Font Size: a A A

Research On Application Of Chaotic Theory To XML

Posted on:2009-12-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2178360245979405Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
Chaotic mappings of chaotic system are extreme sensitive to initial conditions .They can produce massive chaotic sequence with analogous randomness, periodicity and sensitivity and have broad application foreground in data encryption. With the development of computer science and network technology, XML is gradually showing technical advantages and requirements of XML applied encryption are increasing gradually. Especially with the development of Web services technology, XML as a tool in data communion between Web services is regarded broadly. XML encryption becomes a research hotspot in network safeguard technology. This paper realized the research of application XML data encryption on chaotic theory.First, the paper thoroughly reached the birth, definition, idiosyncrasy of chaotic theory; completely expound the theory base of chaotic theory encryption.Analyzed the chaotic idiosyncrasy of Logistic mappings emphatically, the paper expounded its main shortage, completed the improved of Logistic mapping to realize the requirement by data encryption technology. The paper expounded the encryption criterion, encryption theory and encryption character, analysed the requirement and character of encryption arithmetic by XML encryption embody.The paper showed the encryption arithmetic on improved Logistic arithmetic on chaotic encryption. By chaotic encryption criterion, showed the flow of encryption criterion system. Completed the frame design of XML encryption system on chaotic theory, completed the key module.AT last, by tested and analyzed the antitype of system, the paper validated the application of chaotic theory in XML encryption and the feasibility of improved arithmetic.
Keywords/Search Tags:chaotic theory, Logistic mapping, XML encryption, chaotic encryption mechanism
PDF Full Text Request
Related items