Font Size: a A A

Study And Implementation Of The Chaotic Encryption Algorithm

Posted on:2010-03-28Degree:MasterType:Thesis
Country:ChinaCandidate:C B LiuFull Text:PDF
GTID:2178360278465835Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development and wide application of communication technology and network technology, more and more information has been transmitted through the network. Therefore, the security of information is getting more and more important. The cryptography, which aims at the security of information, has become of the important research fields in information science and technology. Several new branches in this field such as chaotic cryptography and quanta cryptography have also attracted many research's interests.Chaotic system is sensitive to initial conditions and chaotic parameters, and can produce massive high security sequence with analogous randomness, correlation, broadband and continuous spectrum. The unique characteristics of cryptography make suitable for encryption sequence. The main purpose of this dissertation is to investigate the theory and application of Logistic chaotic cryptography.This paper describes the characteristic of chaotic cryptography and sequence cryptography, the problem and solution of are discussed for the application of chaotic system in encryption sequence system. Encryption sequence is an important mechanism of private-key cryptosystem. At present, the proposed algorithm in encryption sequence is based on exclusive or key stream and plaintext. Therefore, generated the key stream is the key of the application of chaotic cryptography, and the security of system also completely decided by the property of key stream. In the condition of continual plaintext and cipher text are captured, the single chaotic system vulnerable to be attack by chaotic reconstruction. Chapter III analyzed Logistic map in chaotic system, accurately found the value of parameter which be able to guarantee to enter the chaotic state. Taking the Logistic map as chaotic model, it designs and realizes the couple chaotic system, which is extended control parameter and produced the couple chaotic tracks for the resistance of the chaotic threat. Fibonacci sequence is to map the integer space and it is the solution of chaotic in limited precision. Therefore, this method can obtain the different cipher text through using the same initial password encryption.The main contributions of this paper are as follows:1. Research on the network security and the chaotic cryptography, proposed the solution of encryption about double data with chaotic cryptography.2. It analyzed the behavior of the user and the security of chaotic cryptography, designed the overall to the cryptography system and finished the demand design of the cryptography system module.3. It finished the chaotic cryptography in safety requirements for telecommunication user, carried on the preliminary confirmation to each module, tested through the security of network; finished the research about the practicability of cryptography system, designed the framework for the system.4. Research on the Logistic map and the Fibonacci perturbation technology gave the improvement comment to the double byte safety performance.5. It analyzed the characteristic of Shanxi telecommunication, carried on the user's request, and realized the feasibility of chaotic cryptography in the current networks.6. It finished the module of encryption examination, generated the parameter chaotic cryptography module, and finished the test work about the chaotic cryptography output module.Along with the development, chaotic cryptography system will also obtain further development and the efficiency algorithm will be see, and it will the solution of the security of network.
Keywords/Search Tags:Information security, Encrypted caculation, Chaotic encryption, Logistic mapping, Dual chaotic sequence
PDF Full Text Request
Related items