Font Size: a A A

The Research Of Secured Communication Based On Chaos

Posted on:2008-07-13Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhangFull Text:PDF
GTID:2178360212985245Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The research of secured communication based on chaos is based on chaotic theory and cryptography .The research method is academic analysis and computer's simulation. Arithmetic of chaotic sequence digital encryption and decryption was given by chaotic systems which are sensitive to initial conditions and chaotic parameters, and can produce massive security sequence with analogous random sequence, correlation, broadband and continuous spectrum. Arithmetic of digital encryption and decryption that was mend achieves digital encryption and decryption.Study of digital encryption and decryption based on chaos includes mostly arithmetic design and making chaotic sequence. At first, giving some chaotic systems simulation, Logistic map was selected that is by way of object, Logistic map is validated adapts to secrecy communication by statistic characteristic. Chaotic sequence encryption arithmetic was given by chaotic encryption technology that was studied analyzed, design fundamental and encryption theories. Secondly, real number sequence by chaotic system was translated 0-1sequence,and give the model of digital encryption and flowchart. Digital encryption and decryption is realized by MATLAB process. Last, arithmetic of digital encryption and decryption is mend. The important study is hyper-chaotic systems characteristic and hyper-chaotic sequence procreant methods. The method of creating hyper-chaos sequence is proposaled in the article. hyper-chaotic sequence Hyper-chaotic sequence puts up random test in order to pledge arithmetic of digital encryption and decryption security. Satisfying result is received by analyzing hyper-chaotic sequence encryption arithmetic. The result of experiments indicates that these improved methods are relatively efficient. These methods increase abundant attack ability and sensitivity to initial secret key.
Keywords/Search Tags:Information security, Secured communication, Chaos, Digital encryption
PDF Full Text Request
Related items