INTELLIGENT SOFT COMPUTING BASED CRYPTOGRAPHIC TECHNIQUE USING CHAOS SYNCHRONIZATION FOR WIRELESS COMMUNICATION (CSCT)

Arindam Sarkar1 and J. K. Mandal2 Department of Computer Science & Engineering, University of Kalyani, W.B, India 



ABSTRACT 

In this paper a novel intelligent soft computing based cryptographic technique based on synchronization of two chaotic systems (CSCT) between sender and receiver has been proposed to generate session key using Pecora and Caroll (PC) method. Chaotic system has some unique features like sensitive to initial conditions, topologically mixing; and dense periodic orbits. By nature, the Lorenz system is very sensitive to initial conditions meaning that the error between attacker and receiver is going to grow exponentially if there is a very slight difference between their initial conditions. All these features make chaotic system as good alternatives for session key generation. In the proposed CSCT few parameters ( σ, b , r , x1 ,y2 and z2 ) are being exchanged between sender and receiver. Some of the parameter which takes major roles to form the session key does not get transmitted via public channel, sender keeps these parameters secret. This way of handling parameter passing mechanism prevents any kind of attacks during exchange of parameters like sniffing, spoofing or phishing. 

KEYWORDS 

chaos synchronization, soft computing, cryptography, Wireless Communication. 

Comments

Popular posts from this blog

**** Registration is currently open **** -- 5th International Conference on Big Data & IoT (BDIoT 2024)

Call For Papers..!! -- 16th International Conference On Wireless & Mobile Network (WiMo 2024)

Welcome to NLPD 2025!! 6th International Conference on NLP & Big Data (NLPD 2025)