PartialGeneralizedSynchronizationTheoremofDifferentialandDiscreteSystemswithApplicationsinEncryptionScheme.doc_第1頁(yè)
PartialGeneralizedSynchronizationTheoremofDifferentialandDiscreteSystemswithApplicationsinEncryptionScheme.doc_第2頁(yè)
PartialGeneralizedSynchronizationTheoremofDifferentialandDiscreteSystemswithApplicationsinEncryptionScheme.doc_第3頁(yè)
PartialGeneralizedSynchronizationTheoremofDifferentialandDiscreteSystemswithApplicationsinEncryptionScheme.doc_第4頁(yè)
PartialGeneralizedSynchronizationTheoremofDifferentialandDiscreteSystemswithApplicationsinEncryptionScheme.doc_第5頁(yè)
已閱讀5頁(yè),還剩8頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

精品論文大全partial generalized synchronization theorem of differential and discrete systems with applications in encryption scheme jianyi jing1,2 , lequan min1,2, , geng zhao31 applied science school, university of science and technology beijing, 100083,2 information and engineer school, university of science and technology beijing, 100083,3 beijing electric science and technology institute, beijing 100079jingjianyijaabstractthis paper presents two theorems for designing controller to make two independent (chaotic) differential equation systems or two inde- pendent (chaotic) discrete systems realize directional partial general- ized synchronization (pgs). two numerical simulation examples are given to illustrate the effectiveness of the proposed theorems. a non- symmetric encryption scheme is introduced based on the theorems. it can be expected that our theorems provide new tools for under- standing and studying pgs phenomena and information encryption.keywords: partial generalized synchronization; differential equa- tion systems, discrete systems, chaos-based encrytion scheme1 introductionsince the last decades, the research of chaos has got much attention (1- 12. one of the reasons for this is that synchronization can be found in many physical, biological and engineering systems.the idea of generalized synchronization (gs) was also gradually developed(13supported by the national nature science foundation of china (nos.70271068, 60674059), the opening re- search fund for the key lab of information security and secrecy at the beijing electronic science and technology institute (no.kykf200605). corresponding author- 1 -16), i.e., all state trajectories of the driven system synchronize with the driving system via a transformation.the researches on gs may provide new tools for constructing secure communication systems(15, 16-22).partial synchronization (ps) is defined as the situation where part of state tra- jectories of synchronized systems mutually asymptotically converge as time goes to infinity. recently, the researches on ps in network have received attention(11,12, 23,24).in this paper, firstly, a new theorem on pgs for differential equation systems is presented. secondly, a constructive theorem to pgs for two discrete systems is established. based on the two theorems, we can design controllers such that two indenpendent systems are in pgs with respect to a prescribed transformer. as a example, the duffing chaotic system can be in pgs with the lorenz chaotic system via designing a controller. as a second example, the discrete lorenz three- dimensional chaotic map can be in pgs with the discrete burgers map. thirdly, a chaos encryption scheme based on our theorems is introduced.2. pgs theorem of differential equation systemsgiven two independent chaotic systems, one is used as the driving system and an- other as the driven system. the goal of partial generalized synchronization is to design an appropriate controller u for the driven system, such that part state vari- ables of the controlled system can be in gs with the driving system.definition 1 (4, 13) consider two systems- 13 -x = f (x ), y= g(y, x ) (1.1)wherex rn , y rm , f (x ) = (f1(x ), f2(x ), , fn (x )t rn , g(y, x ) = (g1(y, x ), g2(y, x ), , gm(y, x ) rm.if there exists