期刊文献+

一种新的基于混沌映射的分组密码算法研究

A Novel Block Cipher Based on Chaotic Maps
下载PDF
导出
摘要 通过引入二进制分数及其相关运算,提出一种新的基于混沌映射的分组密码算法.该密码算法主要由三个部分组成,即基于Tent混沌映射的扩散过程和混淆过程以及基于分段线性混沌映射的密钥生成过程.分析表明,该算法具有较大的密钥空间,并在密文随机性测试、明文与密文的相关性测试、明文敏感性测试和密文敏感性测试中具有良好的表现,同时,由于将浮点运算转换成整数运算,其效率将高于其他基于混沌系统的密码算法. By introducing binary fraction and its related operations, a novel block cipher based on chaotic maps is proposed in this paper. The cryptosystem mainly include three parts ; a diffusion process, a confusion process based tent map and key generation process based on piecewise linear chaotic map. Security analysis show that the cipher has a large key space and a fairly well statistical results on random test for cipher text, correlation test between the plaintexts and the ciphertexts, plaintext sensitivity test and key sensitivity test. At the same time, it will be more efficient than other ciphers based on chaotic systems.
作者 彭飞 丘水生
出处 《小型微型计算机系统》 CSCD 北大核心 2007年第12期2162-2166,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60372004)资助 广东省自然科学基金项目(31445 20820)资助
关键词 混沌密码 分组密码 二进制分数 混沌映射 chaotic cryptosystem block cipher binary fraction chaotic maps
  • 相关文献

参考文献23

  • 1Kotulski Z, Szczepariski J. Discrete chaotic cryptography (DCC)[J]. Annalen der Physik, 1997,6(5):381-394.
  • 2alvarez G, Montoya F, Romera M, et al. Chaotic cryptosystems [C]. In: Sanson LD, editor. 33rd Annual 1999 International Carnahan Conference on Security Technology, New York: IEEE; 1999, 332-338.
  • 3Yang T. A survey of chaotic secure communication systems[J]. Int J Comp Cogn, 2004,2(2):81-130.
  • 4Li S, Analyses and new designs of digital chaotic ciphers[D]. School of Electronics and Information Engineering, Xi'an Jiaotong Unversity, 2003.
  • 5Ljeupo Kocarev, Halle KS, Eckert K, et al. Experimental demonstration of secure communications via chaotic synchronization[J]. Int J Bifurc Chaos,1992,2(3):709-713.
  • 6Naoki Masuda, Kazuyuki Aihara. Cryptosystems with discretized chaotic maps[J]. IEEE Transactions on circuits and Systems I, 2002,49 (1): 28-40.
  • 7GPerez, Cerdeira H A. Extracting messages masked by chaos [J]. Phys. Rev. Lett., 1998,45:983-988.
  • 8Short K M. Step toward unmasking secure Communication[J]. Int. J. Birfuc Chaos,1994,4(4):959-977.
  • 9Short K M. Unmasking a modulated chaotic communications scheme[J]. Int. J. Bifurc. Chaos, 1996,6:367-375.
  • 10Kohda T, Tsuneda A. Stream cipher systems based on chaotic binary sequences[C]. SCIS96-11C, 1996.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部