Design of a Cryptographic System for Communication Security using Chaotic Signals

Disturbance or corresponding errors of the transmission of information affect the ability of error detection. ,e chaotic encryption system prevents errors and secures the transmission system safely. ,e security assures by updating chaotic signals with the parameters of the chaotic circuits which are frequently changed.,e data decipher and the encryption by the chaotic signaling system renews and changes the initial condition of a chaotic electric circuit. When most of the decimal portions are less than the threshold, the transmission is accepted, and all the noninteger numbers are rounded to their nearest integers. ,e criterion allows the error-detection function in the security system that is proposed in this paper.,e chaotic encryption system for information is applied to public channels by the authorized individual. ,ree pictorial examples transmitted in the proposed system successfully demonstrate the security and performance. ,e new system provides high efficiency in the satellite communication network.


Introduction
Communication via satellite has been a common way for information exchange since the twentieth century. New ways of communication such as distance education and video conferencing with mobile devices need satellite networks. Despite the easy and convenient transmission of the information, there is always a problem of protecting private and secret information. Illegal eavesdropping or wiretapping causes considerable loss of the users. As transmitted messages through the satellite are easily interfered with and tampered with, important data of the defense navigation or business messages may not be delivered appropriately. erefore, communication security in satellite networks has been attracting increasing interest from industry and academia. In general, the encryption system adopts public (secret) key [1][2][3][4] or private key cryptography [5][6][7]. e former was introduced by Diffie and Hellman [1]. ey designed a cryptosystem that uses the same private key for encrypting and decrypting. at is, two terminals share the same identification code for encrypting the cryptography of the private key by designing an encryption algorithm in the system as a data encryption standard (DES) [5]. e privatekey cryptosystem provides strong security for public-key cryptosystem whose speed of authentication is slower than that of the private-key cryptosystem. Systems using satellite communication such as mobile devices and communication platforms for video conferencing usually use public (secret) keys.
us, how to protect important information in private key in the transmission is critical. erefore, a new cryptographic technology for network security for satellite communication is required.
is research aims to propose a new system for the security of the satellite communication network by using a chaotic signal as a carrier and the Haar wavelets for multiplexing and demultiplexing. e proposed system is different from the conventional encryption algorithm as the chaotic encryption system used for this study has a noncycle and complex time behavior. e new nonlinear method that uses the initial condition of a chaotic system as a private key masks the information-bearing signals by chaotic signals in the system (Figure 1). en, the information is decrypted based on the carrier after it is accepted at the end of the transmission channel.
e chaotic system transforms the private key of the system and the Haar wavelet by multiplexing and decrypts the key by the demultiplexing (Figure 2) [8]. is process finds out the transmission error easily and prevents the interception of information from the public channel. us, an effective way of satellite communication is obtained. e proposed system proves the effect of the divergence of a chaotic system which is suppressed according to the behavior of a nonlinear system in the new encryption scheme.
e system provides a new security system of satellite communication network and protects the data and messages from various cyber attacks.

System Design.
ere are different projects that encode the public key since the public-key-encrypted project arose. Its safety always sets up the most complex mathematics problems. e encrypted key and cracked key in the symmetric encryption system are the same key. e major problem is that how the sender transmits the encrypted key to the receiver in safety after the information was encrypted, and let both share the secret key to decode it. If we use the key list in a trusted Internet, maybe we can solve this problem [9].
rough the encryption algorithm, we can do every kind of replacement to plaintext, and the input to encryption algorithm is the secret key.
e key is unrelated data to plaintext; we use the key not only to encrypt the plaintext but also to crack the ciphertext. at is, we use the same secret key to encrypt or crack the text in the symmetric encryption system, so the transceiver must own the same key. erefore, how to transmit the key to the receiver validly and guard the information against hackers is an important problem. [10,11].
Everyone has a public key and private key in the asymmetric encryption system. e private key must be kept by an individual carefully. Under the asymmetric encryption system, every participator can get everyone's public key and own his own private key, so the private key does not need be transmitted in the net. If the public key encrypted one message, then it must be cracked by the private key, and vice versa. [12]. e state trajectory of a chaotic system is indeterminable. us, the divergence of nearby trajectories causes any small error to be magnified as the equations are integrated with the specified initial conditions. Even a small effect affects the system in a long term. e sensitivity of the system depends on initial conditions in the chaotic behavior of the system. e effect of the divergence of a chaotic system is suppressed in a nonlinear system where a message of plain texts is converted into a Haar wavelet form by the encoder matrix. It gives not only an encrypted message but also a transmitted error checking [13]. e Haar wavelets signal can be carried by one state of the chaotic signals ( Figure 3). en, it is sent to a public channel, decrypted at the receiving end, and demultiplexed by using the decoder matrix. e method uses the initial conditions of a chaotic system as a private key in addition to the Haar wavelet transform for multiplexing and demultiplexing to form the nonlinear system. e messages are securely encrypted, and its transmission errors are easily detected. No one can decrypt the intercepted messages from a public channel without the private key. e Haar wavelet of information in Chua's circuit is transmitted to a public channel as it is decoded at the end of communication by a demultiplexer.
e process is presented in Figure 3. e security of the system is decided by the initial condition of the chaotic signal of the information. e original information is transformed by the Haar wavelet by the encoder matrix.

