Font Size: a A A

Research On Information Security System Based On Chaos Theory

Posted on:2005-08-08Degree:MasterType:Thesis
Country:ChinaCandidate:X PanFull Text:PDF
GTID:2168360125470952Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
With the advanced development of the information technology, the problem about network security and information secrecy has become a popular research theme in Information Science. In recent years, the research on chaotic phenomena in nonlinear system has been deeper and deeper. For the most important the chaotic applications draw a lot of scientists' attention. Chaotic system can produce a kind random sequence. This sequence is nonlinear, complicated, and difficult to be analyzed and predicted. Besides, it can provide good randomicity, pertinence, complexity, which makes chaos be available to be used in cryptology.In the country serve system, modern serve network construction has been great needed with the information used more and more. At the same time, we need to pay more attention to the information security. We should make sure that our information will not to be used by the inaccreditor and other countries. To do some protect measures of the management on the systems and rules is also a significant job.Basing on the above analysis, a lot of researches and applications on the theory of information security had been done in this paper. That is mainly in the serve marine information system.Firstly, the cryptology feature on the chaotic pseudo-randomicity is analyzed. Then the cipher producer is made.The point of the thesis is to design the "Net Real-Time Security Communication System". That is also one of the applications on Chaotic Cryptology. This system is to be used to encrypt the translated data on network dynamically. By much testing on the encryption of the data, image and files, the software that designed on the system of chaos has been proved to have the good effect.Besides, in this paper a compare has been done between the private key cryptology and the public key cryptology. A combination algorithm has beendesigned which can include the two cryptology excellence and avoid the shortcomings. Furthermore, a Public Key Center has been designed to manage the server network public keys.At last, aiming on the modern information battle, after taking an analysis on the nowadays server network state, the whole marine serve network system has been conceived.
Keywords/Search Tags:Information Security, Chaos, Logistic, Combination Encryption, Public Key Center
PDF Full Text Request
Related items