6 results on '"Cruz-Hernández, C."'
Search Results
2. Encrypter Information Software Using Chaotic Generators
- Author
-
Cardoza-Avendaño L., López-Gutiérrez R.M., Inzunza-González E., Cruz-Hernández C., García-Guerrero E., Spirin V., and Serrano H.
- Subjects
cryptography ,software ,chaotic attractors ,Computer Science::Software Engineering - Abstract
This document shows a software that shows different chaotic generator, as continuous as discrete time. The software gives the option for obtain the different signals, using different parameters and initial condition value. The program shows then critical parameter for each model. All theses models are capable of encrypter information, this software show it too., {"references":["L.M... Pechora and T.L. Carroll, \"Synchronization in chaotic\nsystems,\"Phys. Rev. Lett. 64, 821-824 (1990).","L. M. Pecora and T. L. Carroll, \"Circuit implementation of\nsynchronizedchaos with applications to communications,\" Phys. Rev. A\n44, (1991).","Special Issue on Chaos synchronization and control: Theory and\napplications IEEE Trans. Circuits Syst. I, 44, (1997).","Special Issue on Control and synchronization of chaos, Int. J. Bifurc.\nChaos, 10, (2000).","C. Cruz-Hern├índez and H. Nijmeijer, \"Synchronization through\nfiltering,\" Int. J. Bifurc. Chaos, 10, 763-775 (2000). Synchronization\nthrough extended Kalman filtering. In: Nijmeijer H, Fossen TI, editors.\nNew trends in nonlinear observer design. Lecture notes in control and\ninformation sciences, 244 London: Springer; 469-490, (1999).","H. Sira-Ram├¡rez and C. Cruz-Hern├índez, \"Synchronization of\nchaotic systems: a generalized Hamiltonian systems approach,\" Int. J.\nBifurc. Chaos, 11, 1381-1395 (2001). And in: Proceedings of the\nAmerican Control Conference, Chicago, USA, 769-773 (2000).","D. L├│pez-Mancilla and C. Cruz-Hern├índez, \"Output synchronization\nof chaotic systems: model-matching approach with application to secure\ncommunication,\" Nonlinear Dynamics and Systems Theory, 5, 141-15\n(2005).","U. Feldmann, M. Hasler and W. Schwarz, \"Communication by\nchaotic signals: the inverse system approach,\" Int. J. Circuits Theory and\nApplications, 24, 551-579 (1996).","H. Nijmeijer and I. M. Y. Mareels, \"An observer looks\natsynchronization,\" IEEE Trans. Circuits Syst. I, 44, 882-890 (1997).\n[10] Lorenz, E. N. , \"Deterministic nonperiodic flow\". J. Atmos. Sci. 20: 130-\n141. doi:10.1175/1520-0469(1963)0202.0.CO;2., (1963).\n[11] Matsumoto, Takashi , \"A Chaotic Attractor from Chua's Circuit\". IEEE\nTransactions on Circuits and Systems (IEEE) CAS-31 (12): 1055-1058.\n(1984).\n[12] Madan, Rabinder N., \"Chua's circuit: a paradigm for chaos\". River\nEdge, N.J.: World Scientific Publishing Company. ISBN 9810213662,\n(1993).\n[13] O. E. Rössler, \"An Equation for Continuous Chaos\".\nPhysics Letters 57A (5): 397-398M., (1976).\n[14] Hénon, \"A two-dimensional mapping with a strange attractor\".\nCommunications in Mathematical Physics 50: 69-77.\ndoi:10.1007/BF01608556, (1976).\n[15] Eric W. Weisstein, Logistic Equation at MathWorld.\n[16] R.M. May, \"Simple mathematical models with very complicated\ndynamics\". Nature 261: 459. doi:10.1038/261459a0, 1976"]}
- Published
- 2009
- Full Text
- View/download PDF
3. Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller.
- Author
-
Murillo-Escobar, M.A., Cruz-Hernández, C., Abundiz-Pérez, F., and López-Gutiérrez, R.M.
- Subjects
- *
EMBEDDED computer systems , *MICROCONTROLLERS , *ENCRYPTION protocols , *DATA security , *CRYPTOGRAPHY - Abstract
Currently, several embedded applications in military, industry, banking transference, e-commerce, biometric systems and others use insecure communication channels such as Internet to transmit or store confidential information. Therefore, the integrity and security of information are an important issue in continuous research. In last years, chaotic systems have been proposed in cryptography due they have several properties related with cryptography properties such as extreme sensibility on initial conditions with confusion and ergodicity with diffusion. In this paper, we present a 32-bit microcontroller implementation of an improved text encryption algorithm (based on Murillo-Escobar’s algorithm [13]) for real-time embedded systems and we present a complete security analysis such as key size analysis, key sensitivity, plain text sensitivity, floating frequency, histograms, N-grams, autocorrelation, information entropy, robustness against classic attacks, randomness analysis, and security characteristics. In addition, the digital implementation and performance are analyzed such as programming details, memory required, frequency system, implementation costs and encryption time. In contrast with recent approaches presented in literature, we present a complete security analysis in both statistical and implementation level, to justify the proposed scheme in a real application. Based in the results, the proposed embedded text encryption system is secure, effective and at low cost, and it could be implemented in real-time cryptosystem based on microcontroller. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
4. A robust embedded biometric authentication system based on fingerprint and chaotic encryption.
- Author
-
Murillo-Escobar, M.A., Cruz-Hernández, C., Abundiz-Pérez, F., and López-Gutiérrez, R.M.
