1. bookVolumen 22 (2022): Edición 4 (November 2022)
Detalles de la revista
License
Formato
Revista
eISSN
1314-4081
Primera edición
13 Mar 2012
Calendario de la edición
4 veces al año
Idiomas
Inglés
Acceso abierto

An Approach for Securing JSON Objects through Chaotic Synchronization

Publicado en línea: 10 Nov 2022
Volumen & Edición: Volumen 22 (2022) - Edición 4 (November 2022)
Páginas: 23 - 34
Recibido: 29 Apr 2022
Aceptado: 16 Aug 2022
Detalles de la revista
License
Formato
Revista
eISSN
1314-4081
Primera edición
13 Mar 2012
Calendario de la edición
4 veces al año
Idiomas
Inglés

1. ECMA. ECMA-404 – The JSON Data Interchange Syntax. Ecma International, 2017 (Online). https://www.ecma-international.org/publications-and-standards/standards/ecma-404/ Search in Google Scholar

2. Bray, T. The JavaScript Object Notation (JSON) Data Interchange Format. RFC Editor, 2017 (Online). https://rfc-editor.org/rfc/rfc8259.txt10.17487/RFC8259 Search in Google Scholar

3. Bourhis, P., J. L. Reutter, F. Suárez, D. Vrgoc. JSON: Data Model, Query Languages and Schema Specification. – In: Proc. of 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, May 2017, pp. 123-135. DOI: 10.1145/3034786.3056120. Abierto DOISearch in Google Scholar

4. Rescorla, E. The Transport Layer Security (TLS) Protocol Version 1.3. RFC Editor, 2018 (Online). https://rfc-editor.org/rfc/rfc8446.txt10.17487/RFC8446 Search in Google Scholar

5. Jones, M., J. Hildebrand. JSON Web Encryption (JWE). RFC Editor, 2015 (Online). https://rfc-editor.org/rfc/rfc7516.txt10.17487/RFC7516 Search in Google Scholar

6. Rashid, F. Y. Critical Flaw Alert! Stop Using JSON Encryption. InfoWorld, 27 March 2017 (Online). https://www.infoworld.com/article/3184582/critical-flaw-alert-stop-using-json-encryption.html Search in Google Scholar

7. Detering, D., J. Somorovsky, C. Mainka, V. Mladenov, J. Schwenk. On The (In-) Security of JavaScript Object Signing and Encryption. – In: Proc. of 1st Reversing and Offensive-Oriented Trends Symposium (ROOTS’17), November 2017, pp. 1-11. DOI:10.1145/3150376.3150379. Abierto DOISearch in Google Scholar

8. Bleichenbacher, D. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1,” in Advances in Cryptology (CRYPTO’98), 1998, pp. 1-12. DOI: 10.1007/BFb0055716. Abierto DOISearch in Google Scholar

9. Huygens, C. Horologium oscillatorium, sive, De motu pendulorum ad horologia aptato demonstrationes geometricae. Paris, F. Muguet, 1673.10.5479/sil.127979.39088002701910 Search in Google Scholar

10. Pecora, L. M., T. L. Carroll. Synchronization in Chaotic Systems. – Phys. Rev. Lett., Vol. 64, February 1990, No 8, pp. 821-824. DOI: 10.1103/PhysRevLett.64.821.10042089 Abierto DOISearch in Google Scholar

11. He, R., P. G. Vaidya. Analysis and Synthesis of Synchronous Periodic and Chaotic Systems. – Phys. Rev. A, Vol. 46, December 1992, No 12, pp. 7387-7392. DOI: 10.1103/PhysRevA.46.7387.9908088 Abierto DOISearch in Google Scholar

12. Vaidya, P. G. Monitoring and Speeding up Chaotic Synchronization. – Chaos, Solitons & Fractals, Vol. 17, July 2003, No 2, pp. 433-439. DOI: 10.1016/S0960-0779(02)00384-3. Abierto DOISearch in Google Scholar

