Skip to main navigation Skip to search Skip to main content

Chaotic synchronization cryptosystems using a Twofish encryption algorithms

  • Feng Hsiag Hsiao*
  • *Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

1 Scopus citations

Abstract

In our work, a methodology of systematic design with chaotic masking-based secure communications is presented to implement double encryption. Chaotic synchronization has encountered attacks by hackers in which attackers demodulate information through the public channel, and the safety of chaotic synchronization communication has thus been questioned in recent years. To block the attacks by hackers, this study combines chaotic synchronization with a Twofish encryption algorithm, thereby increasing the complexity of the cryptosystem. By doing so, a more secure communication system is achieved to efficaciously protect the ciphertext. Furthermore, the IGA is proposed in this study to effectively overcome the weakness of the traditional GA. The IGA-based fuzzy controller not only realizes the exponential synchronization, but also minimizes the disturbance attenuation level to achieve optimal H performance. Finally, we give a numerical example to show the achievements of this study.

Original languageEnglish
Pages (from-to)1022-1041
Number of pages20
JournalAsian Journal of Control
Volume24
Issue number3
DOIs
StatePublished - 05 2022
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2021 Chinese Automatic Control Society and John Wiley & Sons Australia, Ltd.

Keywords

  • Twofish algorithm
  • exponential synchronization
  • improved genetic algorithm

Fingerprint

Dive into the research topics of 'Chaotic synchronization cryptosystems using a Twofish encryption algorithms'. Together they form a unique fingerprint.

Cite this