Hugo Solis-Sanchez Elena Gabriela Barrantes Universidad de

Transcription

Hugo Solis-Sanchez Elena Gabriela Barrantes Universidad de
Using Coupled Maps from
the Nature for PKC
Hugo Solis-Sanchez
Elena Gabriela Barrantes
Universidad de Costa Rica
Coupled Maps
Coupled Maps
Populations
Chemical Reactions
Bio-Systems
Oscillations
VOLUME 90, N UMBER 4
PHYSICA L R EVIEW LET T ERS
week ending
31 JANUARY 2003
Using Distributed Nonlinear Dynamics for Public Key Encryption
Roy Tenny,1,2 Lev S. Tsimring,1 Larry Larson,2 and Henry D. I. Abarbanel1,3
1
Institute for Nonlinear Science, University of California, San Diego, La Jolla, California 92093-0402
Department of Electrical and Computer Engineering, University of California, San Diego, La Jolla, California 92093-0354
3
• The equations
wereofused
in simulationUniversity
of DDE. of California,
Department of Physics and Marine Physical Laboratory
(Scripps below
Institution
Oceanography),
San Diego, La Jolla, California 92093-0402
• The
simulation
system
we present
(Received 15 May
2002;
published
28 January
2003)intent to demonstrate encoding decoding and give a genera
can be implemented. In the future we plan to optimize and increase the dimension of the D
We introduce a new method for asymmetric
key/private
key)and
encryption
exploiting properties
order(public
to enhance
efficiency
security.
of nonlinear dynamical systems. A high-dimensional dissipative nonlinear dynamical system is
Chaos-Based Communication
and Encryption
213
distributed between transmitter and receiver, so we call the method distributed dynamics encryption
(DDE). The transmitter dynamics is public, and the receiver
dynamics: is hidden. A message is encoded
Transmitter
by modulation of parameters of the transmitter, and this results in a shift of the overall
system
attractor.
Ø
Ø
Ø
Ø
Ø
Ø
An unauthorized receiver does not know the hidden dynamics
in the receiver
decode
theØ
temp
= 2.4and
· t0cannot
[n] ° 1.3
· Øsr [n]
message. We present an example of DDE using a coupled map
lattice.
t0 [n +
1]
= °0.6 · temp ° 0.07 · t21 [n] ° 0.5 · s2r [n] + 1
t1 [n + 1]
= °0.1 · temp ° 0.8 · t21 [n] ° 0.1 · t22 [n] + 1
DOI: 10.1103/PhysRevLett.90.047903
PACS
numbers:
05.45.Ra
2
2
2
2
t2 [n + 1]
= 05.45.Vx,
°0.07 · t05.45.Gg,
1 [n] ° 0.6 · t2 [n] ° 0.07 · t3 [n] + 0.5 · sr [n] + 1
t3 [n + 1]
= °0.1 · t22 [n] ° 0.8 · t23 [n] ° 0.1 · t24 [n] + 1
t4 [n + 1]
= °0.07 · t23 [n] ° 0.6 · t24 [n] ° 0.07 · t25 [n] ° 0.5 · x2 [n] + 1
plex timplementations
wherein
inherent
During the last decade there has been a great interest in
= °0.1
· t24 [n]the
° 0.8
· t25 [n] °security
0.1 · t26 [n]can
+1
5 [n + 1]
be strengthened
as=one
wishes.
developing secure communication schemes utilizing
t6 [n + 1]
°0.07
· t25 [n] ° 0.6 · t26 [n] ° 0.07 · t27 [n] + 0.5 · x2 [n] + 1
The
distributed
dynamics
encryption
chaos. Most of the proposed schemes are based on chaos
t7 [nbasic
+ 1] idea =of°0.1
· t26 [n] ° 0.8
· t27 [n] ° 0.1
· t28 [n] + 1
2
2
(DDE)
dynamical
D2 !
synchronization [1], controlling chaos [2], and chaotic
t8 [nis+to1]split a=
°0.07 · t27 system
[n] ° 0.6of· tdimension
8 [n] ° 0.07 · t9T[n] ° 0.5 · x [n] + 1
2 $
shift keying [3]. Also, chaos based block ciphers were
DR into
DT· t28transmitter
variables
t9 [n two
+ 1] parts=with
°0.1
[n] ° 0.8 · t29 [n]
° 0.1 · tt"n#
+1
1 0 [n]
2
2
2
2
t10.[n
=
°0.07
·
t
[n]
°
0.6
·
t
0
[n]
°
0.07
·
t
studied in [4]. In conventional cryptography, all encryp%t1 "n#;
. .+
; t1]
"n#&,
and
D
receiver
variables
r"n#
$
1
DT
R 9
11 [n] + 0.5 · sr [n] + 1
2
t11 [n
°0.07
· t210 [n]
° 0.8 · tthe
+ 1 signal
tion schemes are divided into symmetric and asymmetric
%r1 "n#;
. . .+; r1]DR "n#&.=The
receiver
receives
scalar
11 [n]
2
7 Security of
methods [5]. Symmetric methods require sharing of the
st "n# from the transmitter, and the transmitter receives
Receiver
:
same key by both transmitter for message encryption and
the scalar
signal
sr "n# from the receiver. At each discrete
receiver for message decryption. Asymmetric methods
time n $ 1; 2; . . . , these satisfy
