Font Size: a A A

Research On Encryption Algorithm Of The Piecewise Linear Chaotic Map Based On MPI

Posted on:2015-08-12Degree:DoctorType:Dissertation
Country:ChinaCandidate:X Z WangFull Text:PDF
GTID:1228330431998757Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and network technology, applications suchas e-commerce, e-government, e-mail and online games have evolved into anindispensable sector in people’s daily lives and work for their wide use. Subsequently,information security is emerging as the public’s common concern, even restrictingthe development of informatization; message encryption is an effective approach toinformation security protection, and chaotic mapping theory perfectly matches withbasic requirements of message encryption theory. The application of chaotic mappinginto information security is one of the current frontiers. At the same time, theincrease of cores in computer processing unit not only improves its computingcapacity, but also leads to the parallel development of application software.Academic circles now is very concerned about parallel encrypting algorithm, whichis studied and developed based on chaotic mapping theory and with the full use ofmulti-core computing resources, so it is of great significance to do relevant theoryand technology research and development in this field.Taken piecewise linear chaotic encryption map as the basis, this paper, throughanalyzing the relations between chaotic mapping theory and cryptography, chaoticmapping technology and on the foundation of MPI, is to research and explore suchcritical technologies as message encryption and its passing by adopting chaoticmapping theory and parallel encryption. The main goals of this paper fall into thefollowing four aspects:After analyzing encryption of logistic chaotic map, especially its features, thedefects are pointed out and corresponding improvement measures are thus provided.And an improved encryption algorithm is put forward based on the analysis of whatneeds to be paid attention to when designing this method of algorithm.In view of message exchange, a security strategy of chaotic cryptosystem isproposed on the basis of standard security model of MPI that extending messageexchange mechanism, we design an interface to enhance the security of MPI, which process doesn’t need to change the source code of MPI’s application while mends theexisted security flaws and improves the security in using.In terms of parallelization, taking safety design criteria of chaos encryptingalgorithm into consideration, we try to design and develop a MPI-based parallelencryption algorithm with both main and subordinate modules in operation.As to message encryption, through analyzing the characteristics of piecewiselinear chaotic map, an encryption way of piecewise linear chaotic map combinedwith disturbance mechanism, based on MPI model is presentedso that it has finishedthe modular design and the optimized design of the data communication model andmade parallel algorithm feasible. Finally, the effectiveness of this algorithm isverified by experiments on code security analysis, performance analysis of imageencryption and algorithm.
Keywords/Search Tags:parallel computing, chaos encryption, message passing interface, piecewise linear chaotic map
PDF Full Text Request
Related items