期刊文献+

超混沌强化对称加密算法的研究与应用 被引量:6

Study on encrypt arithmetic of symmetry enforced by hyper-chaos and its application
下载PDF
导出
摘要 混沌系统对初始值的极端敏感,使得它呈现出类随机性和数据难以预测的特点,因此在安全通信和算法加密设计方面得到了许多应用。数字签名技术是网络信息传输过程中经常应用的加密技术,不同于多数系统中经常采用的非对称加密技术,提出了一种基于超混沌强化对称加密算法的数字签名技术,通过对DES算法的入口参数进行混沌加密,而使得对称算法得到了进一步的增强,给出了数字签名算法的实现过程并给出了该方法在局域网信息安全传输中的应用。 The chaotic system is sensitive to initial values that makes it has some characters such as randomization and unpredictability, so chaos is widely used in secure communication and encryption. A new digital signature method that is different from asymmetric encrypt algorithms often used in most digital signature systems, is proposed based on encrypt arithmetic of symmetry enforced by hyper-chaos, the symmetric encrypt algorithms is enforced by encrypting entry parameters of the DES arithmetic. The process of digital signature is presented and application of the proposed method in transmission of information based on network is stated explicitly.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第1期36-37,65,共3页 Computer Engineering and Design
基金 国家自然科学基金项目(60374037)
关键词 超混沌系统 对称加密算法 非对称加密算法 数字签名 局域网 hyper-chaotic system encrypt arithmetic of symmetry asymmetric encrypt algorithms digital signature local area network
  • 相关文献

参考文献7

  • 1Xiao gang Wu.Analyzing and improving a chaotic encryption method[J].Chaos,Solitons and Fractals,2004,22:367-373.
  • 2Ercan Solak.On the security of a class of discrete-time chaotic cryptosystems[J].Physics Letters A,2004,320:389-395.
  • 3Chen Guanrong,Mao Yaobin,Chui Charles K.A symmetric image encryption scheme based on 3D chaotic cat maps Chaos[J].Solitons and Fractals,2004,21(3):749-761.
  • 4赵耿,方锦清.现代信息安全与混沌保密通信应用研究的进展[J].物理学进展,2003,23(2):212-255. 被引量:39
  • 5Gao Tie-gang,Chen zeng-qiang,Chen guan-rong,et al.A hyperchaos generated from Chen's system[J].International Journal of Modern Physics C,2006,17:102-107.
  • 6Chen G,Ueta T.Yet another chaotic attractor[J].Int J of Bifurcation and Chaos,1999,9:1465-1466.
  • 7Lee N Y.Security of shao's signature schemes based on factoring and discrete logarithms[J].IEEE Proc Comput Digit Tech,1999,149(4):119-121.

二级参考文献9

共引文献38

同被引文献49

  • 1高铁杠,陈增强,袁著祉,顾巧论.基于混沌密码流的IC卡数据加密算法设计与实现[J].仪器仪表学报,2006,27(1):58-60. 被引量:4
  • 2卢明欣,来学嘉,肖国镇,秦磊.基于DNA技术的对称加密方法[J].中国科学(E辑),2007,37(2):175-182. 被引量:17
  • 3刘先波,王昭顺.数字信封在智能卡对称密钥传输中的应用[J].航空计算技术,2007,37(3):80-82. 被引量:4
  • 4Sunil Lee,Yoo C D,Kalker T.Reversible watermarking:current status and key issues[J].Intemational Journal of Network Secu- rity,2006,2(3 ): 161-171.
  • 5Thodi D M,Rodriguez J J.Expansion embedding techniques for reversible watermarking [J]. IEEE Transactions on Image Pro- cessing,2007,16(3):721-730.
  • 6Stmil Lee, Yoo C D, Kalker T. Reversible image watermarking based on integer-to-integer wavelet transform[J].IEEE Trans on Information Forensics and Security,2007,2(3):21-330.
  • 7Dinu Coltuc,Jean-Marc Chassery.Very fast watermarking by re- versible contrast mapping [J]. IEEE Signal Processing Letters, 2007,14(4):255-258.
  • 8Hu Yongjian,Byeungwoo Jeon.Reversible visible watermarking and lossless recovery of original images[J].IEEE Transactions on Circuits and Systems for Video Technology, 2006,16 (11): 1423-1429.
  • 9Tsenga Hsien-Wen,Changb Chin-Chen.An extended difference expansion algorithm for reversible watermarking[J].Image and Vision Computing,2008,26(8): 1148-1153.
  • 10Weng Shaowei,Zhao Yao,Pan Jeng-Shyang,et al.Reversible water- marking based on invariability and adjustment on pixel pairs[J]. IEEE Signal Processing Letters,2008,15(1):721-724.

引证文献6

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部