r0 [n + 1]
= °0.8 · r02 [n] ° 0.1 · r12 [n] + 1
have one ‘‘public’’ key known to all users for encoding
r1 [n + 1]
= 0.01 · s2t [n] ° 0.07 · r02 [n] ° 0.6 · r12 [n] + 1
messages, but another ‘‘private’’ key for use by trusted
t"n ! 1# $ FT !t"n#;
sr "n#; m"n#";
(1)
receivers for decoding the message. Decoding the mesCoupling signals
: 1# $ FR !r"n#; st "n#";
r"n
!
sage using the public key which was used to encrypt the
g. 7.15. Public and private keys
of DDE.
Private
key: FRunfeasible.
(•),GR (•),r(n).
Ø
P11 Ø
message
is made
computationally
Communi-Public
st [n]
= °0.2 · i=0 Øti [n]Ø + 1 + m · A
cationsonly
strategies
that use asymmetric
public[2].
key)
"n# $ GT !t"n#"
and sr "n#+$
G !r"n#" are signals
where sst[n]
y: FT (•),GT (•),sr (n),st (n). Known
to transmitter:
t(n),m.(orFrom
= °0.8 · r02 [n]
1; R
r
methods for encryption have much greater inherent setransmitted from the transmitter to the receiver and back,
curity than symmetric
eliminateisthemodurespectively. Here FT "'# is a DT dimensional vector field,
Fig.methods
7.16.since
A they
message
problem of key management, which itself can pose the
FR "'# is DR dimensional, GR "'# and GT "'# are scalars,
lated
by
altering
the
parameters
of m"n# is the message. Of these quantities FT "'# and
most serious security risk. However, in the application of
and
thedynamics
transmitter
which
results inGaT "'# are public, while m"n#; FR "'#, and GR "'# are priideas from nonlinear
to secure
communica-
Our Prototype
Encrypt
Decrypt
Attack
Coupled Map
PHYSICA
ELSEVIER
Physica A 245 (1997) 446-452
Bifurcation scenarios and quasiperiodicity
in coupled maps
K.E. Kiirten, G. NicolislPhysica A 245 (1997) 446-452
44
Karl E. K/irten a,,, Gr6goire Nicolis b
Institutfiir Experimentalphysik,
Universitdt
0.49
I
i
I Wien,I AustriaI
I
b Center .[or Nonlinear Phenomena and Complex Systems, UniversitO Libre de Bruxelles, Belgium
a
0.48
Received 8 April 1997
0.47
Abstract
0 -~"
i
r
l
l
l
l
l
l
0.9."
0.91
~
0.46
The appearance of coherent structures in a model of two coupled logistic maps is studied. Ana- 0.~
0.45 attractors and transitions from periodic to quasiperiodic
lytical results for the existence of multiple
motion are presented. The theoretical prediction for the Hopf radius agrees well with computer 3.8g
0.44 region.
experiment throughout the quasiperiodic
Keywords: Coupled map lattices; Bifurcations;
Quasiperiodicity; Chaos
0.43
1. Introduction
3.88
0.42
).87
0.41
0.86
I
f
I
I
I
I
0.4
0.85
I
In recent years, coupled maps have
extensively
as a privileged
0.84been
0.84studied
0.85 0.85
0.86 0.86
0.87 0.87 model
0.36
for understanding the onset o f complex behaviour in spatially extended systems. On
I
I
0.4
0.44
I
I
0.46
I
I
0.52
I
0.56
Results
100000000#
Log10(Number-of-States)-
10000000#
1000000#
100000#
10000#
0#
2#
4#
6#
8#
Dimensions-
10#
12#
14#
Figure$1.$Data$Transmi7on$using$tradi7onal$map$
1"
0.9"
0.8"
0.7"
Bit$
0.6"
0.5"
0"n=50"
0.4"
0.3"
0.2"
0.1"
0"
1" 2" 3" 4" 5" 6" 7" 8" 9" 10"11"12"13"14"15"16"17"18"19"20"21"22"23"24"25"26"27"28"29"30"31"32"33"34"35"36"37"38"39"40"41"42"43"44"45"46"47"48"49"50"
Sequence$Number$
Figure$1.$Data$Transmi7on$using$tradi7onal$map$
1"
0.9"
0.8"
0.7"
Bit$
0.6"
0.5"
0"n=50"
1"n=50"
0.4"
0.3"
0.2"
0.1"
0"
1" 2" 3" 4" 5" 6" 7" 8" 9" 10"11"12"13"14"15"16"17"18"19"20"21"22"23"24"25"26"27"28"29"30"31"32"33"34"35"36"37"38"39"40"41"42"43"44"45"46"47"48"49"50"
Sequence$Number$
Figure$2.$Data$transmi6on$using$quasi$periodic$map$
1"
0.9"
0.8"
0.7"
Bit$
0.6"
0.5"
0"n=50"
0.4"
0.3"
0.2"
0.1"
0"
1" 2" 3" 4" 5" 6" 7" 8" 9" 10"11"12"13"14"15"16"17"18"19"20"21"22"23"24"25"26"27"28"29"30"31"32"33"34"35"36"37"38"39"40"41"42"43"44"45"46"47"48"49"50"
Sequence$Number$
Figure$2.$Data$transmi6on$using$quasi$periodic$map$
1"
0.9"
0.8"
0.7"
Bit$
0.6"
0.5"
0"n=50"
1"n=50"
0.4"
0.3"
0.2"
0.1"
0"
1" 2" 3" 4" 5" 6" 7" 8" 9" 10"11"12"13"14"15"16"17"18"19"20"21"22"23"24"25"26"27"28"29"30"31"32"33"34"35"36"37"38"39"40"41"42"43"44"45"46"47"48"49"50"
Sequence$Number$
Future Work

Similar documents