13. He, R., P. G. Vaidya. Implementation of Chaotic Cryptography with Chaotic Synchronization. – Phys. Rev. E, Vol. 57, February 1998, No 2, pp. 1532-1535. DOI: 10.1103/PhysRevE.57.1532. Abierto DOISearch in Google Scholar

14. Lorenz, E. N. Deterministic Nonperiodic Flow. – J. Atmos. Sci., Vol. 20, March 1963, No 2, pp. 130-141. DOI: 10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2. Abierto DOISearch in Google Scholar

15. Rössler, O. E. An Equation for Continuous Chaos. – Phys. Lett. A, Vol. 57, July 1976, No 5, pp. 397-398. DOI: 10.1016/0375-9601(76)90101-8. Abierto DOISearch in Google Scholar

16. Rössler, O. E. An Equation for Hyperchaos. – Phys. Lett. A, Vol. 71, April 1979, No 2, pp. 155-157. DOI: 10.1016/0375-9601(79)90150-6. Abierto DOISearch in Google Scholar

17. Oppenheim, A. V., G. W. Wornell, S. H. Isabelle, K. M. Cuomo. Signal Processing in the Context of Chaotic Signals. – In: Proc. of International Conference on Acoustics, Speech, and Signal Processing (ICASSP’92), 1992, IEEE, Vol. 4, March 1992, pp. 117-120. DOI: 10.1109/ICASSP.1992.226472. Abierto DOISearch in Google Scholar

18. Dedieu, H., M. P. Kennedy, M. Hasler. Chaos Shift Keying: Modulation and Demodulation of a Chaotic Carrier Using Self-Synchronizing Chua’s Circuits. – IEEE Trans. Circuits Syst. II Analog Digit. Signal Process., Vol. 40, October 1993, No 10, pp. 634-642. DOI: 10.1109/82.246164. Abierto DOISearch in Google Scholar

19. Dmitriev, A. S., A. I. Panas, S. O. Starkov. Experiments on Speech and Music Signals Transmission Using Chaos. – Int. J. Bifurc. Chaos, Vol. 5, March 1995, No 4, pp. 1249-1254. DOI: 10.1142/S0218127495000910. Abierto DOISearch in Google Scholar

20. Yang, T., L. O. Chua. Secure Communication via Chaotic Parameter Modulation. – IEEE Trans. Circuits Syst. I Fundam. Theory Appl., Vol. 43, September 1996, No 9, pp. 817-819. DOI: 10.1109/81.536758. Abierto DOISearch in Google Scholar

21. Cuomo, K. M., A. V. Oppenheim. Circuit Implementation of Synchronized Chaos with Applications to Communications. – Phys. Rev. Lett., Vol. 71, July 1993, No 1, pp. 65-68. DOI: 10.1103/PhysRevLett.71.65. Abierto DOISearch in Google Scholar

22. Uchida, A. Optical Communication with Chaotic Lasers: Applications of Nonlinear Dynamics and Synchronization. Wiley, February 2012.10.1002/9783527640331 Search in Google Scholar

23. Al Bayati, B. M., A. K. Ahmad, K. A. M. Al Naimee. Effect of Control Parameters on Chaos Synchronization by Means of Optical Feedback. – Opt. Commun., Vol. 472, April 2020, p. 126032. DOI: 10.1016/j.optcom.2020.126032. Abierto DOISearch in Google Scholar

24. Tang, Y., Q. Li, W. Dong, M. Hu, R. Zeng. Optical Chaotic Communication Using Correlation Demodulation between Two Synchronized Chaos Lasers. – Opt. Commun., Vol. 498, November 2021, p. 127232. DOI: 10.1016/j.optcom.2021.127232. Abierto DOISearch in Google Scholar

25. Merah, L., A. Adnane, A. Ali-Pacha, S. Ramdani, N. Hadj-said. Real-Time Implementation of a Chaos Based Cryptosystem on Low-Cost Hardware. – Iran. J. Sci. Technol. Trans. Electr. Eng., Vol. 45, November 2021, No 4, pp. 1127-1150. DOI: 10.1007/s40998-021-00433-w. Abierto DOISearch in Google Scholar

