期刊文献+

基于混沌迭代映射的加密算法研究 被引量:2

Research on Encryption Algorithm based on Chaotic Maps
原文传递
导出
摘要 论文提出了一种新的基于混沌迭代映射的加密算法。文中采用了直接对明文ASCII编码后的0、1序列进行加密的方式,使得混沌迭代输出序列进入任意类型子区域的概率大为上升,从而大大减少了对任意明文字符进行加密时混沌迭代映射所需要进行的迭代次数。同时,文中在混沌系统中引入一个动态变化的参数来代表当前的加密进程,使得即使相同的明文,在不同的加密进程中也被加密成不同的密文。仿真表明,无论在安全性还是效率方面和已有的算法相比都有显著的提高。 In this paper, a new encryption algorithm based on chaotic map is presented. The ASCII coded plaintexts are encrypted bit by bit and the output sequence of the chaotic map falls more frequently into any kind of-intervals. Thus the number of iterations required for any plaintext alphabet is greatly decreased. On the other hand, a new random number is adopted in this method to represent the different encryption procedures. Even the same plaintexts are encrypted as different ciphertexts in different encryption procedures. The experimental results indicate that the security and efficiency can be all improved by using this method.
作者 黄方军
出处 《信息安全与通信保密》 2008年第3期62-63,共2页 Information Security and Communications Privacy
基金 中山大学青年教师科研启动基金资助项目 基金编号:1131159
关键词 混沌 明文 密文 chaos plaintext ciphertext
  • 相关文献

参考文献4

  • 1[1]Baptista M S.Cryptography with chaos[J].Phys.Lett.A,1998,240(12):50~54.
  • 2[2]Wong K W.A fast chaotic cryptographic scheme with dynamic look-up table[J].Phys.Lett.A,2002,298(4):238~242.
  • 3[3]Wong K W.A combined chaotic cryptographic and hashing scheme[J].Phys.Lett.A,2003,307:292-298.
  • 4[4]Ivarez G,Montoya F,Romera M,et al.Cryptanalysis of dynamic look-up table based chaotic cryptosystems[J].Phys.Lett.A,2004,326:211~218.

同被引文献14

  • 1王亚伟,王行愚.一种结合Cat和Logistic映射的混沌加密算法[J].东南大学学报(自然科学版),2005,35(A02):128-131. 被引量:5
  • 2赵莉,张雪锋,范九伦.一种改进的混沌序列产生方法[J].计算机工程与应用,2006,42(23):31-33. 被引量:20
  • 3邵鹏飞,王玲,孙柏.一种新的基于复合混沌模型的图像加密算法[J].信息安全与通信保密,2007,29(5):146-148. 被引量:3
  • 4谭安芬.计算机取证分析和响应程序[J].信息安全与通信保密,2007,29(8):133-135. 被引量:3
  • 5Zhou H, Ling X T. Generating Chaotic Secure Sequences with Desired Statistical Properties and High Secuirty[J]. Bifurcation and Chaos, 1997,7(01):205-213.
  • 6Ping Li, Zhong Li, of Chaos-based Siegfried Fettinger Pseudo Random-Bit et al. Application Generators in Internet-based Online Payments[J]. Studies in Computational Intelligence (SCI), 2007(37): 667-685.
  • 7伊时代信息科技有限公司.伊时代电子证据保全系统主贞[EB/OL].[2010-03-03].http://www.ezj001.com.
  • 8HURLBUT D. Fuzzy Hashing for Digital Forensic Investigators [EB/OL]. [2010-04-26]. http: //accessdata.com/downloads/media/Fuzzy_ Hashing_for_Investigators.pdf.
  • 9KORNBLUM J. Identifying Almost Identical Files Using Gontext Triggered Piecewise Hashing[J]. Digital Investigation, 2006(3):. 91-97.
  • 10WILLIAM S. Cryplography and Network Security: Principles and Practice[M]. Fourth Edition. [s.l.]: Prentice Hall, 2005.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部