model. Fuzzy Sets Syst 174:66–82

    Article  MathSciNet  Google Scholar 

  2. Poddar G, Chakrabarty K, Banerjee S (1998) Control of chaos in DC-DC converters. IEEE Trans. Circuit Syst I 45:672–676

    Article  Google Scholar 

  3. Lin SL, Tung PC (2009) A new method for chaos control in communication systems. Chaos, Solitons Fractals 42:3234–3241

    Article  Google Scholar 

  4. Pecora LM, Carroll TL (1990) Synchronization in chaotic systems. Phys Rev Lett 64:821–824

    Article  MathSciNet  Google Scholar 

  5. Mohammadzadeh A, Kaynak O, Teshnehlab M (2014) Two-mode indirect adaptive control approach for the synchronization of uncertain chaotic systems by the use of a hierarchical interval type-2 fuzzy neural network. IEEE Trans Fuzzy Syst 22:1301–1312

    Article  Google Scholar 

  6. Lin TC, Lee TY (2011) Chaos synchronization of uncertain fractional-order chaotic systems with time delay based on adaptive fuzzy sliding mode control. IEEE Trans Fuzzy Syst 19:623–635

    Article  Google Scholar 

  7. Jafari R, Yu W, Li X (2016) Fuzzy differential equations for nonlinear system modeling with bernstein neural networks. IEEE Access 4:9428–9436

    Article  Google Scholar 

  8. Wang W, Gelder PHAJMV, Vrijling JK (2008) The effects of dynamical noises on the identification of chaotic systems: with application to streamflow processes. In: Fourth International Conference on Natural Computation, Jinan, 2008, pp 685–691

    Google Scholar 

  9. Li S, Xu W, Li R (2007) Synchronization of two different chaotic systems with unknown parameters. Phys Lett A 361:98–102

    Article  Google Scholar 

  10. Parlitz U, Kocarev L, Schuster HG (1999) Handbook of chaos control. Wiley–VCH

    Google Scholar 

  11. Coppersmith D, Johnson DB, Matyas SM (1996) A proposed mode for triple-DES encryption. IBM J Res Dev 40:253–262

    Article  Google Scholar 

  12. Mitchell CJ (2016) On the security of 2-key triple DES. IEEE Trans Inf Theory 62:6260–6267

    Article  MathSciNet  Google Scholar 

  13. Jun Y, Na L, Jun D (2009) A design and implementation of high-speed 3DES algorithm system. In: Second international conference on future information technology and management engineering, Sanya 2009, pp 175–178

    Google Scholar 

  14. Ren Y et al (2016) Key recovery against 3DES in CPU smart card based on improved correlation power analysis. Tsinghua Sci Technol 21:210–220

    Article  Google Scholar 

  15. Handschuh H, Prenee B (1999) On the security of double and 2-key triple modes of operation. In: Fast software encryption, vol. 1636 of lecture notes in computer science, pp 215–230

    Chapter  Google Scholar 

  16. Takagi T, Sugeno M (1985) Fuzzy identification of systems and its applications to modeling and control. IEEE Trans Syst Man Cybern 15:116–132

    Article  Google Scholar 

  17. Pan ST (2011) Evolutionary computation on programmable robust IIR filter pole-placement design. IEEE Trans Instrum Meas 60:1469–1479

    Article  Google Scholar 

  18. Wang WJ, Cheng CF (1992) Stabilising controller and observer synthesis for uncertain large-scale systems by the Riccati equation approach. IEE Proc D 139:72–78

    Article  Google Scholar 

  19. Sun YJ (2009) Exponential synchronization between two classes of chaotic systems. Chaos, Solitons Fractals 39:2363–2368

    Article  Google Scholar 

  20. Limanond S, Si J (1998) Neural-network-based control design: an LMI approach. IEEE Trans Neural Netw 9:1422–1429

    Article  Google Scholar 

  21. Gahinet P, Nemirovski A, Laub AJ, Chilali M (1995) LMI control toolbox user’s guide. The MathWorks, Inc

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng-Hsiag Hsiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hsiao, FH., Lin, PH. (2019). Applying Triple Data Encryption Algorithm to a Chaotic Systems: T-S Fuzzy Model-Based Approach. In: Kim, K., Baek, N. (eds) Information Science and Applications 2018. ICISA 2018. Lecture Notes in Electrical Engineering, vol 514. Springer, Singapore. https://doi.org/10.1007/978-981-13-1056-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1056-0_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1055-3

  • Online ISBN: 978-981-13-1056-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics