期刊文献+

基于多混沌映射的信息加密算法 被引量:11

Information Encryption Algorithm Based on Multiple Chaotic Mappings
在线阅读 下载PDF
导出
摘要 为了增强混沌加密的安全性,提出一种基于多个混沌离散映射的动态加密算法.该算法使用了两个混沌级联子系统.子系统由简单混沌映射构成,其输出与明文相加取模后生成密文,而且子系统的迭代次数呈动态变化,提高了密文的不可预测性.仿真实验和安全性分析表明,该算法的密钥空间大,对明文和密钥敏感,能够有效地抵抗利用统计特性、差分特性和相空间重构进行的攻击. In order to improve the security of chaotic encryption, a dynamic encryption algorithm based on multiple chaotic mappings is proposed. In the proposed algorithm, two cascaded chaotic subsystems composed of simple chaotic mappings are adopted, and their outputs are added to the plaintext with modulus to 'obtain encrypted information. The iterations of the subsystems are randomly changed, so that the unpredictability of the encrypted information is enhanced. Simulation tests and security analyses show that the proposed algorithm possesses large key space, high sensitivity to plaintext and key, and excellent security against varied attacks via statistical and differential characteristics and phase space reconstruction.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第5期1-5,共5页 Journal of South China University of Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60372004) 广东省自然科学基金资助项目(031445) 暨南大学引进人才启动基金资助项目(51205068)
关键词 混沌 加密 保密通信 混沌映射 chaos encryption secure communication chaotic mapping
  • 相关文献

参考文献10

  • 1丘水生,陈艳峰,吴敏,马在光,龙敏,刘雄英.一种新的混沌加密系统方案原理[J].电路与系统学报,2006,11(1):98-103. 被引量:23
  • 2彭飞,丘水生,龙敏.外部密钥控制系统参数的图像加密算法[J].华南理工大学学报(自然科学版),2005,33(7):20-23. 被引量:11
  • 3Chen Guan-rong,Mao Yao-bin,Charles K C.A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos,Solitons and Fractals,2004,21(3):749-761.
  • 4Baptista M S.Cryptography with chaos[J].Physics Letters A,1998,240(1/2):50-54.
  • 5Wong Wai-kit,Lee Lap-piu,Wong Kwok-wo.A modified chaotic cryptographic method[J].Computer Physics Communications,2001,138(3):234-236.
  • 6Wong Kwok-wo.A fast chaotic cryptographic scheme with dynamic look-up table[J].Physics Letters A,2002,298(4):238-242.
  • 7Wong Kwok-wo.A combined chaotic cryptographic and hashing scheme[J].Physics Letters A,2003,307(5/6):292-298.
  • 8Huang Fang-jun,Guan Zhi-hong.A modifed method of a class of recently presented cryptosystems[J].Chaos,Solitons and Fractals,2005,23(5):1893-1899.
  • 9Shannon C E.Communication theory of security system[J].Bell System Technical Journal,1949,28(1):656-715.
  • 10Mohamed I S,Alaa-eldin R S.Methods of attacking chao-tic encryption and countermeasures[C]∥Proc of IEEE International Conference on Acoustics,Speech,and Signal Processing.Salt Lake City,Utah:IEEE Press,2001:1001-1004.

二级参考文献25

  • 1Lorenz E.Deterministic non-period flow[J].J.Atmos.Sci.,1963,20(3):130-141.
  • 2Chua.L O.Special issue on chaos[J].IEEE Trans.Circuits Syst.I,1993,40(10,11).
  • 3Kennedy M,Ogorzalerk M.Special issue on chaos synchronization and control[J].IEEE Trans.Circuits Syst.I,1997,44(10).
  • 4Kennedy M,Kolumbán G.Special issue on noncoherent chaotic communication[J].IEEE Trans.Circuits Syst.I,2000,47(12).
  • 5Kocarev L,Maggio G,Ogorzalerk M.Special issue on applications of chaos in modern communication systems[J].IEEE Trans.Circuits Syst.I,2001,48(12).
  • 6Martin Hasler,Gianluca Mazzini.Special issue on applications of nonlinear dynamics to electronic and information engineering[J].Proceedings of the IEEE,2002,90(5).
  • 7Brown R,Chua L O.Clarifying chaos:examples and counter examples[J].Int.J.Bifur.Chaos,1996,6(2):219-249.
  • 8Dachselt F,Schwarz W.Chaos and cryptography[J].IEEE Trans.Circuits Syst.I,2001,48(12):1498-1509.
  • 9Kocarev L.Chaos-based cryptography:A brief overview[J].IEEE Circuit and system Magazine,2001,1(3):6-21.
  • 10Crutdhfield J.Chaos[J].Sci.Amer.,1986,255:46-57.

共引文献32

同被引文献209

引证文献11

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部