Font Size: a A A

Study On Security Encryption Technology Based On Chaos System

Posted on:2008-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:L MaFull Text:PDF
GTID:2178360248952089Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of our society, the information resource gradually becomes the important constituent of the people's lives, and the information security also along with it becomes the popular topic which the people studies on, password technology is the core technology of information security. The time series produced by chaos system iteration are sensitive to initial condition, their structure is complex, difficulty to analyze and forecast, they can provide the pseudo-random sequence with good randomness, relevance and complex. It is s sole cryptology characteristic enables it extremely to suit to the encryption.The chaos password belongs to the sequence password, the sequence password is one kind of important private key password system, at present the sequence crypto-algorithm been proposed almost obtain the scrambled text by using different operation both the key flows and the plaintext, therefore the key process in the chaos system encryption is the production of the key flows, the security of system also completely relies on to the nature of key flows. In the situation when a piece of continual plaintext and the scrambled text been intercepted, the single chaos system is easily attacked by chaos reconstruction. By multi analysis and trace on the chaos process to Logistic map in this paper, the accurate value have been found ,which is able to guarantee Logistic to enter the chaotic state; based on that, taking the Logistic mapping as the chaos model, the dual chaos system has been designed, to expansion the controlling parameter, produce the dual chaos track, and resistance the threat of chaos heavy reconstruction; and the method of Fibonacci sequence perturbation have been used to map the chaos sequence into the integer space, to solute the limited precision problem of chaos application in the computer; The plaintext-length is introduced to participate the controlling the initial circulation of chaos system, enhancing the randomness of chaos sequence production, and enable the different scrambled text should be obtained through encryption even by the same initial password, further strengthen the anti- attack nature and protects the data. The experimental result indicated that, this algorithm during realization limited precision, may effectively resist a kind of known/choice plaintext attack, it overcame the malpractice that the scrambled text is decided only by user's password, and reduced risk of the password, enhancement security of the encryption data.
Keywords/Search Tags:Encryption, Chaotic Sequence, Logistic Map, Length of the Plaintext
PDF Full Text Request
Related items