Font Size: a A A

The Research Of Network Video Encryption Based On The Chaotic Theory

Posted on:2010-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:M J CaoFull Text:PDF
GTID:2178360278466930Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As popularity of the computer networks, the security of data transmission has gain widespread attention. A secure network information system should ensure that integrity, confidentiality, non-reputation. At present, there a many different methods to ensure the security of transmission and network, while the date encryption is the score keys of them. And the information encryption is also the main component of the present cryptography. Data encryption at the major-key encryption has the traditional system and the public key encryption system.The paper first introduced problems which hosts may face in this area where the network improved so much. And told the way to solve these problems when the data in transmission. Then in data encrypting case, focused on the problems that met in the date transmitting.The article based on cryptography introduced the common data encrypting theory and encryption algorithms: symmetric encryption, asymmetric encryption algorithms and discussed password flow generating. In resent years, chaos synchronization in communication application became the hot point in nonlinear science research.Thesis expounded from the formation of chaos theory through the initial understanding of the chaotic theory, integrated the predecessors'researching, quote the method that has a profound improved in the future of data encryption: the theory of data encryption based on chaotic theory. As the conclusion of the previous methods of data encryption algorithm, base on the previous research, analysis the algorithm and inherit the merits of the old ones then put forwarded my own method. To improve the algorithm, optimized it then had a more secure chaotic password algorithm which is more difficult to be broken. Which is called the encrypting algorithm based on Logistic mapped chaotic sequences. The algorithm use XOR and repeatedly instead operation between the initial sequence and the chaotic sequence generated by the chaotic sequence generate implement made the encrypted key, use the key to encrypted the file and have the last ciphertexe.Finally, through the examples used in the practical application: chaotic encryption used in voice, pictures and the video files transferring application, compared with previous analysis of the encryption algorithm, and we can see that this encryption algorithm has a compared rapidly speed and more secure assurance strengths in the modern network data transmission.
Keywords/Search Tags:network security, data encryption, chaos theory, encryption algorithm
PDF Full Text Request
Related items