- Subjects
- *
ROBUST control , *BIOMETRIC identification , *HUMAN fingerprints , *DATA encryption , *CRYPTOGRAPHY , *MICROCONTROLLERS - Abstract
Fingerprint recognition is a reliable solution in user authentication systems. Nevertheless, the security and secrecy of the users data are a concern in today’s biometric systems and most of the security attention is focused in biometric template protection to avoid identity theft. In recent years, several approaches have been presented where the main objective is to have the biometric revocable, but almost all them have failed in verify their security and robustness. In last years, chaotic systems have been proposed in cryptography due they have several properties related with cryptography properties such as extreme sensibility on initial conditions with confusion and ergodicity with diffusion. In this paper, we present a novel fingerprint template protection scheme based on chaotic encryption by using the logistic map and Murillo-Escobar’s algorithm (Murillo-Escobar et al., 2014). In addition, we present a novel implementation of our scheme in a 32 bit microcontroller for secure authentication systems to show its application on embedded expert systems. In contrast with recent approaches presented in literature, we present a complete security analysis in both statistical and implementation level, to justify the proposed scheme in a real application. Based in the results, the proposed embedded authentication system is secure, effective and at low cost, and it could be implemented on real secure access control systems. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
5. Multibiosignal chaotic encryption scheme based on spread spectrum and global diffusion process for e-health.
- Author
-
Murillo-Escobar, M.A., Cruz-Hernández, C., Cardoza-Avendaño, L., Murillo-Escobar, D., and López-Gutiérrez, R.M.
- Subjects
IMAGE encryption ,BODY area networks ,DATA warehousing ,BLOOD pressure - Abstract
E-health provides several remote health services highly convenient for patients. Nevertheless, inherent security risks are present in e-health such as data privacy since insecure communication channels are used to transmit data between patients and physicians or to cloud medical data storage. Nowadays, medical body area network provides a solution to continuous health monitoring with real-time updates of multibiosignal records in multiuser communication schemes for monitoring and early detection of medical conditions or diseases. In this paper, we propose to use chaos-based sequence direct spread spectrum technology and chaos-based cryptography to provide data privacy, high security and efficiency in monitoring multibiosignals in multiuser networks for e-health applications. First, each plain biosignal is modulated with sequence direct spread spectrum by using the chaotic Hénon map. Then, all modulated biosignals are summed to produce the modulated cryptogram. The modulated cryptogram is finally encrypted by using global diffusion process with the chaotic Hénon map to increase security by reducing the high autocorrelation of the modulated cryptogram. The experimental results are presented in a simulated multiuser scenario with 4 users (or patients) and 2 specialists (neurologist and cardiologist), with 12 biosignals acquired from database on the Internet, such as electroencephalograms, electromyograms, blood pressure signals, and electrocardiograms. A comprehensive security study is presented to show the high security, the high speed encryption, and the high noise interference robustness. According with the results, the proposed method can be used for secure multibiosignal monitoring in multiuser networks for e-health applications with high efficiency and security. [Display omitted] • Encryption algorithm based on spread spectrum with chaotic diffusion is proposed. • Multibiosignals are encrypted together in a multiuser network for e-health. • One round of global chaotic diffusion process increases considerably the security. • Four patients transmit twelve biosignals securely to two specialists. • High security and efficiency are achieved in simulation results. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
6. Secure access microcontroller system based on fingerprint template with hyperchaotic encryption.
- Author
-
Murillo-Escobar, M.A., López-Gutiérrez, R.M., Cruz-Hernández, C., Espinoza-Peralta, E.E., and Murillo-Escobar, D.
- Subjects
- *
IMAGE encryption , *MICROCONTROLLERS , *BIOMETRIC identification , *IDENTITY theft , *ACCESS control , *CYBERNETICS , *MEDICAL offices - Abstract
Authentication systems based on biometric and microcontroller systems are used around the world to control the access of users in restricted sites such as in offices, banks, or hospitals. Moderns authentication systems use cloud connectivity using the Internet. Nevertheless, biometric data are considered confidential, which is susceptible to hacker attacks with the aim of fraud, extortion or identity theft. In this work, we propose a low-cost secure control access microcontroller system that uses the Secure Hash Algorithm 1 (SHA-1) and hyperchaotic encryption of fingerprint template to increase the security against cybernetic attacks. The main findings can be briefly described as (1) chaotic encryption of the fingerprint template provides strong security by using the hyperchaotic 2D Lotka–Volterra map with just one round of diffusion–confusion; (2) the fingerprint template injected to SHA-1 increases the robustness against differential attack by combining a unique 160-bit hash key with the personal key; (3) the authentication system implemented in a low-cost embedded system based on 32-bit microcontroller provides high security at low cost; (4) several security analysis of data generated in the embedded authentication system validates the effectiveness of proposed scheme. Based on the high security level achieved in proposed authentication scheme, the system provides double padlock in secure access biometric systems providing robustness against malicious attacks, avoid identity theft and the unauthorized access in highly restricted areas. • Novel hyperchaotic-based encryption algorithm is proposed for fingerprint template privacy. • The SHA-1 algorithm is used to provide extreme sensitivity at fingerprint template. • A low-cost secure embedded system for control access using fingerprint encryption is presented. • Several security analyses with fingerprint data and cryptograms generated in embedded system are considered. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.