期刊文献+

时空混沌自同步流密码系统

A Spatiotemporal Chaos Based Self-synchronizing Stream Cryptosystem
下载PDF
导出
摘要 提出了由单向二维耦合的映象格点组成新的时空混沌自同步流密码系统,它能够产生并输出N2个平行混沌流密码.研究表明,该系统具有高安全性、快加密(解密)速度和强抗信道噪声能力,它的密码性质优于所有已知的混沌密码系统. A two-dimensional one-way coupled map lattice is proposed for cryptography of self- synchronizing stream cipher, which N^2 space units produce chaotic stream outputs in parallel. It is observed that the system has high practical security, fast encryption (decryption) speed and excellent reliability against strong channel noise, and its overall cryptographic properties are considerably better than known chaotic cryptosystems.
出处 《徐州师范大学学报(自然科学版)》 CAS 2007年第3期1-7,共7页 Journal of Xuzhou Normal University(Natural Science Edition)
基金 江苏省高校自然科学基金资助项目(06KJB140110)
关键词 自同步流密码 时空混沌 自我检测 自我纠错 self-synchronizing stream cipher spatiotemporal chaos self-checking self-correction mechanism
  • 相关文献

参考文献23

  • 1Lorenz E N.Deterministic nonperiodic flow[J].J Atoms Sci,1963,20:130.
  • 2Ott E,Grebogi C,Yorke J A.Controlling chaos[J].Phys Rev Lett,1990,64(11):1196.
  • 3Pecora L M,Carroll T L.Synchronization in chaotic systems[J].Phys Rev Lett,1990,64(8):821.
  • 4Kocarev L,Halle K S,Eckert K,et al.Experimental demonstration of secure communications via chaotic synchronization[J].Int J Bifurcation Chaos,1992,2(3):709.
  • 5Cuomo L M,Oppenheim A V.Circuit implementation of synchronized chaos with applications to communications[J].Phys Rev Lett,1993,71(1):65.
  • 6Kocarev L,Parlitz U.General approach for chaotic synchronization with applicatons to communication[J].Phys Rev Lett,1995,74(25):5028.
  • 7Baptista M S.Cryptography with chaos[J].Phys Lett A,1998,240:50.
  • 8Xiao Jinhua,Hu Gang.Synchronization of spatiotemporal chaos and its application to multichannel spread spectrum communization[J].Phys Rev Lett,1996,77(20):4162.
  • 9Hu Gang,Xiao Jinhua,et al.Synchronization of spatiotemporal chaos and its applications[J].Phys Rev E,1997,56(3):2738.
  • 10Sundar S,Minai A A.Synchronization of randomly multiplexed chaotic systems with application to communication[J].Phys Rev Lett,2000,85(25):5456.

二级参考文献11

  • 1[1]Short K M.Steps toward unmasking secure communications[J].Int J Bifurcation & Chaos,1994,4(4):959.
  • 2[2]Short K M.Unmasking a modulated chaotic communications scheme[J].Int J Bifurcation & Chaos,1996,6(2):367.
  • 3[3]Perez G,Cerdeira H.Extracting message masked by chaos[J].Phys Rev Lett,1995,74(11):1970.
  • 4[4]Short K M,Parker A T.Unmasking a hyperchaotic communication scheme[J].Phys Rev(E),1998,58:1159.
  • 5[5]Parker A T,Short K M.Reconstructing the keystream from a chaotic encryption scheme[J].IEEE Trans Circuits Syst(I),2001,48(5):624.
  • 6[6]Zhou Ch S,Lai C H.Extracting messages masked by chaotic signals of time-delay systems[J].Phys Rev(E),1999,60:320.
  • 7[7]Alvarez G,Montoya F,Romera M.Cryptanalysis of a chaotic encryption system[J].Phys Lett(A),2000,276:191.
  • 8[8]Ponomarenko V I,Prokhorov D.Extracting information masked by the chaotic signal of a time-delay system[J].Phys Rev(E),2002,66:026215.
  • 9[9]Wu C W,Chua L O.A simple way to synchronize chaotic systems with applications to secure communication systems[J].Int J Bifurcation & Chaos,1993,3(6):1619.
  • 10[10]Hu G J,Feng Zh,Meng R L.Chosen ciphertext attack on chaos communication based on chaotic synchronization[J].IEEE Trans Circuits Syst(I),2003,50(2):275.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部