期刊文献+

一种基于混沌和密钥交换的流加密算法

Stream Ciphers Algorithm Based on Chaos and Key Exchange
下载PDF
导出
摘要 传统的流加密算法,存在密钥分发和管理以及加密强度不高两大难题。在本文中,利用混沌及密钥交换的思想,提出了一种新颖的流加密算法。该算法首先由密钥交换得到混沌初始值,再由混沌映射和明文进行有机结合,生成密钥流,然后与明文进行按位异或运算,得到密文。由于混沌加密能够有效的提高加密强度,同时密钥交换可以很好的解决密钥分发和管理的难题。因此,该算法能够改善传统流加密算法中存在的两大难题。 The distribution and management of the keys and the low security are two main problems in the traditional stream ciphers. In this paper, we present a novel method of stream ciphers based on chaos and key exchange. In this method, we obtain the original value by the key exchange, then produce the stream of keys by Logistic map and the text itself, then XOR the text in bit with the stream of keys, and get the cipher at last. It is shown that the proposed algorithm greatly improves the distribution and management of the keys and the low security.
出处 《信息通信》 2008年第4期8-10,23,共4页 Information & Communications
关键词 密钥交换 混沌 LOGISTIC映射 RSA算法 流密码 Key exchange Chaos Logistic map RSA Stream cipher
  • 相关文献

参考文献14

  • 1[1]Richanrd Spillman.经典密码学与现代密码学[M].北京:清华大学出版社,2005.
  • 2[2]Tang K.W,Tang W.K.S.,Man K.F A chaos-based pseudo-random number generator and its application in voice communications[J].International Journal of Bifurcation and Chaos,2007,17(3):923~933.
  • 3[3]Zhang L,Liao X,Wang X.An image encryption approach based on chaotic maps[J].Chaos,Solitons and Fractals,2005,24(3):759-765.
  • 4[4]Guan Z,Huang F,Guan W Chaosbased image encryption algorithm[J].Physics Letters A,2005,346(1-3):153~157.
  • 5[5]Kristina K..General design rules for chaos-based encryption systems[J].International Symposium Nonlinear Theory and its Applications,2005,2005(1):465-468.
  • 6[6]Chen GR,Mao YB,ChuiCK.A symmetricimage encryption scheme based on 3D chaotic cat maps[J].Chaos,Solitons and Fractals,2004,21(3):749-61.
  • 7[7]Kocarev L,Jakimoski G.Pseudorandom bits generated by chaotic maps[J].IEEE Trans.Circuits System,2003,50(1):123-126.
  • 8[8]Hu G,Feng Z,Meng R.Chosen ciphertext attack on chaos communication based on chaotic synchronization[J].IEEE Transactions on Circuits and Systems-I:Fundamental Theory and Applications,2003,50(2):275~279
  • 9[9]Kocarev L,Chaos-based cryptography:A brief overview[J].IEEE Circuits and Systems,2001,1(3):6-21.
  • 10[10]Cuenot J B.ChaoS shift keying With an optoelectronic encryption system using chaos in waVelength[J].IEEE Journal of Quantum Electronics,2001,7(37):849-855.

二级参考文献11

  • 1Pecora L M, Carroll T L. Synchronization in chaotic systems [J]. Physical Review Letters, 1990,64 (8): 821-824.
  • 2Kocarev U, Parlitz L. General approach for chaotic synchronization with applications to communication[J]. Physical Review Letters, 1995,74(25): 5028-5031.
  • 3Shannon C E. Communication theory of secrecy system[J]. Bell System Technical J, 1949,28(4): 656-715.
  • 4Jakimoski G, Kocarev L. Chaos and cryptography:Block encryption ciphers based on chaotic maps [J].IEEE Trans on Circuits and Systems - I, 2001,48 (2):163-169.
  • 5Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps[J]. Int J Bifurcation and Chaos, 1998,8(6): 1259-1284.
  • 6Cheng H, Li X. Partial encryption of compressed images and video [J]. IEEE Trans on Signal Processing, 2000,48(8) : 2439-2451.
  • 7Robert A,Matthews J.On the Derivation of a Chaotic Encryption Algorithm[J].Cryptologia,1989,13(1):29-42.
  • 8Shujun L,Xuanqin M,Yuanlong C.Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-cipher Cryptography[C]//Proceedings of the Progress in Cryptology--the 2^nd International Conference on Cryptology,India.2001:316-329.
  • 9Shihong W,Weirong L,Huaping L,et al.Periodicity of Chaotic Trajectories in Realizations of Finite Computer Precisions and Its Implication in Chaos Communications[J].International Journal of Modern Physics B,2004,18 (17-19):2617-2622.
  • 10Kocarev L,Jakimoski G.Pseudorandom Bits Generated by Chaotic Maps[J].IEEE Transactions on Circuits and Systems-Ⅰ:Fundamental Theory and Applications,2003,50(1):123-126.

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部