期刊文献+

混合公安网络中融合加密技术的研究

Researchon Fusion Encryption Technology of Blended Security Network
下载PDF
导出
摘要 公安网络系统单纯采用一种加密技术无法确保混合公安网络系统的安全,弊端明显。分析了对称加密和非对称加密技术,提出一种混合公安网络中融合加密技术,先采用二者结合的混合加密方法,对混合公安网络进行初始加密,再通过基于超混沌映射的数据融合加密算法,对混合公安网络进行再次加密,采用Chen超混沌系统形成四条混沌序列,对这四条混沌序列进行取小数部分、矩阵相乘及取索引值等变形处理,分别利用变形后的混沌序列对原始数据和密钥进行位置置乱处理,用交换位平面和按位取反处理扰乱数据值,通过加运算获取加密数据。实验结果说明,所提融合加密技术具有较高的加密效率和质量。 Pure public security network system adopts a kind of encryption technology can not ensure the safety of the pub-lic security network system is obvious. Symmetric encryption and asymmetric encryption technology is analyzed, and put forward a kind of mixed public security network encryption technology in the fusion, using a combination of hybrid encryp-tion method, first on the public security network for the initial encryption, again through the encryption algorithm based on hyperchaos of mapping data fusion, the public security network for hybrid encryption, again by Chen hyperchaos system form the four chaotic sequence, of these four chaotic sequence to fetch the decimal part, matrix multiplication, and take the deformation processing, such as index value respectively using chaotic sequence after deformation was carried out on the original data and the key position scrambling to deal with, in exchange of a plane and take the bitwise treatment disrupt the data values, by adding operation for encrypted data. The experimental results indicate that the proposed fusion encryption technology has high encryption efficiency and quality.
作者 杨虹
出处 《科技通报》 北大核心 2014年第10期175-177,共3页 Bulletin of Science and Technology
关键词 混合 公安网络 融合加密 技术 mix the public security network fusion encryption technology
  • 相关文献

参考文献5

  • 1卿丝汉.密码学与计算机网络安全[M].北京:清华大学出版社,2001:165-246.
  • 2Lian S G,Sun J S,Wang Z Q.JIN-SHENG SUN,ZHIQUAN WANG.A block cipher based on a suitable use of the chaotic standard map[J].International Journal of Chaos,Solitons and Fractals,2005,26(1):117-129.
  • 3薛香莲,张强,魏小鹏等.基于DNA序列与混沌系统的数字水印加密算[J]. Information,2009.12(6): 1279-1286.
  • 4王迤冉,朱维军,詹新生.基于图像加密的置乱性能分析研究[J].计算机工程与设计,2006,27(24):4729-4731. 被引量:16
  • 5佟晓筠,姜伟.基于混合加密技术的电子商务安全体系研究[J].微处理机,2006,27(2):44-47. 被引量:7

二级参考文献13

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部