Designing an Academic Firewall: Policy, Practice, and Experience with SURF
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
An Empirical Study of Secure MPEG Video Transmissions
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
C-HTTP -- The Development of a Secure, Closed HTTP-based Network on the Internet
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
LoBa128, a Lorenz-based PRNG for wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Short Communication: Breaking network security based on synchronized chaos
Computer Communications
Hi-index | 0.24 |
The term chaos theory is used widely to describe an emerging scientific discipline whose boundaries are not clearly defined. In this paper, we report implementation of encryption of signal in networked environment using synchronized chaos. We utilize this unpredictable, random phenomenon called chaos to code our information using superimposition. We applied this approach to different formats of data and results were positive in the sense that decoded files were run without error. Specifically, we have discussed, in detail, the implementation of such system for off-line as well as on-line applications. We observed that the size of the encrypted file is proportional to the size of the original file and there, infact, exists a linear relationship. The testing scenario encourages use of chaos in information coding across networks. It is shown that, in this environment, the security breach may not be possible even if hacker/intruder has compatible encoder/decoder, and the key is also accessible.