Font Size: a A A

Chaotic Encryption Scheme Based On Neural Networks And Its Application In Secure Communications Of IPng

Posted on:2004-07-25Degree:DoctorType:Dissertation
Country:ChinaCandidate:N S LiuFull Text:PDF
GTID:1118360122466913Subject:Condensed matter physics
Abstract/Summary:PDF Full Text Request
Networking security is one of key problems in the study of IPng, and the encryption algorithm selected for IPSec is the core of this key problem. In order to meet the requirements of multimedia real time communications via the IPng, the encryption algorithm should have higher complexity for the security of information system, and higher processing speed for the efficiency of information encryption and decryption. So, neural networks, with the properties of nonlinear dynamics such as chaotic behavior and parallel processing, are regarded as one of good design options for encryption algorithm applied in the communications of IPng. For this, my PhD project is arranged to focused on the application of neural network in the security of IPng, and summarized as follows:In order to show that the networking security mainly depends on encryption algorithms in the IPng, we detailed on the IPng protocol (i.e IPv6) and analyzed its security scheme (i.e. IPSec). Meanwhile, after summarizing the principles of conventional standard encryption algorithms and their performance, we pointed out that the computational complexity and parallel-computing ability are the key factors of encryption algorithms for applications in the real-time secure communication of IPng. And then, we analyzed the chaotic behaviors of neural networks and their parallel computing abilities, and presented the advantages of chaotic encryption scheme based neural networks for applications in IPng.As the results of my PhD research project, 4 kinds of new chaotic encryption schemes based on neural networks are proposed: (1) the symmetric block encryption scheme based on chaotic series. Using the chaotic binary series generated by neural networks, the sensitive information is encrypted in the form of group encryption; (2) the symmetric encryption scheme based on chaotic synchronization. The principle of data encryption in the scheme is implementing chaotic synchronization modulation by chaos masking; (3) the public key encryption scheme based on chaotic attractor. This scheme is derived from the previous symmetric probabilistic encryption scheme based on chaotic attractor of neural networks and Diffie-Hellman key agreement protocol. We prove that this scheme is secure and reliable from the standpoint of mathematics; (4) the images hiding scheme based on chaotic sequence. The information of hidden image is added to the transformation spectrum of cover image as a kind of noise. A legal information receiver can be extracted the hidden image using the chaotic series which he knows himself. This technique has good properties with security, imperceptibility and high hiding capacity of the hidden information.The implementation scheme of IPSec is designed according to encryption algorithms proposed in the end, and we introduce how to add encryption schemes proposed to IPSec, and how to implement IPSec in the Linux operation system.
Keywords/Search Tags:Neural Networks, Chaotic System, Encryption Scheme, IPv6, IPSec
PDF Full Text Request
Related items