期刊文献+

超混沌序列密码受参数变化影响的实验研究 被引量:4

Experimental Research on Hyper Chaos Stream Cipher Affected by Parameter Change
下载PDF
导出
摘要 近年来,利用混沌特性进行数据加密得到了较多的研究,超混沌映射参数的不同取值直接影响超混沌映射所产生序列密码的复杂性.以广义Henon映射作为实验对象,以MATLAB7.0为实验平台,分析映射初值及参数在什么范围内取值可以产生可实际应用的超混沌序列及其随机特性、自相关特性、互相关特性、平衡性及游程的变化,为工程实际应用时选择参数提供参考. Recent study has revealed that the hyper chaos mapping parameter and initial value has impact on the complexity of the stream cipher produced by hyper chaos mapping. By using generalized Henon mapping as experimental objective and using MATLAB 7.0 as experiment platform, The authors analyze the mapping initial value and in what range it is possibe for the parameter to take value so as to be able to produce the hyper chaos stream of practical application, and analyze its randomness, correlated characteristic, and runs change, so that a reference could be provided for the parameter choice of practical project application.
作者 袁宁 宣蕾
出处 《计算机研究与发展》 EI CSCD 北大核心 2008年第z1期351-356,共6页 Journal of Computer Research and Development
基金 国家自然科学基金项目(90604006)
关键词 超混沌序列密码 广义Henon映射 LYAPUNOV指数 随机性 hyper chaos stream cipher generalized Henon mapping Lyapunov exponent randomness
  • 相关文献

参考文献5

  • 1[1]Hong Zhou,Xie-Ting Ling.Problems with the chaotic inverse system encryption approach.IEEE Trans on Circuits and Systems I:Fundamental Theory and Applications,1997,44(3):268-271
  • 2万娟,吴楚,张源安.超混沌语音加密的网络传输[J].计算机工程与应用,2005,41(18):154-156. 被引量:1
  • 3龙敏,丘水,生彭飞.利用超混沌加密技术加强RSA算法的研究[J].计算机工程与应用,2005,41(4):168-169. 被引量:3
  • 4[4]G Baier,M Klein.Maximum hyperchaos in generalized Henon maps.Physics Letters A,1990,151(6/7):281-284
  • 5[8]胡磊,王鹏,等.应用密码学手册.北京:电子工业出版社,2005.161-165

二级参考文献9

  • 1G Baier,M Klein.Maximum hyperchaos in generalized Henon maps[J]. Phys Lett A,1990;151(6/7):281-284.
  • 2Johan Hestad.On using RSA with low exponent in a public key network[C].In:Leeture Notes in Computer Science:Advanced in Cryptology CRYPTO'85 Proc, 1985:403-408.
  • 3Goce Jakimoski, Ljupco Kocarev.Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps[J].IEEE,2001;48(2).
  • 4H Feistel.Cryptography and computer privacy[J].Scientific American, 1973;228(5):15-33.
  • 5B Schneier.Applied Crytography: Protocols, Algorithms, and Source Code in C[M].New York:Wiley,1996.
  • 6Douglas R Stinson.Cryptography Theory and Practice[M].Second Edition,Publishing House of Electronics Industry,2003.
  • 7L Brown,Jpieprzyk,J Seberry.LOKI:A cryptographic primitive for authentication and secrecy applieation[C].In:Proc of Advances in Cryptology-AUSCRYPT'90, Berlin, Germany: Spring-Verlag,1990:229-236.
  • 8C Adams.Constructing symmetric ciphers using the CAST design procodure[J].Designs, Codes and Cryptography, 1997;12:71-104.
  • 9Bruce Schneier.Applied Cryptography Protocols,algorithms,and source code in C[M].China Machine Press,2003.

共引文献2

同被引文献28

引证文献4

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部