a transformation h : rn rm , and a subset b = bx by rn rmsuch that all trajectories of (1.1) with initial conditions in b satisfieslimt+kh (x ) y k = 0.then the systems in (1.1) are said to be in gs with respect to the transformationh .definition 2 consider two independent systemsx = f (x ) (1.2)精品論文大全y k gk (y )wherey =y mk=gmk(y )(1.3)x = (x1 , x2, . . . , xn )t rn , y = (y1, y2, . . . , ym)t rm, y k = (y1, y2, . . . , yk )t rk ,y mk = (yk+1, yk+2, . . . , ym)t rmk ,f (x ) = (f1(x ), f2 (x ), . . . , fn(x )t , gk (y ) = (g1(y ), g2(y ), . . . , gk (y )t ,gmk (y ) = (gk+1(y ), gk+2(y ), . . . , gm(y )t .if there exists a controller umk (x, y ) = (uk+1(x, y ),uk+2(x, y), . . . , um(x, y )t such that y k in the controlled systemy k gk (y )y =y mk=gmk(y ) + umk(1.4)and x in system (1.2) are in gs with respect to a transformation l : rn rk ,that is,limt+kl(x ) y k k = 0.then the systems (1.2) and (1.4) are said to be in pgs with respect to the trans- formation y k = l(x ).theorem 1 let two independent differential (chaotic) system be defined by eqution(1.2) and (1.3), and l : rn rk be a transformation given byl(x ) = (l1 (x ), l2(x ), , lk (x)t = y ksuppose that the function qi(xe , ye ), (i = 1, 2) ensures that the zero solution of the following error equation (1.5) is zero solution asymptotically stable with respect to e = ye xee = qi (xe , ye ) (1.5)if vector y mk can be solved from the equation li gk (y k , y mk ) xjf (x ) = q1 (l(x ), y k ) (1.6)knvia function y mk = m (x, y k ) = (m1(x, y k ),m2(x, y k ), . . . , mmk (x, y k )t . then we can design a controller umk viadm (x, y k )umk (x, y ) =dt+q2 (m (x, y k ), y mk )gmk (y ). (1.7)wheredm (x, y k ) =dt m1m1 m1m1 x1xny1yk mmkmkmkmkx1mn xmy1m k y f (x ) !,gk (y )such that (1.2) and (1.4) are in pgs with respect to y k = l(x ).proof: to be submitted elsewhere.3. pgs theorem of discrete systemsdefinition 3 letx (i + 1) = f (x (i), (1.8)y (i + 1) = yk (i + 1)ymk (i + 1)i = 1, 2, gk (y (i)=gmk (y (i)(1.9)be two discrete systems, wherex rn , y rm , yk rk , ymk rmk .if there exists a transform l : rn rk , k m, such thatlimi+kl(x (i) y k (i)k = 0.then the systems (1.8) and (1.9) are said to be in pgs with respect to the transformy k (i) = l(x (i)theorem 2 given two discrete systems defined by (1.8) and (1.9). let l : rn rkbe a transformation given byl(x ) = (l1 (x ), l2(x ), , lk (x)t = y ksuppose that the function qj (xe (i), ye (i), (j = 1, 2) ensures that the zero solution of the following error equation (1.10) is zero solution asymptotically stable with respect to e(i + 1) = ye (i + 1) xe (i + 1)e(i + 1) = qj (xe (i), ye (i), j = 1, 2. (1.10) if vector y mk (i) can be solved from the equationgk (y k (i), y mk (i) l(f (x (i) = q1 (l(x (i), y k (i) (1.11)via functiony mk (i) = m (x (i), y k (i)= (m1 (x (i), y k (i), m2(x (i), y k (i), . . . , mmk (x (i), y k (i)t .then we can design a controller umk (i) viaumk (i) = m (f (x (i), gk (y (i)+q2(y mk (i), m (x (i), y k (i)gmk (y (i)= (uk+1(i), uk+2(i), , um(i)tsuch that the systems (1.12) and (1.13)x (i + 1) = f (x (i), (1.12)y (i + 1) = yk (i + 1)ymk (i + 1) gk (y (i)=gmk (y (i) + umk (i)(1.13)are in pgs with respect to y k (i + 1) = l(x (i + 1).proof: to be submitted elsewhere.4. numerical simulation4.1 example for theorem 1let two differential chaotic systems be the lorenz system (as driving system)x 1 = x1 + x2x 2 = x1 x2 x1 x3x 3 = x1 x2 x3(1.14)精品論文大全where = 10, = 28, =8, and the duffing system3y1 = y4 y2 = y33 2y = y1 y4 = y4 + y1 y3 + y2(1.15)where = 0.25, = 0.2. if initial conditions of systems (1.14) and (1.15) is selected as (3.3432, 1.9873, 3.5872)t and (1.8641, 25.9282, 13.1516, 4.0240)t , then the systems (1.14) and (1.15) are chaotic. figure 1 shows their chaotic trajectories. we choose qi(xe , ye ) = xe ye (i = 1, 2), i,eq1 (l(x ), y k ) = l(x ) y kq2 (m (x, yk ), y mk ) = m (x, yk ) y mkwe want systems (1.14) and (1.15) be in pgs via the transformation:l(x ) = (l1(x ), l2 (x )wherel1(x ) = k11 x1 + k12x2 + k13 x3 + b1l2(x ) = arctan x2 .where k11 = 2, k12 = 3, k13 = 4, b1 = 5. then from the new theorem, we can getu42 (x, y ) = (u1(x, y ), u2(x, y ),whereu3=3x k1i (xi + 2x i + xi) + b1i=112y4 y1 (y4 + y1 y3 + y2)u4 = arctan x2 +2x 2 + x221 + x22x2 x 222(1 + x2 )22y3 y2 (y2).where x i, xi , (i = 1, 2, 3) can be obtained from system(1.14). the result of pgs of variables x and y 2 are shown in figure 2. the errors go to zero. the numerical simulation verify our theoretical analysis.4.2 example for theorem 2let two discrete chaotic systems be the burgers map system(as driving system)( x1 (i + 1) = ax1 (i) x2 (i)2x2 (i + 1) = bx2 (i) + x1(i)x2 (i)(1.16)where a = 0.75, b = 1.75, and the lorenz three-dimensional chaotic map system y1(i + 1) = y3(i)y2(i + 1) = y1(i)y3(i + 1) = y1(i)y3(i) y2(i)(1.17)if initial conditions of systems (1.16) and (1.17) are selected as (0.1, 0.1)t and (0.5, 1,0.5)t , then the systems (1.16) and (1.17) are chaotic. figure 3 shows their chaotic trajectories.2we choose qj (xe , ye ) = 1 (xe ye )(j = 1, 2), and want systems (1.16) and (1.17)to be in pgs via the transformation:l(x ) = l1 (x ) = k1x1 + k2x2 + b.where k1 = 2, k2 = 3, b = 4. then from the new theorem, we can getu31 (i) = (u2(i), u3(i)twhereu2(i) = 01u3(i) = l(f (f (x (i) l(f (x (i) + 4 l(x (i)1 4 y1(i) + y3(i) y1(i)y3(i) + y2(i).the result of pgs of variables x and y 1 are shown in figure 4. the error goes to zero. the numerical simulation verify our theoretical analysis.(a) lorenz(b) duffing5040x330204010 200 040 20y302040510020 100 10 x12020 40 x20y2 5 10 y1figure 1. chaotic tra jectories of (a) lorenz system and (b) duffing system.(a)40(b)520 002040y2 21 1 22 2 23 3 2k x k x k x b6080y atan(x )5321015201000 10 20 3040t250 10203040tfigure 2 partial generalized sychronization errors vs. time: (c) e1 = y1 - l1 (x) (d) e2 = y2 l2 (x).5. pgs based encryption schemebase on the pgs system, one can establishes non-symmetric encryption scheme. the purposes of the scheme are alice needs her subordinate bob to provide secrete information from public chan-nels. however alice does not hope bob to know her encryption and decryption systems. the scheme has datum authentication function. the scheme has one-pad function.assume that alice has the system (1.2) and knows bobs system (1.3) but bob does not know alices system (1.2).alice and bob share two invertible transforms t1 : rk rk and t2 : r rwhere t2 (0) = 0 for embedding and extracting signal m in chaos stream ciphers.alice designs a transform l : rn rk , functions q1 (x , y ) and a controllerumk (y ) via formulas (1.7).alice gives the controller umk (y ) to bob.now the secure communication scheme is described as follows.1. bob informs alice the length n of the secure message to be transmitted.2. alice uses, at each time, different initial condition x (0) to generate chaos streamsx = x (i) : i = 1, 2, . . . , n . and then transmit l(x (0) and sx to bob.(a)2(b)21 1x2y20 01 132 10202x1y12 2figure 3. chaotic tra jectories of (a) burgers map system and (b) lorenz three-dimensional chaotic map system.(a)64x , y212x ,1011 12 22050100050100ii416x 1015y k x k x b10505(b)figure 3 (a) tra jectories of the variables x1 (solid line), x2 (dashed line), and y1 (dotted line). (b) partial generalized sychronization errors vs. time: e = y1 k1 yx1 k2 x2 b.3. bob uses the initial conditiony (0) = (y k (0), y mk (0)= (l(x (0), m (x (0), l(x (0),the chaos stream sx and (1.4) to generate the chaos streamy k= (y1(i), y2(i), . . . , yk (i) : i = 1, 2, . . . , n.4. bob uses the transform t2 to embed his secure message plaintextm = m(i) : i = 1, 2, . . . , n in to y k by means ofyk= (y1(i) + t2 (m(i), y2(i) + t2 (m(i), y3(i),. . . , yk (i) : i = 1, 2, . . . , n 5. bob uses transform t1 to generate a ciphertext c .c = t1 (y k ).6. bob sends c to alice.7. alice firstly decrypts the ciphertext c byt 11 c l(x )= m 1 (i), m 2(i), . . . , m k (i) :i = 