Encryption.
Encrypting the chaotic cryptosystem is carried out according to the following steps: (1) First, both the transmitter and the receiver are assigned to have the same private key that contains the chaotic parameters (α,β, a, b), the initial conditions (x 0 , y 0 , z 0 ), and the rank of the encoder matrices H n (2) e transmitter obtains the plaintext data where f () is a collision-free one-way function [7,14] for both ends of the transmitter and receiver For example, f(x) � a n x n + a n−1 x n− 1 + · · · · · · + a 1 x + a 0 modp. (2) If the transmitter sends the next frame message, steps 2∼6 should be repeated. e receiver obtains the encrypted messages Z ∧ from the public channel and uses the following procedures for decryption. 2 Mathematical Problems in Engineering

Decryption
(1) Z ∧ arrives at the receiver. (2) e receiver generates a state variable Z by using the same parameters as in step 1.
n is defined. (5) If this cipher message [C] contains noninteger numbers and the difference between the noninteger numbers to their nearest integers is larger than a threshold, then the transmitted message may have been interfered with by noise disturbances or communication error. In this case, the receiver requests the transmitter to send the message again. Otherwise, the transmission is considered to be successful. (6) e receiver calculates the chaotic parameters as in equation (1).
e Haar wavelet transform is carried by one of the chaotic signal states (x(t), y(t), or z(t)) in Chua's circuit ( Figure 4). en, it is sent to a public channel, decrypted at the receiver, and demultiplexed by using the decoder matrix. e changing private key alters the transmitted messages in the public channel and contains the parameters of Chua's circuit and the rank of the encoder matrix. As the plaintext data [C] n and the encoder matrix H n are both integers, the ciphertext [m] contains only integer numbers. is property allows a convenient detection of redundancy when the masked message Z is corrupted during transmission. For example, network disturbances in computers of heavy load and frequent on-off operations and external electromagnetic fields may contaminate the messages.

