Abstract
In the age of explosive growth in information exchanges, there is indeed for message security. Data Encryption Standard (DES) is one of the symmetric encryption algorithms which kept the dominant position in the area of data encryption over the last few decades. Nowadays, with a rapid development in the field of computer, the security of DES is too low when encountering the brute-force method for decryption. Therefore, 3DES applies the DES encryption algorithm three times to each data block to strengthen the complexity of the cryptosystem. Nevertheless, due to the meet-in-the-middle attack, it reduces the effective security of the ciphertext. Many studies have shown that most of the existing methods are unreliable in the aspect of security. Accordingly, this study proposes a double encryption using the 3DES and chaotic synchronization to increase the strength of the encryption. A design methodology for Takagi-Sugeno (T-S) fuzzy model-based secure communication in multiple time-delay chaotic (MTDC) systems is presented. The proposed encryption method produces a more secure communications system, while effectively protecting the encrypted message.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Hu C, Jiang H, Teng Z (2011) General impulsive control of chaotic systems based on a TS fuzzy model. Fuzzy Sets Syst 174:66–82
Poddar G, Chakrabarty K, Banerjee S (1998) Control of chaos in DC-DC converters. IEEE Trans. Circuit Syst I 45:672–676
Lin SL, Tung PC (2009) A new method for chaos control in communication systems. Chaos, Solitons Fractals 42:3234–3241
Pecora LM, Carroll TL (1990) Synchronization in chaotic systems. Phys Rev Lett 64:821–824
Mohammadzadeh A, Kaynak O, Teshnehlab M (2014) Two-mode indirect adaptive control approach for the synchronization of uncertain chaotic systems by the use of a hierarchical interval type-2 fuzzy neural network. IEEE Trans Fuzzy Syst 22:1301–1312
Lin TC, Lee TY (2011) Chaos synchronization of uncertain fractional-order chaotic systems with time delay based on adaptive fuzzy sliding mode control. IEEE Trans Fuzzy Syst 19:623–635
Jafari R, Yu W, Li X (2016) Fuzzy differential equations for nonlinear system modeling with bernstein neural networks. IEEE Access 4:9428–9436
Wang W, Gelder PHAJMV, Vrijling JK (2008) The effects of dynamical noises on the identification of chaotic systems: with application to streamflow processes. In: Fourth International Conference on Natural Computation, Jinan, 2008, pp 685–691
Li S, Xu W, Li R (2007) Synchronization of two different chaotic systems with unknown parameters. Phys Lett A 361:98–102
Parlitz U, Kocarev L, Schuster HG (1999) Handbook of chaos control. Wiley–VCH
Coppersmith D, Johnson DB, Matyas SM (1996) A proposed mode for triple-DES encryption. IBM J Res Dev 40:253–262
Mitchell CJ (2016) On the security of 2-key triple DES. IEEE Trans Inf Theory 62:6260–6267
Jun Y, Na L, Jun D (2009) A design and implementation of high-speed 3DES algorithm system. In: Second international conference on future information technology and management engineering, Sanya 2009, pp 175–178
Ren Y et al (2016) Key recovery against 3DES in CPU smart card based on improved correlation power analysis. Tsinghua Sci Technol 21:210–220
Handschuh H, Prenee B (1999) On the security of double and 2-key triple modes of operation. In: Fast software encryption, vol. 1636 of lecture notes in computer science, pp 215–230
Takagi T, Sugeno M (1985) Fuzzy identification of systems and its applications to modeling and control. IEEE Trans Syst Man Cybern 15:116–132
Pan ST (2011) Evolutionary computation on programmable robust IIR filter pole-placement design. IEEE Trans Instrum Meas 60:1469–1479
Wang WJ, Cheng CF (1992) Stabilising controller and observer synthesis for uncertain large-scale systems by the Riccati equation approach. IEE Proc D 139:72–78
Sun YJ (2009) Exponential synchronization between two classes of chaotic systems. Chaos, Solitons Fractals 39:2363–2368
Limanond S, Si J (1998) Neural-network-based control design: an LMI approach. IEEE Trans Neural Netw 9:1422–1429
Gahinet P, Nemirovski A, Laub AJ, Chilali M (1995) LMI control toolbox user’s guide. The MathWorks, Inc
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Hsiao, FH., Lin, PH. (2019). Applying Triple Data Encryption Algorithm to a Chaotic Systems: T-S Fuzzy Model-Based Approach. In: Kim, K., Baek, N. (eds) Information Science and Applications 2018. ICISA 2018. Lecture Notes in Electrical Engineering, vol 514. Springer, Singapore. https://doi.org/10.1007/978-981-13-1056-0_6
Download citation
DOI: https://doi.org/10.1007/978-981-13-1056-0_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1055-3
Online ISBN: 978-981-13-1056-0
eBook Packages: EngineeringEngineering (R0)