期刊文献+

Annotations for symmetric probabilistic encryption algorithm based on chaotic attractors of neural networks

Annotations for symmetric probabilistic encryption algorithm based on chaotic attractors of neural networks
原文传递
导出
摘要 The security of the symmetric probabilistic encryption scheme based on chaotic attractors of neural networks is analyzed and discussed. Firstly, the key uniqueness is proved by analyzing the rotation transform matrix to avoid the attack of the equivalent key. Secondly, the distributed uniformity of the numbers "0" and "1" in the corresponding attracting domain for every chaotic attractor is analyzed by the statistics method. It is testified that the distributed uniformity can be kept if the synaptic matrix of the neural network is changed by a standard permutation matrix. Two annotations based on the results above are proposed to improve the application security of the encryption algorithm. The security of the symmetric probabilistic encryption scheme based on chaotic attractors of neural networks is analyzed and discussed. Firstly, the key uniqueness is proved by analyzing the rotation transform matrix to avoid the attack of the equivalent key. Secondly, the distributed uniformity of the numbers "0" and "1" in the corresponding attracting domain for every chaotic attractor is analyzed by the statistics method. It is testified that the distributed uniformity can be kept if the synaptic matrix of the neural network is changed by a standard permutation matrix. Two annotations based on the results above are proposed to improve the application security of the encryption algorithm.
出处 《Optoelectronics Letters》 EI 2010年第1期57-60,共4页 光电子快报(英文版)
基金 supported by the National Natural Science Foundation of China (No.60076015) the Key Science Project of Fujian Provincein China (No.2009H0037) the Science Project of Xiamen City in China (No.3502Z20081073) the Foundation for Young Professors of Jimei University in China (No.2006B003)
  • 相关文献

参考文献10

  • 1李娟,冯勇,杨旭强,黄峰.可逆映射集合的图像加密算法[J].光电子.激光,2009,20(1):78-83. 被引量:4
  • 2齐锐,张大力,阎平凡.基于神经网络的对称密码系统[J].清华大学学报(自然科学版),2001,41(9):89-93. 被引量:12
  • 3GUO Dong-Hui,HE Xiao-juan,CHEN Cai-sheng. Chi-nese Journal of Computers . 2000
  • 4HU Bing-xin,LI Ning,LV Jun. Journal of System Simula-tion . 2004
  • 5XU Shao-ping,JIANG Shun-liang,XIONG Yu-hong. Jour-nal of Optoelectronics·Laser . 2009
  • 6LI Xiangchun,TU Nan.Lottery Combination Number-Rotation Matrix[]..2001
  • 7LIU Nian-sheng,GUO Dong-hui. Optoelectronics Let-ters . 2009
  • 8Hopfield J J.Neural network and physical systems with emergent collective computational abilities[].Proceedings of the National Academy of Science.1982
  • 9Zhang Xian-da.Matrix analysis and application[]..2004
  • 10Gardner,E. Europhysics Letters . 1987

二级参考文献14

  • 1梁学斌,吴立德.二进Hopfield型神经网络的记忆容量[J].电子学报,1996,24(4):21-23. 被引量:4
  • 2齐锐 张大力 等.数字地球中信息安全机制的探讨[J].中国图像图形学报,1999,4:37-41.
  • 3Guo Donghui,Applied Intelligence,1999年,10卷,71页
  • 4齐锐,中国图象图形学报,1999年,4卷,37页
  • 5阎平凡,人工神经网络/模型、分析和应用,1993年,91页
  • 6MAOYao-bin,CHEN Guan-rong,LIANShi-guo.Anovel fast imageen-cryption scheme based on3Dchaotic baker maps[].International Journal of Bifurcation and Chaos.2004
  • 7WANG Kai,PEI Wen-jiang,ZOU Liu-hua,et al.On the Security of3D Cat Map Based Symmetric I mage Encryption Scheme[].Physics Letters.2005
  • 8ZHANG Lin-hua,LIAO Xiao-feng,WANG Xue-bing.An image encryption approach based on chaoticmaps[].Chaos Solitons Fractals.2005
  • 9Gao Haojiang,,Zhang Yisheng,Liang Shuyun,et al.A New ChaoticAlgorithm for Image Encryption[].Chaos Solitons Fractals.2006
  • 10Pareek N K,Vinod Patidar,Sud K K.Image encryption using chaotic logistic map[].Image and Vision Computing.2006

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部