期刊文献+

Hermite混沌神经网络异步加密算法 被引量:2

An asynchronous encryption algorithm based on Hermite chaotic neural networks
下载PDF
导出
摘要 基于最佳均方逼近,采用Hermite正交多项式做为神经网络隐层的激励函数,引入一种新型的Hermite神经网络模型.通过神经网络权值和混沌初值产生性能接近于理论值的混沌序列,从中提取与明文等长的序列进行排序,将排序结果对明文置换后即可得密文.加密与解密信息完全隐藏于神经网络产生的混沌序列中,与混沌初值无显式关系,且只需改变混沌初值,便可实现"一次一密"异步加密,其安全性取决于混沌序列的复杂性和无法预测性.理论分析和加密实例表明,该加密算法简单易行,克服了混沌同步加密的诸多缺陷,具有良好的安全性. This paper introduces a new Hermite neural network model, in which orthogonal Hermite polynomials were employed as the activation functions of hidden layers of feed-forward neural networks by using best square approximation theory. By varying the chaotic initial value and regarding it as the input of the networks, new chaotic series were generated, which were close to the theoretical values. From the new chaotic series, a sub-sequence with the same length as the plain-text was extracted and sorted. Then, by replacing the sorted results with the plain-text, cipher-text was produced. In the encryption system, the information needed in encryption and decryption was hidden in the chaotic series and has no obvious relationship with the initial chaotic value. Security depends completely on the complexity and unpredictability of the chaotic sequences. By varying the initial chaotic value, we can implement asynchronous one-time pad cipher encryption. Theoretical analysis and encryption tests proved that our algorithm is useful, simple and highly secure, with many advantages that a synchronous system can never achieve.
出处 《智能系统学报》 2009年第5期458-462,共5页 CAAI Transactions on Intelligent Systems
基金 国家自然科学基金资助项目(60775050)
关键词 Hermite神经网络 正交多项式 混沌 异步加密 Hermite neural networks orthogonal polynomial chaos asynchronous encryption
  • 相关文献

参考文献12

  • 1PECORA L M, CARROLL T L. Synchronization in chaotic system[ J]. Physical Review Letters, 1990, 64 (8) : 821- 824.
  • 2CROUNSE K R, YANG T, CHUA L O. Pseudo-random sequence generation using the CNN universal machine with applications to cryptography [ C ]//Proceedings of the IEEE Intemational Workshop on Cellular Neural Networks and Their Applications. Singapore: World Scientific Press, 1996 : 433-438.
  • 3MILANOVIC V, ZAQHLOUL M E. Synchronization of chaotic neural networks for secure communications [ J ]. IEEE Intemational Symposium on Circuits and Systems, 1996, 3: 28-31.
  • 4GUO D, CHEN L M, CHEN L L. A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks [ J ]. Applied Intelligence, 1999, 10 : 71-84.
  • 5王喆,陈玲,朱双鹤.基于径向基神经网络的混沌加密方案[J].空军工程大学学报(自然科学版),2003,4(3):55-57. 被引量:1
  • 6齐锐,张大力,阎平凡.基于神经网络的对称密码系统[J].清华大学学报(自然科学版),2001,41(9):89-93. 被引量:12
  • 7姜丽,杨明福,黄桂敏.一种基于神经网络的多级混沌加密算法[J].计算机应用与软件,2006,23(8):106-108. 被引量:3
  • 8YANG Tao. Chaotic secure communication systems: history and new results [ J ]. Telecommunication Review, 1999, 9 (4) : 597--634.
  • 9YANG T, WU C W, CHUA L O. Cryptography based on chaosic systems [ J ]. IEEE Transactions on Circuits and System: Fundamental Teheory and Apphcations, 1997, 44 (5) : 469-472.
  • 10刘年生,郭东辉,吴伯僖.混沌神经网络及其在保密通信中的应用[J].电讯技术,2002,42(5):141-147. 被引量:7

二级参考文献33

共引文献26

同被引文献25

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部