期刊文献+

基于混沌的一次性口令认证的保密通讯

The one time password communication based on the chaotic system in the secure Network
下载PDF
导出
摘要 如何更加有效地进行用户身份鉴别和信息保密,是网络安全的重要课题之一。本文讨论了在TCP/IP协议下网络通信的不安全因素,将Logistic映射产生的混沌序列作为载波,提出了一种改进型OTP的工作机制。该方法利用随机生成的混沌数列,采用C#语言T、CP/IP协议和面向对象程序设计方法,实现随机加密用户数据信息。通过仿真实验分析,该系统能有效抵抗系统识别攻击,且加密效果良好,非常适合于资源开销有限和实时性要求较高的安全通信场合。 To make authentication work and information security more effective is an important subject in the network safety.In this paper,the insecurity complication of a network system based on the TCP/ IP protocol were investigated,the chaotic sequence generated by Logistic map are used as the carrier,the working mechanism of one advanced One Time Password(OTP) is proposed.Chaotic random number is utilized,through using C# language,TCP/ IP protocol and the OOP method,the authors design the secure communication software by encrypting user datagram information.Simulation results show that the cryptosystem can resist attacking of system identification,and ciphertexts encryption effect is well.It is very fit those secure communication situations of resource restricting and high real-time requirement.
作者 刘嘉辉
出处 《绥化学院学报》 2006年第3期157-159,共3页 Journal of Suihua University
基金 黑龙江省自然科学基金(F200505)
关键词 混沌加密 TCP/IP协议 LOGISTIC映射 一次性口令机制(OIP) 网络安全 Chaotic encryption TCP/ IP protocol Logistic map OTP(One Time Password) Network security
  • 相关文献

参考文献3

二级参考文献11

  • 1戴建华,尹华伟,张洪均,吴令安.混沌在信息加密中的应用[J].科学通报,1996,41(5):402-405. 被引量:12
  • 2Andrze J K, Masanori O, Yoshio T. How can we observe and describe chaos [ J ]. Open Systems and Information Dynamics, 2003, 10(3) :221 -233.
  • 3Tong H. Nonlinear time series analysis since 1990: some permnal reflections [ J ]. Acta Mathematicae Applicatae Sinica (Englistz Series), 2002,18(2) : 177 - 184.
  • 4Kocarev L, Jakimoski G. Logistic map as a block encryption algorithm[J ]. Physics Letters A, 2001,289 (4 - 5 ) : 199 -206.
  • 5Pareek N K, Patidar V, Sud K K. Discrete chaotic cryptography using external key [ J ]. Physics Letters A,2003,309( 1 - 2) : 75 - 82.
  • 6Li S J, Mou X Q, Cai Y L, et al. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision[J]. Computer Physics Communications,2003,153( 1 ) : 52 - 58.
  • 7Xu H B, Wang G R, chen S G.Controlling chaos by a modified straight-line stabilization method[J ]. The European Physical Journal B, 2001,22( 1 ) :65 - 69.
  • 8Oliveira J B, de Figueiredo L H. Interval computation of viswanath's constant[J ]. Reliable Computing, 2002,8 ( 2 ) :131 - 138.
  • 9朱伟勇,焉德军.Anosov 映射的 Markov 分解中拟 Fibonacci 序── 一通向混沌的新途径[J].东北大学学报(自然科学版),1998,19(2):171-173. 被引量:2
  • 10王丽娜,于戈,梅哲,王国仁.虚拟企业中多媒体信息的混沌加密方法[J].东北大学学报(自然科学版),2001,22(4):381-384. 被引量:6

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部