Results and Discussion
We use the seven chaotic parameters (α, β, a, b, x 0 , y 0 , and z 0 ) and the dimension of matrix n as the "encryption keys." e cyber attacker cannot decrypt the encrypted message unless the chaotic behavior is understood as the original signals are carried by the chaotic signals during transmission. e control parameters of chaotic behavior constantly change in the collision-free one-way function. As a result, the security property results in a high sensitivity of synchronization with the parameter change. erefore, understanding the chaotic behavior of the chaotic parameters that change in each transmission is required for decryption. In other words, the system is secured as long as the first chaotic parameters are kept secret. To decrypt the encrypted data, the encryption key of the system is demanded to synchronize the signal [14].
In the other words, the modulation-demodulation requires the system to spend much time, and the message is not decrypted without a correct key. For updating other parameters such as the encoder matrix order, initial Mathematical Problems in Engineering conditions of chaotic circuits, coefficients, and prime number in equation (1), communication security needs enhancement, which is realized in this research. Besides the safety of secret messages, this system also enhances communication efficiency and improved performance for the secured communication. For any disturbance or communication error, the received message contains noninteger numbers that are easily detected, which improves the capability for error detection. It is important to exactly estimate the unknown parameters of chaotic systems in chaos control and synchronization. Hu et al. presented a method for estimating a one-dimensional discrete chaotic system based on the mean value method (MVM) by exploiting the ergodic and synchronization features of the chaos. is research proposed a method that estimates the parameter value more accurately than the MVM [15]. e suggested chaotic parameters can be any integers between −32767 and 32767, and the possible combination of keys is (32767) 7 × 2 7 × [(I + 1)!−1]. As it takes 10 −9 seconds for one calculation, this is beyond the capability of the existing supercomputers. e total time needed for solving the message is up to 2.83 × 10 22 years. e number of keyspace reaches 1.88 × 10 39 if the rank of encoder/decoder matrix is set to be eight including seven independent variables and one dependent function. e variables are chaotic parameters (α, β, a, and b), the initial conditions (x 0 , y 0 , and z 0 ) on which the rank of the encoder matrices is based. is private key that contains the parameters of Chua's circuit and the rank of the encoder matrix changes constantly to alter the appearances of the transmitted messages in the public channel. As integers, the plaintext data [C] n and the encoder matrix H n result in ciphertext [m] of only integer numbers. is property offers a convenient way to detect whether the masked messages Z are corrupted during transmission. JAVA codes of the proposed algorithm were tested successfully on two remote machines. Of course, the ideal encryption should be robust so that the transmitted messages in the public channel are not decrypted by an unauthorized person. e results are shown in Figure 5 based on JAVA codes of the proposed algorithm. Heavy-loaded computer networks, on-off operations of computers, and external electromagnetic fields cause disturbances to corrupt messages. If the disturbances are large, the messages decrypted by the receiver contain nonintegers. e receiver then becomes aware of obtaining a corrupted message and requests retransmission immediately. However, decrypted messages with nonintegers need caution; they are false transmissions. In the algorithm, the chaotic signals with nonintegers of floating parts can be introduced during the masking and unmasking. Also, when computers or the operating systems of the transmitter and the receiver are not the same, this Mathematical Problems in Engineering 5 creates decimal parts. erefore, to remedy the possible situation for misinterpreting, a threshold regarding the magnitude of the decimal part is required for error detection. e behavior of the Haar wavelet form is aperiodic. It is not complex like a random signal or a noise that needs time and an algorithm to distinguish signals and noises. e plaintext message is converted into a Haar wavelet form by the encoder matrix and sets the criterion for filtering. at is, there is a convenient criterion from the Haar wavelets to check and filter the transmitted error. Since a fitting error of approximating any function by the Haar wavelet form is a reciprocal of the highest-order Haar function, we selected a threshold (or an error bound) as the reciprocal of the rank of the encoder matrix. In this way, the transmission becomes acceptable and all the noninteger numbers are rounded to their nearest integers if most of the decimal parts are less than the threshold. With this simple criterion, the errordetection function in the proposed system is established. In this case, the threshold is equal to 1/n as shown in Figure 6

Conclusions
e importance of communication security is becoming critical as the number of satellites is increasing. us, preventing transferred information from eavesdropping or wiretapping has been attracting much interest. New cryptographic technology for the security of the satellite communication network is proposed by using a chaotic signal as a carrier and the Haar wavelets for multiplexing and demultiplexing.
e proposed system allows secure encryption of messages and easy detection of errors.
ree pictorial examples were tested in the system, and the result validated the performance and security of the system. e system has the following four advantages: (1) simplicity and low cost as it runs on PCs by implementing the algorithm, (2) high security, (3) secure authentication, and (4) easy detection of transmission errors. e JAVA code of the proposed algorithm was also tested and operated successfully on two remote machines. e result shows that the proposed system is available for individual, academic, or industrial purposes conveniently. e result of the system leads to further research on the encryption and decryption of messages including plaintexts, voice, pictures, or their combination for multimedia purposes.

Data Availability
e data used to support the findings of this study are restricted by Jai-Houng Leu in order to protect PATIENT PRIVACY. Data are available from Jai-Houng Leu (jahonleu@yahoo.com.tw) for researchers who meet the criteria for access to confidential data.

Conflicts of Interest
e authors declare that they have no conflicts of interest.  Figure 6: reshold of the error bound (the x-axis) and the rank of the encoder matrix (the y-axis). 6 Mathematical Problems in Engineering