Implementation of the chaotic cipher lock

Chuan-Kuei Huang, Yu Jeng Shu, Hsiau Hsian Nien, Pen Chiang Hsia

Research output: Contribution to journalArticle

Abstract

CCL (Chaotic Cipher Lock) is produced by chaotic system with an enormous key space (1045) and an unpredictable chaos code to prevent a burglar from unlocking and stealing. CCL is the integration of PSoC (Programmable System-on-Chip), LCD (Liquid Crystal Display), USB (Universal Serial Bus), Keyboard, Driver and Unlock/Alarm devices that the establishment of chaotic system, CCL basic code, operation code, and Key's identity code can be implemented. Two ciphers (identity code and operation code) in between the user and CCL are required for passing the identification and unlock. When it is unlocked, the key has to be inserted to the CCL slot for identification. After being identified and correctly inputting the operation code, the driver circuit would unlock the electric lock. Various statistical methods, such as the distribution characteristics of chaos code, FIPS PUB 140-1, correlation coefficient, and key space, are adopted for testing the security. Furthermore, there have not been any scholars or engineering designers applying PSoC and chaotic system to the production of secure electronic lock. This CCL, therefore, is a theoretical and practical invention.

Original languageEnglish
Pages (from-to)213-218
Number of pages6
JournalICIC Express Letters, Part B: Applications
Volume4
Issue number1
Publication statusPublished - 2013 Apr 1

Fingerprint

Chaotic systems
Chaos theory
Patents and inventions
Liquid crystal displays
Statistical methods
Networks (circuits)
Testing
System-on-chip

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

Huang, C-K., Shu, Y. J., Nien, H. H., & Hsia, P. C. (2013). Implementation of the chaotic cipher lock. ICIC Express Letters, Part B: Applications, 4(1), 213-218.
Huang, Chuan-Kuei ; Shu, Yu Jeng ; Nien, Hsiau Hsian ; Hsia, Pen Chiang. / Implementation of the chaotic cipher lock. In: ICIC Express Letters, Part B: Applications. 2013 ; Vol. 4, No. 1. pp. 213-218.
@article{c8a3aa0b17ad46da9e7a7ae504a59b11,
title = "Implementation of the chaotic cipher lock",
abstract = "CCL (Chaotic Cipher Lock) is produced by chaotic system with an enormous key space (1045) and an unpredictable chaos code to prevent a burglar from unlocking and stealing. CCL is the integration of PSoC (Programmable System-on-Chip), LCD (Liquid Crystal Display), USB (Universal Serial Bus), Keyboard, Driver and Unlock/Alarm devices that the establishment of chaotic system, CCL basic code, operation code, and Key's identity code can be implemented. Two ciphers (identity code and operation code) in between the user and CCL are required for passing the identification and unlock. When it is unlocked, the key has to be inserted to the CCL slot for identification. After being identified and correctly inputting the operation code, the driver circuit would unlock the electric lock. Various statistical methods, such as the distribution characteristics of chaos code, FIPS PUB 140-1, correlation coefficient, and key space, are adopted for testing the security. Furthermore, there have not been any scholars or engineering designers applying PSoC and chaotic system to the production of secure electronic lock. This CCL, therefore, is a theoretical and practical invention.",
author = "Chuan-Kuei Huang and Shu, {Yu Jeng} and Nien, {Hsiau Hsian} and Hsia, {Pen Chiang}",
year = "2013",
month = "4",
day = "1",
language = "English",
volume = "4",
pages = "213--218",
journal = "ICIC Express Letters, Part B: Applications",
issn = "2185-2766",
publisher = "ICIC Express Letters Office",
number = "1",

}

Huang, C-K, Shu, YJ, Nien, HH & Hsia, PC 2013, 'Implementation of the chaotic cipher lock', ICIC Express Letters, Part B: Applications, vol. 4, no. 1, pp. 213-218.

Implementation of the chaotic cipher lock. / Huang, Chuan-Kuei; Shu, Yu Jeng; Nien, Hsiau Hsian; Hsia, Pen Chiang.

In: ICIC Express Letters, Part B: Applications, Vol. 4, No. 1, 01.04.2013, p. 213-218.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Implementation of the chaotic cipher lock

AU - Huang, Chuan-Kuei

AU - Shu, Yu Jeng

AU - Nien, Hsiau Hsian

AU - Hsia, Pen Chiang

PY - 2013/4/1

Y1 - 2013/4/1

N2 - CCL (Chaotic Cipher Lock) is produced by chaotic system with an enormous key space (1045) and an unpredictable chaos code to prevent a burglar from unlocking and stealing. CCL is the integration of PSoC (Programmable System-on-Chip), LCD (Liquid Crystal Display), USB (Universal Serial Bus), Keyboard, Driver and Unlock/Alarm devices that the establishment of chaotic system, CCL basic code, operation code, and Key's identity code can be implemented. Two ciphers (identity code and operation code) in between the user and CCL are required for passing the identification and unlock. When it is unlocked, the key has to be inserted to the CCL slot for identification. After being identified and correctly inputting the operation code, the driver circuit would unlock the electric lock. Various statistical methods, such as the distribution characteristics of chaos code, FIPS PUB 140-1, correlation coefficient, and key space, are adopted for testing the security. Furthermore, there have not been any scholars or engineering designers applying PSoC and chaotic system to the production of secure electronic lock. This CCL, therefore, is a theoretical and practical invention.

AB - CCL (Chaotic Cipher Lock) is produced by chaotic system with an enormous key space (1045) and an unpredictable chaos code to prevent a burglar from unlocking and stealing. CCL is the integration of PSoC (Programmable System-on-Chip), LCD (Liquid Crystal Display), USB (Universal Serial Bus), Keyboard, Driver and Unlock/Alarm devices that the establishment of chaotic system, CCL basic code, operation code, and Key's identity code can be implemented. Two ciphers (identity code and operation code) in between the user and CCL are required for passing the identification and unlock. When it is unlocked, the key has to be inserted to the CCL slot for identification. After being identified and correctly inputting the operation code, the driver circuit would unlock the electric lock. Various statistical methods, such as the distribution characteristics of chaos code, FIPS PUB 140-1, correlation coefficient, and key space, are adopted for testing the security. Furthermore, there have not been any scholars or engineering designers applying PSoC and chaotic system to the production of secure electronic lock. This CCL, therefore, is a theoretical and practical invention.

UR - http://www.scopus.com/inward/record.url?scp=84875388711&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84875388711&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84875388711

VL - 4

SP - 213

EP - 218

JO - ICIC Express Letters, Part B: Applications

JF - ICIC Express Letters, Part B: Applications

SN - 2185-2766

IS - 1

ER -