期刊文献+

离散超混沌同步保密通信系统的设计与分析 被引量:2

Secure Communication System Using Discrete Hyper-chaotic Synchronization
下载PDF
导出
摘要 十多年来,混沌保密通信由于其良好的特性而受到了极大的关注.Solak发现用已知明文攻击和选择明文攻击可以成功攻击离散混沌加密方法.本文提出一种将离散混沌同步和分段线性函数加密技术相结合以获得较高安全性的改进方案.仿真结果及分析表明,新的保密通信系统具有抵抗已知明文攻击,选择明文攻击以及EFA攻击的能力. In the past decades, chaos secure communication has been paid much attention due to its desirable properties. It is found by Solak that known plaintext and chosen plaintext attacks can successfully be launched to against discrete-time chaotic encryption method. In this paper, an improved scheme, which is in combination with discrete-time chaotic synchronization and piece-wise linear function encryption technique, is proposed to obtain higher security. Simulation results and analysis show that the new secure communfcation system can resist known plaintext attacks, chosen plaintext attacks and EFA attacks.
作者 龙敏 丘水生
出处 《小型微型计算机系统》 CSCD 北大核心 2008年第5期933-935,共3页 Journal of Chinese Computer Systems
关键词 混沌同步 离散混沌加密 保密通信 chaos synchronization discrete-time chaotic encryption secure communication
  • 相关文献

参考文献11

  • 1Pecora L M,Carroll T L. Synchronization in chaotic systems [J]. Physics Review Letter, 1990, (64) :821-824.
  • 2Chen G R, Dong X N. From chaos to order: methodologies, perspectives and applications [J]. World Scientific, Singapore, 1998.
  • 3Pikovsky A, Maistrenko Y. Synchronization: theory and application[M]. KIuwer Academic Pubnshers,2003.
  • 4Long Min,Qiu Shui-sheng ,Peng Fei. Secure communication system based on discrete hyperchaotic synchronization[J]. Chinese Journal of Radio Science,2006,21(1) : 74-78.
  • 5Long Min, Qiu Shui-sheng, Peng Fei. Design and simulation of a chaotic signal generator for secure communication system[J]. Journal of South China University of Technology (Nature Science), 2005,33(6) :1-4.
  • 6Angeli A D, Genesio R, Tesi A. Dead-beat chaos synchronization in discrete- time systems[J]. IEEE Trans. Circutis and System Ⅰ,1995,42(1) :54-57.
  • 7Lian K Y, Chiang T S, Liu P. Discrete-time chaotic systems, applications in secure communications[J]. Int. J. Bifurcation and Chaos. 2000,10 (9) : 2193-2206.
  • 8Solak E. Cryptanalysis of observer based dlscrete-time chaotic encryption schemes [J]. Int. J. Bifurcation and chaos. 2005,15 (2) :653-658.
  • 9Alvarez G, Montoya F, Romaera M, et al. Cryptanalyzing a discrete-time chaos synchronization secure communication system[J]. Chaos, Solitons and Fractals, 2004,21 :689-694.
  • 10Wang X G, Zhan M, Lai C H, et al. Error function attack of chaos synchronization based encryption schemes [J]. Chaos. 2004, 14(1) :128-137.

同被引文献23

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部