Font Size: a A A

Study And Implement On Communication Security System Based On Chaos Algorithm

Posted on:2005-02-04Degree:MasterType:Thesis
Country:ChinaCandidate:X YangFull Text:PDF
GTID:2168360125463922Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
The development of computer technology bring us information era. More and more people have cognizant of the importance of information security, so a lot of countries in the world built their Infobahn urgently. Meanwhile some mobsters turn aim to destroy, filch, juggle the important information and make enormous loss for country, corporations and individual. Many developed countries constitute their own information security standard and design their own information security system. Research in this field in our country is insufficiency and need more study urgently. First, this thesis introduces the frangibility of information security system and discusses how to avoid these unsafe factors through effective managing measure. Because cryptology technology is the most important method to insure information against filched, next this thesis introduces development status of cryptology theory and some traditional cryptology.Second, abiding the information security design standard and cryptology theory, this thesis applies simple XOR operation and one-time-pad idea in a information security system based on chaos algorithm. Next this thesis discusses the characteristics of chaos phenomenon such as randomicity and sensitivity to initial value. The simulation experiment proved that chaos algorithm can generate two different random-sequences when there is little distinction in initial values. The high randomicity in chaos sequence ensure the information security, so chaos sequence can be used as secret key generator to encrypt data. Third, the question that most information security system based on complex algorithm increase burden of CPU and made computer low efficiency. The development and mass production of PLD suggest a solution that PLD are available for secret key generator. This thesis combines hardware and software to implement the design of information security system. This thesis also introduces the developing environment of PLD and gives the software flowchart of system.Last, the simulations of hardware and software show that the information security system based on chaos algorithm have high security level and high performance-value ratio.
Keywords/Search Tags:information security system, encryption, chaos algorithm, PLD
PDF Full Text Request
Related items