Font Size: a A A

A Chaotic Block Cipher Can Be Used In Wsn Research

Posted on:2011-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y J TanFull Text:PDF
GTID:2208360308966741Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The information technology has been more and more advanced in today's world, the technology of information collection and processing has been an important indicator to measure information development. WSN facilitates the information collection in some special circumstances. Because of its powerful function WSN have attracted military, medical, industrial and academic attention all over the world. Many countries in the world have invested a lot of resource in the research of WSN from the physical layer to application layer.Because of its extensive application the security of WSN becomes more and more important. Of cause, the network protocol, encryption and decryption technology and key management mechanisms of WSN also attracted many eyes. However, due to the WSN's work environment, computing power, storage capacity, energy supply constraints and other issues makes the application of the encryption algorithm appropriate to the WSN shortage. The emergence of chaos theory has injected a new force to cryptography. Its structure such as the sensitivity of initial value and control parameters make the chaotic system has natural cryptography features. Introduce the chaotic system to cryptography begins a new way for the encryption algorithm design, which greatly promoted the development of cryptography.Some relevant research of chaotic block cipher that used in WSN has been done in this paper. Following, the main work of the paper will be introduced.In order to analyze the feasibility of the application of chaos to block cipher, the relevant characteristics of chaotic system have been summarized.Some analysis methods of chaotic and block cipher have been summarized to provide theoretical support for the following algorithm analysis.A chaotic block cipher used in WSN has been introduced firstly. Then the feasibility of the application of differential analysis algorithm to CS algorithm has been analyzed. After 3 rounds and 4rounds analysis to the CS algorithm, the key has been obtained successfully. Some conflicts between CS algorithm and block cipher design principles have been found after the algorithm analysis. After principles have been discussed, some improvements on the algorithm have been done, as well as the improvement reason. At last, some data based on the simulation by Matlab. The comparison that between CS algorithm and its improvement edition base on the simulation data prove the latter has better security.
Keywords/Search Tags:Wireless Sensor Network, Chaotic Block Cipher, Differential Analysis, Cryptography
PDF Full Text Request
Related items