期刊文献+

基于混沌序列的DES算法研究与实现 被引量:4

Study and Implementation of DES Algorithm Based on Chaotic Sequences
下载PDF
导出
摘要 针对DES算法使用短密钥的不足,提出利用混沌理论拓展DES密钥空间的设想,设计了一种基于混沌序列的DES算法.即用Logistic映射产生混沌序列,从中构造DES的轮密钥,轮密钥间具有相互独立性,密钥空间具有无限性.通过改进的DES算法进行图像数据的加/解密试验,结果表明改进的DES算法较改进前的算法在安全性和抗破译性方面具有更强的抗攻击能力. In view of the deficient application of short cryptographic keys in DES algorithm, this paper presents the conception of developing DES key space by the chaotic theory and designs a new DES algorithm based on logistic chaotic sequences. That is, generated by logistic maps are chaotic sequences, from which composed are DES round cryptographic keys with reciprocal independence and infinite key space. Experiments are carried out on the encryption and decryption of image data by means of the improved DES algorithm. The results show that, as compared with the original algorithm, the betterment possesses stronger resistance to attacks in security and anti-decryption.
出处 《徐州建筑职业技术学院学报》 2006年第4期26-28,42,共4页 Journal of XUZHOU Institute of Architectural Technology
基金 江苏省高校自然科学基金项目(04KJD560185)
关键词 混沌 DES 算法 密钥 chaos DES algorithm cryptographickey
  • 相关文献

参考文献6

二级参考文献8

  • 1于秀源 薛昭雄.密码学与数论基础[M].济南:山东科学技术出版社,1993..
  • 2[美]SchneierB 吴世忠 祝世雄 张文政 译.应用密码学:协议、算法与C源程序 [M].北京:机械工业出版社,2000..
  • 3DaemenJ.Rijmen V.The Design of Rijindael AES:The Advan—ced Encryption Standard[M].北京:清华大学出版社,2003..
  • 4Nyberg K. Differentially Uniform Mappings for Cryptography[M]. In:Proc. of Encrypt '93, Springer-verlag, 1994:55-64.
  • 5张焕国 覃中平 王丽娜.[A]..信息和通信安全—CCICS’2003第3届中国信息和通信安全学术会议论文集[C].北京:科学出版社,2003—03.186-187.
  • 6(美)PeterWayner著,杨力平等.隐显密码学[M]电子工业出版社,2003.
  • 7张险峰,秦志光,刘锦德.椭圆曲线加密系统的性能分析[J].电子科技大学学报,2001,30(2):144-147. 被引量:36
  • 8张焕国,冯秀涛,覃中平,刘玉珍.演化密码与DES密码的演化设计[J].通信学报,2002,23(5):57-64. 被引量:30

共引文献79

同被引文献15

  • 1袁德明.双Logistic映射下隐藏数字图像的新方法[J].徐州建筑职业技术学院学报,2006,6(3):31-33. 被引量:4
  • 2杨文安,袁德明.基于混沌序列的密钥生成新方法[J].数学的实践与认识,2006,36(12):160-164. 被引量:3
  • 3袁德明.用双混沌映射实现的数字水印算法[J].信息安全与通信保密,2007,29(6):217-219. 被引量:1
  • 4陈相琳,刘润涛,于存光.基于DES与ECC的混合数据加密算法[J].哈尔滨理工大学学报,2007,12(1):58-61. 被引量:8
  • 5Moallem M,Earle R. Instructional design models and teacher thinking: toward a new conceptual model for research and development [J].Educational Technology, 1998, (2) : 2-6.
  • 6You Y. What Can We Learn from Chaos Theory? An Alternative Approach to Instructional Systems Design [J].Educational Technology Research and Design,2004,41(3):22-23.
  • 7Alison AC,David HJ,Mary EL, et al.Good Ideas to Foment Educationa Revolution:The Role of Systemic Change in Advancing Situated Learning, Constructivism, and Feminist Pedagog[J].Educational Technology, 1998,1(2): 11-12.
  • 8李曙华.从系统论到混沌学[M].桂林:广西师范大学出版社,2002.39-49.
  • 9[加]STINSON D R, Cryptography Theory and Practice, Second Edition[M].冯登国译.北京:电子工业出版社.2003:18-185.
  • 10KOCAREV L, JAKIMOSKI G, STOJANOVSKI T. From Chaotic Maps to Encryption Schemes [C]. Proceeding of IEEE International Symposium on Circuits and systems. Monterey: IEEE, 1998: 514- 517.

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部