1, 2, . . . , n8. ifm 1 (i) m 2(i),m j (i) 0,j = 2, 3, . . . , k; i = 1, 2, . . . , n.then the ciphertext c is valid and the plaintext can be decrypted via2m= t 1(m 1(i) : i = 1, 2, . . . , n otherwise, at least one among l(x ), s and c has certainly altered by some intruder.remark. since each time alice uses different initial condition x (0) to generate chaos stream, the pseudo-randomness of chaos trajectories of systems (1.2), (1.3) can guarantee the pseudo-randomness of the key stream y k .since bob is difficult to conjecture, from the controller umk (see (1.7) , thetransform l and alices system (1.2), the security of the communication system is higher than that of identity synchronization or known each other encryption systems.step 8) makes alice be able to confirm the authentication of the data. intruders are difficult to figure out the alice and bobs system via the key streams x andy k .since bob usesy (0) = (y k (0), y mk (0)= (l(x (0), m (x (0), y mk (0),as the initial condition, eqs (1.2) and (1.3) guarantee thaty k l(x ) = 0.6. concluding remarksa new theorem to partial generalized synchronization of (chaotic) systems is set up. the stability theory is used to study the asymptotic stability of the synchronization error. this theorem provides a general method for designing controllers to obtain the partial generalized synchronization for a large classes of (chaotic) systems. as an example, controlling the duffing chaotic system to be in pgs with lorenz chaotic system are proposed to illustrate the effectiveness and feasibility of the theorem. thirdly, an non-symmetric encryption scheme based on this theorem is established. it can be expected that our method should have a wide spectrum of practical ap- plications to uncertain and complex synchronization.reference1 v.s.afraimovich, n. n. verichev, and m. i. rabinovich, “stochastically syn- chronized oscillation in dissipative systems,” izv. vyssh. uchebn. zaved. ra- diofiz, vol.29, 1986, pp.1050-1060.2 l.m.pecora and t.l.carroll, “synchronization in chaotic systems,” phys. rev.lett., vol.64(8), 1990, pp. 821-824.3 c.w.wu and l.o.chua, “transmission of digital signals by chaotic synchro- nization,” int. j. bifurcation and chaos, vol.3(6), 1993,pp.1619-1627.4 t. yang and l.o.chua, ”channe-independent chaotic secure communication,”int. j. bifurcation chaos, vol.6(12), 1996, pp.2653-2660 .5 i.i.blekman, a.i.fradkov, h.nijmeijer, and a.y.pogromsky, “on self-synchronization and controlled synchronization,” syst. control lett, vol.31, 1997, pp.299-305.6 g.chen and x.dong, from chaos to order: methodologies, perspectives, andapplications. singapore: world scientific, 1998.7 g.grassi and s.mascolo, “synchronization of highorder oscillators by observer design with application to hyperchaos-based cryptography,” int. j. circuit theory appl., vol.27, 1999, pp.543-553.8 h.n.agiza and m.t.yassen, “synchronization of rossler and chen chaotic dy- namiacal systems using active control,” phys.lett.a, vol.278, 2000 ,pp.191-197.9 g.santoboni, a.pogromsky, and h.nijmeijer, “an observer for phase synchro- nization of chaos,” phys. lett. a, vol.291, 2001, pp.265-273.10 m.itoh and l.o.chua, “reconstruction and synchronization of hyperchaotic circuit via one state variable,” int. j. bifurcation chaos, vol.12, 2002, pp.2069-2085.11 a.pogromsky, g.santoboni, and h.nijmeijer,“partial synchronization: from symmetry toward stability,” physica d, vol.172, 2002, pp.65-87.12 g.santoboni, a.pogromsky, and h.nijmeijer, “partial observer and partial syn- chronization,” int. j. bifurcation chaos, vol.13, 2003, pp.453-458.13 l.kocarev and u.parlitz, “generalized synchronization, predictability,and equiv- alence of unidirectionally coupled dynamical systems,” phys. rev. lett., vol.76,1996, pp.1816-1819.14 b.r.hunt, e.ott, and j.a.york, “differentiable generalized synchronization of chaos,” phys. rev., vol.e5

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論