期刊文献+

基于Feistel结构的混沌密码算法 被引量:1

Chaotic Block-Cipher Algorithm based on Feistel Structure
原文传递
导出
摘要 混沌密码学现在已经发展成为现代密码学一个必不可少的分支,利用混沌系统的伪随机性和不可重复、不可预测等特点来构造加密算法,已经是密码学研究关注的焦点,但安全问题一直没有得到很好的解决。针对这一问题,将混沌映射、S盒构造、Feistel结构和密钥扩展相互融合,提出基于混沌映射和Feistel结构的混沌密码算法,并对算法的可行性和安全性进行了分析,通过硬件仿真,证明该算法具有较好的安全性。 Chaos cryptography is now a very important branch of modern cryptography. With pseudo randomness, unrepeatability and unpredictability of chaotic system for creating encryption algorithm, this cryptography becomes the focus in crypto research. And however, its security still remains a unsolved problem. Thus, based on combination of chaotic mapping, S-box structure, Feistel structure and crypto-key extension, the chaotic crypto algorithm based on chaotic mapping and Feistel structure is proposed, and its feasibility and security is analyzed. Simulation on hardware indicates that this crypto algorithm is of fairly good security.
出处 《通信技术》 2013年第7期73-75,78,共4页 Communications Technology
关键词 混沌分组密码 混沌映射 扩展Feistel结构 chaos block cipher chaotic mapping extended feistel structure
  • 引文网络
  • 相关文献

参考文献8

二级参考文献31

  • 1蔺萌,陈乐然,刘正军.WCDMA系统安全机制研究[J].通信技术,2007,40(4):51-53. 被引量:4
  • 2郑晓丽,姜迪刚.基于单向函数树的多播密钥安全性分析[J].信息安全与通信保密,2007,29(5):127-128. 被引量:4
  • 3BAPTISTA M S. Cryptography with chaos[J]. Physics Letters A, 1998, 240(1): 50-54.
  • 4WONG W K, LEE L P, WONG K W. A modified chaotic cryptographic method[J]. Computer Physics Communications, 2000, 138(3): 234-236.
  • 5PAREEK N K, PATIDAR V, SUD K K. Discrete chaotic cryptography using external key[J]. Physics Letters A, 2003, 309(1): 75-82.
  • 6XIANG T, LIAO X E A novel block cryptosystem based on iterating a chaotic map[J]. Physics Letters A, 2006, 349(2): 109-115.
  • 7WONG W K, LEE L P, WONG K W. A modified chaotic cryptographic method[J]. Computer Physics Communications, 2001, 138(3): 234-236.
  • 8WONG K W. A fast chaotic cryptographic scheme with dynamic look-up table[J]. Physics Letters A, 2002, 298(4): 238-242.
  • 9WONG K W, HO S W, YUNG C K. A chaotic cryptography scheme for generating short ciphertext[J]. Physics Letters A, 2003, 310(1): 67-73.
  • 10YU W, CAO J. Cryptography based on delayed neural networks[J]. Physics Letters A, 2006, 356(3): 333-338.

共引文献22

同被引文献23

引证文献1

二级引证文献1

;
使用帮助 返回顶部