Font Size: a A A

Information Security Study Based On Chaos Theory

Posted on:2007-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y R HuangFull Text:PDF
GTID:2178360182471304Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The chaotic theories and its applications in the information security field arestudied.The work in this paper focuses on the chaos encryption technology on theinternet application.Based on the related logistic mapping characteristics, a Chaos TEA algorithm isproposed so that the secret key space of block encryption cipher is expanded. Researchresult show that Chaos TEA algorithm has many merits such as high securityperformance, fast operate speed, numerous key space.So the Chaos TEA algorithmextremely suits for the WEB encryption. The bitmap and JPEG encryption arerespectively realized by using Chaos TEA algorithm.The simulation experimentsindicate that this encryption algorithm is easy to realize and has good encryptioneffect which ensure secure picture encryption. Based on the chaos mapping, the WEBpage data encryption/decrypt system is designed and encryption of web pageinformation such as text, image is realized.
Keywords/Search Tags:chaos, logistic map, block cipher, image encryption, WEB security
PDF Full Text Request
Related items