期刊文献+

基于混沌控制系统的神经网络异步加密 被引量:7

Asynchronous Encryption of Neural Networks Based on Chaotic Control System
下载PDF
导出
摘要 将Chebyshev神经网络模型作为混沌控制系统辨识器,任选系统初值和非线性、非周期性控制律,通过Chebyshev混沌神经网络产生混沌序列,求出该序列的排序置换及逆置换,对明文置换后即可得密文,密文逆置换即可还原得到明文。理论分析和加密实例表明,该加密算法可异步进行,且只需改变系统初值和控制律,便可获得不同的混沌序列,从而实现"一次一密"加密,具有良好的安全性。 This paper introduces new feed-forward neural networks where hidden units employ orthogonal Chebyshev polynomials for their activation functions and uses it as the identifier of the chaotic control system.Through the Chebyshev neural networks,it can produce chaotic series by varying system initial value and nonlinear,nonperiodic control rule,calculate the sort permutation and inverse permutation of this series,and permute the plaintext to achieve ciphertext,inverse permute the ciphertext to get the plaintext.Theoretical analysis and encryption instances prove that the arithmetic can implement asynchronous one-time pad cipher encryption by varying the system initial value and control rate.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第12期160-161,共2页 Computer Engineering
关键词 神经网络 混沌 置换 异步加密 控制系统 neural networks chaos permutation asynchronous encryption control system
  • 相关文献

参考文献10

  • 1Shannon C E. Communication Theory of Secrecy System[J]. Bell System Technical urJonal, 1949, 28(4): 656-715.
  • 2Diffie W, Hellman M E. New Directions in Cryptography[J]. IEEE Trans. on lnfomation Theory, 1976, 22(6): 644- 654.
  • 3National Bureau of Standards. FIPS46-1977 Data Encryption Standard[S]. 1977.
  • 4Jeffrey H, Jill P, Silverman J H. NTRU: A Ring-based Public Key Cryptosystem[M]. Lecture Notes in Computer Science. [S. l.]: Springer Verlag, 1998.
  • 5National Institute of Standards. FIPS Encryption Standard[Z]. (2001-02-03). http://esre.nist.gov/publications/fips/fips197/fips-197. pdf.
  • 6Yang Tao, Wu C W, Chua L O. Cryptography Based on Chaotic Systems[J]. IEEE Transactions on Circuits and System-I, 1997, 44(5): 469-472.
  • 7姜丽,杨明福,黄桂敏.一种基于神经网络的多级混沌加密算法[J].计算机应用与软件,2006,23(8):106-108. 被引量:3
  • 8齐锐,张大力,阎平凡.基于神经网络的对称密码系统[J].清华大学学报(自然科学版),2001,41(9):89-93. 被引量:12
  • 9秦志光.密码算法的现状和发展研究[J].计算机应用,2004,24(2):1-4. 被引量:52
  • 10邹阿金,沈洪远.Chebyshev神经网络辨识器[J].煤矿自动化,1998(4):10-11. 被引量:10

二级参考文献14

  • 1梁学斌,吴立德.二进Hopfield型神经网络的记忆容量[J].电子学报,1996,24(4):21-23. 被引量:4
  • 2齐锐 张大力 等.数字地球中信息安全机制的探讨[J].中国图像图形学报,1999,4:37-41.
  • 3王光瑞 于熙龄 陈式刚.混沌的控制、利用与同步[M].北京:国防工业出版社,2001..
  • 4Guo Donghui,Applied Intelligence,1999年,10卷,71页
  • 5齐锐,中国图象图形学报,1999年,4卷,37页
  • 6阎平凡,人工神经网络/模型、分析和应用,1993年,91页
  • 7R Matthews. On the derivation of a 'chaotic' encryption algorithm [ J ].Cryptologia, 1989,13 ( 1 ) :29 - 42.
  • 8Murali K. Heterogeneous chaotic systems based cryptography. Phys, Lett,2000,A272(3) :184 - 192.
  • 9Dediue H, Ogorzalek M J. Identifiability and Identification of chaotic systems based on adaptive synchronization[J]. IEEE Trans Circuits & Sys I. 1997.44(10) :948-962.
  • 10Alvarez E, et al. New approach to chaotic enecryption. Phys. Lett, 1999,A 263(4-6) :373 -375.

共引文献72

同被引文献39

引证文献7

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部