Font Size: a A A

The Application Of Intelligent Computing In Cryptology

Posted on:2007-07-23Degree:MasterType:Thesis
Country:ChinaCandidate:G ChenFull Text:PDF
GTID:2178360185974493Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development and application of information technology, more and more information needs to be transmitted in network and the security and protection of information become more significant, which lead to the theory and application of cryptography a important field nowadays. Furthermore, some novel cryptography technology such as chaotic cryptography, quota cryptography are paid much attention by researchers beside conventional cryptography. In this paper, we propose a new chaotic searching simulated annealing method based on chaotic cryptography and intelligent computing to obtain cryptographically strong S-boxes.Designing new cryptographic systems based on chaotic theory become more concern since 1980s and the thought come from the similarity of chaotic theory and traditional cryptography. A strong chaotic system implies some characters of security of cipher systems and cryptographic systems contain some chaotic phenomenon. Since 1989 when two chaotic cryptography schemes were proposed by Matthews, Pecora and Carroll, chaotic cryptography has entered into a prosperous time. Many researching papers were published. Although some chaotic cipher systems have been attacked, there are still some systems which can not find effective attacking by now. At the same time, some methods on how to design chaotic cryptographic systems were put forward and these methods usually made a concrete analysis toward security of systems, which contribute to these cipher algorithms an effective application, such as creating S-boxes by chaotic systems.On the other hand, the cipher systems can be seen as a permutation systems under the controlling of key. The problem of attacking cipher systems is a mission impossible. In recent two decades, some novel optimized algorithms such as artificial neural networks, chaotic optimization, genetic algorithm, simulated annealing, tabu searching etc. which develop by simulating some nature phenomenon and these thoughts contain mathematics, physics, biology, artificial intelligence, neural network and statistic mechanics.In this dissertation, a novel method designing S-box is proposed, which combined chaotic cryptography and computing intelligence. In addition, the cryptographic properties such as the bijective property, the strict avalanche criterion, the nonlinearity, the output bits independence criterion and the equiprobable input/output XOR...
Keywords/Search Tags:chaos, cryptography, simulated annealing, information security, block cipher
PDF Full Text Request
Related items