Discrete time-based chua chaotic generator
نویسندگان
چکیده
منابع مشابه
Secure Image Encryption Based On a Chua Chaotic Noise Generator
This paper presents a secure image cryptography telecom system based on a Chua's circuit chaotic noise generator. A chaotic system based on synchronised Master–Slave Chua's circuits has been used as a chaotic true random number generator (CTRNG). Chaotic systems present unpredictable and complex behaviour. This characteristic, together with the dependence on the initial conditions as well as th...
متن کاملChaotic Signal Generator Design Based on Discrete System
A novel design method of chaotic signal generator based on digital signal processing for three-dimension system is presented in this paper. We illustrate the structure and function of each module in this system. By comparing the experimental results with the simulation results, the feasibility of this method is verified. The proposed chaotic signal generator can offer a new alternative in rando...
متن کاملSynchronization of Unsmooth Chua Chaotic Circuits Based on Numerical Optimization
Abstract In the field of secure communication, chaos and its synchronization are the key problems. In this paper, we focus on designing an efficient synchronization controller to synchronize two Chua’s chaotic circuits with nonsmooth nonlinear term x|x|. A master-slave synchronization controller based on master-slave scheme is designed for the underlying Chua’s circuits. Based on this scheme, s...
متن کاملZigzag map: A variability-aware discrete-time chaotic-map truly random number generator
In this letter, we present a circuit implementation for the discrete-time zigzag map, which exhibits high speed, low power consumption, and above all resilience to process variations. Circuit parameter variations result in alteration of the chaotic map parameters, such as the slope and the location of the breakpoints in the map, which in turn degrade the randomness of the generated bit sequence...
متن کاملCryptanalysis of Observer Based Discrete-Time Chaotic Encryption Schemes
This paper investigates the weaknesses of cryptosystems that use observer based synchronized chaotic systems. It is shown that known plaintext and chosen plaintext attacks can successfully be launched against such cryptosystems to recover the system parameters and subsequently eavesdrop on the message transmission. The methods employed rely only on the basic mathematical relations that exist be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Engineering Science and Military Technologies
سال: 2019
ISSN: 2357-0946
DOI: 10.21608/ejmtc.2019.11434.1111