# 혼돈계의 단방향 동기화를 이용한 보안 프로토콜 설계

• 조창호 (배재대학교 전기공학과) ;
• 임거수 (배재대학교 전기공학과)
• Received : 2014.08.28
• Accepted : 2014.10.17
• Published : 2014.10.31

#### Abstract

The quantity and quality of contents containing information are sharply increasing with the rising network speed. In line with this rapid growth of information volume, a new communication protocol using the chaotic signal that can protect contents in communication is proposed as follows. The chaos system has the characteristic of unpredictability due to the sensitive initial values and the similarity of the signals with noise. We configured two chaos systems $F(X_n,Y_n)$ and $G(A_n,B_n)$ that have such characteristics and designed a data communication method using as encryption channel the same chaos signals generated by synchronizing the chaos system G with the F signals. The proposed method was verified with the encryption and decryption of images. The proposed method is different from the existing encrypted communication methods and is expected to lay the foundation for future studies in related areas.is an example of ABSTRACT format.

#### References

1. C.-S. Lee, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no, 4, 2012. pp. 797-780.
2. C.-K. Lee and W.-Y. Jeong, "A Study on Authentication Algorithm for NFC Security Channel," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no, 4, 2012. pp. 805-810.
3. S.-J. Park and J.-H. Park, "Current Status and Analysis of Domestic Security Monitoring Systems," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 2, 2014. pp. 261-266. https://doi.org/10.13067/JKIECS.2014.9.2.261
4. F. C. M. Lau and C. K. Tse, Chaos-Based Digital Communication Systems. Berlin: Springer, 2003.
5. H. Zhang, D, Liu, and Z, Wang, Controlling Chaos. London: Springer, 2009.
6. L. Kocarev and S. Lian, Chaos-Based Cryptography. Berlin: Springer, 2011.
7. G.-S. Yim and H.-S. Kim, "Chaos-based Image Encryption Scheme using Noise-induced Synchronization," J. of the Korea Society of Computer and Information, vol. 13, no. 5, 2008, pp. 155-162.
8. G.-S. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameters Chaotic System," Korea Information Assurance Society, vol. 8. no. 3, 2008, pp. 57-64.
9. H.-S. Kim and G.-S. Yim, "Design of a digital photo frame for close-range security using the chaotic signals synchronization," J. of the Korea Society of Computer and Information, vol. 16, no. 2, 2011, pp. 201-206. https://doi.org/10.9708/jksci.2011.16.2.201
10. H. G. Schuster, Deterministic Chaos an Introduction. 2nd, Weinheim: VCH, 1988.
11. G. P. Williams, Chaos Theory Tamed. London: Taylor & Francis, 1997.
12. E. Ott, Chaos in dynamical systems. New York: Cambridge University Press, 1993.
13. G. L. Baker and J. P. Gollub, Chaotic Dynamics 2nd. New York: Cambridge University Press, 1996.
14. A. H. Nayfeh and B. Balachandran, Applied Nonlinear Dynamics. Toronto: Wiley-Interscience, 1995.
15. J. C. Yen and J. I. Guo "A new chaotic key-based design for image encryption and decryption," The 2000 IEEE Int. Symp. on Circuits and Systems, Geneva, Switzerland, May 2000, pp. 49-52.
16. H. E. Ahmed, H. M. Kalash, and O. S. Farag Allah, "An Efficient Chaos-Based Feedbacks Stream Cipher for Image Encryption and Decryption," Information, vol. 31, 2007. pp. 121-129.
17. F. Fu, Z. Zhang, Y. Chen, and X. Wang, "An Improved Chaos-Based Image Encryption Scheme," Int. Conf. on Computer Science 2007, Beijing, China, June 2007, pp. 575-582.