Font Size: a A A

Research And Design Of Secure Communication System Based On Chaos

Posted on:2016-12-01Degree:MasterType:Thesis
Country:ChinaCandidate:L GuoFull Text:PDF
GTID:2180330461956036Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of modern science and technology, Internet technology is also changing with each passing day. Nowadays,Internet is more and more irreplaceable in people’s lives,and the Internet can be used in health care, education, business and even defense.With Internet technology, people can use the Internet to send text, sound, images, video and other information to any place in the world.However,every coin has two sides.Unternet technology have brought great convenience to people around the world, attacks against Internet information is also increasing.After the United States, "Prism" program exposure, network and information security has become a hot topic in academia, business and government sectors of common concern.The sensitivity of the initial value of the chaotic signal and class random nature of chaotic sequence coincide with chaotic featrue of encryption system.Mixing characteristics of chaotic orbits coincides with the encryption system diflusibility.The correlation between this cryptography and chaos theory’s featrues make their combination inevitable.This paper aims to design a video encryption transport system based on chaos.First, I found that the chaotic sequence used in the field of video encryption will have broad prospects,by analyzing chaotic sequences and cryptography system respectively.Then,analyz-ed the Logistic chaotic sequence generated by the system:in theory, it will produce no cycle Logistic chaotic random number sequence;In reality,because of the processor’s limited accuracy,some data will be lost in each data processing.after several iterations,it will degenerate into a cycle sequence, and Logistic chaotic sequence distribution is not uniform. Proposed to a solution that combine different sequencer:by using sequence generated by Lorenz system and generalized third-order Fibonacci system cascaded to interface Logistic chaotic sequence,and the program will be used as a basic chaotic sequence generator of this system.The video image encryption is divided into two stages:scrambling and spread.In the stage of scrambling,by using stack to break the Cat map’s cycle to make video image scramble and inverse scrimble.In the stage of spread,by using the proposed new basic chaotic sequence generator to make the scrambled data XOR spread.Next.proposed to a double private anonymous authentication based on elliptic curves and key synchronization algorithm,certification sides generate different signatures,bidirectional signature verification to ensure system security.In the final stage of authentication, achiving initial key synchronization to ensure both encryption sides encryption and decryption in the same initial conditions.Finally, to design a complete program of the video encryption transport system,which can achive these function:online video surveillance, online meetings, online education, and local video encryption and decryption.Meanwhile related experiments have been designed to verify the performance of the system.
Keywords/Search Tags:the generalized Fibonacci sequence, Lorenz chaotic system, Logistic chaoticmapping, Cat mapping, Elliptic curve, Video encryption
PDF Full Text Request
Related items