Synchronized choas for network security

  • Authors:
  • Qurban A. Memon

  • Affiliations:
  • Karachi Institute of Information Technology, ST-2, Sector X/VII Gulshan-e-Maymar, Karachi 75340, Pakistan

  • Venue:
  • Computer Communications
  • Year:
  • 2003

Quantified Score

Hi-index 0.24

Visualization

Abstract

The term chaos theory is used widely to describe an emerging scientific discipline whose boundaries are not clearly defined. In this paper, we report implementation of encryption of signal in networked environment using synchronized chaos. We utilize this unpredictable, random phenomenon called chaos to code our information using superimposition. We applied this approach to different formats of data and results were positive in the sense that decoded files were run without error. Specifically, we have discussed, in detail, the implementation of such system for off-line as well as on-line applications. We observed that the size of the encrypted file is proportional to the size of the original file and there, infact, exists a linear relationship. The testing scenario encourages use of chaos in information coding across networks. It is shown that, in this environment, the security breach may not be possible even if hacker/intruder has compatible encoder/decoder, and the key is also accessible.