期刊文献+

混沌量化算法研究及测试分析 被引量:1

Research on chaotic quantization algorithm and test analysis
下载PDF
导出
摘要 对在信息安全应用中的各种混沌伪随机序列的产生方法进行了研究,对各种典型的一维混沌量化算法的性能进行了随机性测试分析和比较。试验结果显示,被大量采用的二值量化算法以及多次粗粒化算法均存在一些安全缺陷,因此提出了若干改进混沌量化算法,为混沌在信息安全中的应用提供了指导。 This paper described the theory of generating pseudo-random sequence based on the chaotic map in the application of information security,and the performances of some typical quantization methods in one-dimensional chaotic systems were analyzed.The analysis and experimental results demonstrate that some kinds of methods,which were frequently used have some security flaws.So this paper can give some help for the use of chaotic system in the application of information security.Finally,some suggestions for improving chaotic quantization algorithm are proposed in the end.
出处 《微型机与应用》 2010年第19期13-15,24,共4页 Microcomputer & Its Applications
关键词 混沌序列 混沌量化 随机性测试 信息安全 chaotic sequence chaos quantization random testing information security
  • 相关文献

参考文献5

二级参考文献16

  • 1周红,凌燮亭.有限精度混沌系统的m序列扰动实现[J].电子学报,1997,25(7):95-97. 被引量:99
  • 2E.N.Lorenz.混沌本质[M].北京:气象出版社,1997..
  • 3朱之辕 徐功仁.混沌系统与随机系统的转换及其控制[J].东北化工学院学报,1997,13(5):616-622.
  • 4Bruce Shneier.Applied Cryptography:protocols algorithms,and source code in C[M].John Wiley & Sons,Inc 1996.
  • 5Kocarev LChaos-based Cryptography :a Brief overview[J].IEEE Circuits and Systems Magazine,2001 ; 1(3) :6-21.
  • 6Shannon C E.Communication theory of secrecy systems[J].Bell Systems Technical Journal, 1949 ; 28:656-715.
  • 7Rivlin T J.Chebyshev polynomials John Wiley and sons[M].INC.NEW YORK, 1990.
  • 8Joan Daemen,Vincent Rijmen.谷大武译.高级加密标准(AEs)算法[M]. 清华大学出版社.2003.
  • 9R Matthews.On the derivation of a chaotic encryption algorithm[J]. Cryptologia, 1989 ; 13 ( 1 ) : 29-42.
  • 10Tohru Kohda.Statistics of Chaotic Binary Sequences[J].IEEE trans on information, 1997 ;43.

共引文献26

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部