期刊文献+

基于Logistic映射的非线性组合混沌流密码的设计与分析 被引量:2

A Design and Analysis for Non-linear Combination Chaotic Stream Cipher Based on Logistic Map
下载PDF
导出
摘要 在深入剖析了Logistic映射特性的基础上,把传统组合流密码的构造方法和混沌序列的密码学特性有机地结合起来,提出了基于Logistic映射的非线性组合混沌流密码算法的设计思想,给出一类非线性组合生成器的构造方法,并对该算法产生的混沌序列进行了联邦测试和密码学特性分析,结果验证了该算法具有良好的不可预测性和随机统计性,具有一定的应用价值。 After researching the characteristic of chaos cipher and thorough analysis in Logistic mapping, it brings about a design idea of non-linear chaotic stream cipher algorithm based on the Logistic mapping. That is, according to the design guideline of non-linear generator, it brings about a method of constructing nonlinear combination generator, and re- alizes such chaotic stream cipher generator. Then it analyses the algorithm that brought about in this paper, gives the cycle of the nonlinear chaos stream cipher. By FIPS140-1 test, the result shows that the key generated by the algorithm given in this dissertation has ability against statistical analysis, and the analysis of linear complexity and k-error linear complexity affirms that the sequences generated are also not able to forecast.
出处 《弹箭与制导学报》 CSCD 北大核心 2007年第2期370-374,共5页 Journal of Projectiles,Rockets,Missiles and Guidance
关键词 LOGISTIC映射 非线性 组合生成器 混沌 流密码 logistic map non-linear combination generators chaos stream cipher
  • 相关文献

参考文献8

  • 1May R M. Simple mathematical models with very complicated dynamics[J]. Nature, 1976. 261:459-467.
  • 2Rueppel R A. Analysis and design of stream cipher[M]. Berlin: Springer Verlag. 1986.
  • 3T Siegenthaler. Correlation immunity of nonlinear combining functions for cryptographic applications[J]. IEEE Trans. on Information Theory, 1984, IT30: 776-782.
  • 4Xiao Guo-zhen, Massey J L. A spectral characterization of correlation immune combining functions [J]. IEEE Trans. on Information Theory, 1988. 34(3): 569-571.
  • 5Jennifer Seberry, Zhang Xiao-mo and Zheng Yu-liang. Structures of cryptographic functions with strong avalanche characteristics[A]. Advances in Cryptology-asiacrypt' 94[C]. LNCS, Springer-Verlag, 1994.
  • 6A Menezes,P van Orschot and S Vanstone. Handbook of applied cryptography [M]. CRC Press. 1996.
  • 7Heather L Kanser. A proposal for a binary stream cipher based on chaos theory [D]. A Thesis of Florida Atlantic University, 2000.
  • 8Games R A. Chan A H. A fast algorithm for determining the complexity pseudo-random sequence with period 2^n[J]. IEEE Trans. Information. Theory, 1983. 29(1): 144-146.

同被引文献13

  • 1刘艳飞,雒芬.AES算法分析与实现[J].福建电脑,2007,23(1):68-68. 被引量:1
  • 2鹿钦鹤,任涛.AES算法的研究[J].长春理工大学学报(自然科学版),2007,30(1):83-85. 被引量:5
  • 3丁汉吉,何蕾,阮树骅.AES算法研究及实现分析[J].网络安全技术与应用,2007(11):80-81. 被引量:15
  • 4Masakawa, Ochiai T. Design of Reed- Solomon Codes for OFDM Systen s with Clipping and Filtering [ C]// IEEE Conference on Wireless Communications and Networking, WCNC. Kowloon : IEEE. 2007:1361 - 1366.
  • 5Abel A, Schwarz W. Chaos Communications-Principles, Schemes, and System Analysis [ J ]. Proceedings of the IEEE. 2002,90(5 ) :691-710.
  • 6李辉.数字混沌通信[M].北京:清华大学出版社,2006:35-36.
  • 7Prasad K, Rajan B S. Convolutional Codes for Network- Error Correction[ C ]// IEEE Global Telecommunications Conference. Honolulu : IEEE,2009 : 1-6.
  • 8Proakis J G. Digital Communications [ M ]. Fourth Edi- tion. Beijing: Publishing House of Electronics Industry, 2006 : 465-466.
  • 9Nyirongo N, Wasim Q Malik, David J Edwards. Concat- enated RS-Convolutional Codes for Uhrawideband Muhi- band-OFDM [ C]// IEEE International Conference on Source. Waltham: IEEE, 2006 : 137-142.
  • 10May R M. Simple Mathemaical Model with Very Com- plicated Dynamics[J]. Nature. 1976(261 ) :281-459.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部