26. Liao, T.-L., H.-R. Lin, P.-Y. Wan, J.-J. Yan. Improved Attribute-Based Encryption Using Chaos Synchronization and Its Application to MQTT Security. – Appl. Sci., Vol. 9, November 2019, No 20, p. 4454. DOI: 10.3390/app9204454. Abierto DOISearch in Google Scholar

27. Almali, M. N., Z. Dikici. The Simulation of Sound Signal Masking with Different Chaotic Oscillations and Its Circuit Application. – Turkish J. Electr. Eng. Comput. Sci., Vol. 24, June 2016, pp. 4284-4293. DOI: 10.3906/elk-1504-264. Abierto DOISearch in Google Scholar

28. Vaidyanathan, S., A. Sambas, S. Kacar, U. Cavusoglu. A New Three-Dimensional Chaotic System with a Cloud-Shaped Curve of Equilibrium Points, Its Circuit Implementation and Sound Encryption. – Int. J. Model. Identif. Control, Vol. 30, October 2018, No 3, pp. 184-196. DOI: 10.1504/IJMIC.2018.095334. Abierto DOISearch in Google Scholar

29. Zaher, A. A., G. Amjad Hussain. Chaos-Based Cryptography for Transmitting Multimedia Data over Public Channels. – In: Proc. of 7th International Conference on Information and Communication Technology (ICoICT’19), July 2019, pp. 1-6. DOI: 10.1109/ICoICT.2019.8835351. Abierto DOISearch in Google Scholar

30. Zou, C., Q. Zhang, X. Wei, C. Liu. Encryption Based on Improved Lorenz System. – IEEE Access, Vol. 8, April 2020, pp. 75728-75740. DOI: 10.1109/ACCESS.2020.2988880. Abierto DOISearch in Google Scholar

31. Moon, S., J.-J. Baik, J. M. Seo. Chaos Synchronization in Generalized Lorenz Systems and an Application to Image Encryption. – Commun. Nonlinear Sci. Numer. Simul., January 2021. DOI: 10.1016/j.cnsns.2021.105708. Abierto DOISearch in Google Scholar

32. Prasad, B., K. Mishra. A Combined Encryption Compression Scheme Using Chaotic Maps. – Cybernetics and Information Technologies, Vol. 13, 2013, No 2, pp. 75-81.10.2478/cait-2013-0016 Search in Google Scholar

33. Huang, Q., L. Wang, G. Li. Research and Application of Video Encryption Technology Based on Chaotic Synchronization Theory. – In: Proc. of 10th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA’18), April 2018, pp. 444-447. DOI: 10.1109/ICMTMA.2018.00114. Abierto DOISearch in Google Scholar

34. Jiménez-Rodríguez, M., M. G. González-Novoa, J. C. Estrada-Gutiérrez, C. Acosta-Lúa, O. Flores-Siordia. Secure Point-to-Point Communication Using Chaos. – DYNA, Vol. 83, Jun. 2016, No 197, pp. 181-187. DOI: 10.15446/dyna.v83n197.53506. Abierto DOISearch in Google Scholar

35. Runge, C. Über die numerische auflösung von differentialgleichungen. – Math. Ann., Springer, Vol. 46, June 1895, pp. 167-178. DOI: 10.1007/BF01446807. Abierto DOISearch in Google Scholar

36. Kutta, W. Beitrag zur näherungsweisen integration totaler differentialgleichungen. – Zeit. Math. Phy, Vol. 46, 1901, pp. 435-453. Search in Google Scholar

37. Pisarchik, A. N., M. Jiménez-Rodríguez, R. Jaimes-Reátegui. How to Resist Synchronization Attacks. – Discontinuity, Nonlinearity and Complexity, Vol. 4, April 2015, No 1, pp. 1-9. DOI: 10.5890/DNC.2015.03.00. Abierto DOISearch in Google Scholar

Artículos recomendados de Trend MD

Planifique su conferencia remota con Sciendo