Abstract
In our work, a methodology of systematic design with chaotic masking-based secure communications is presented to implement double encryption. Chaotic synchronization has encountered attacks by hackers in which attackers demodulate information through the public channel, and the safety of chaotic synchronization communication has thus been questioned in recent years. To block the attacks by hackers, this study combines chaotic synchronization with a Twofish encryption algorithm, thereby increasing the complexity of the cryptosystem. By doing so, a more secure communication system is achieved to efficaciously protect the ciphertext. Furthermore, the IGA is proposed in this study to effectively overcome the weakness of the traditional GA. The IGA-based fuzzy controller not only realizes the exponential synchronization, but also minimizes the disturbance attenuation level to achieve optimal H∞ performance. Finally, we give a numerical example to show the achievements of this study.
| Original language | English |
|---|---|
| Pages (from-to) | 1022-1041 |
| Number of pages | 20 |
| Journal | Asian Journal of Control |
| Volume | 24 |
| Issue number | 3 |
| DOIs | |
| State | Published - 05 2022 |
| Externally published | Yes |
Bibliographical note
Publisher Copyright:© 2021 Chinese Automatic Control Society and John Wiley & Sons Australia, Ltd.
Keywords
- Twofish algorithm
- exponential synchronization
- improved genetic algorithm
Fingerprint
Dive into the research topics of 'Chaotic synchronization cryptosystems using a Twofish encryption algorithms'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver