Font Size: a A A

Research On Public-key Encryption Based On Chaos

Posted on:2012-05-29Degree:MasterType:Thesis
Country:ChinaCandidate:T PengFull Text:PDF
GTID:2218330368477271Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In the information Age, the rapid development of computer technology and the innovation of deciphering means, which brings unprecedented challenges to cryptography.Because of the good cryptographical features, chaotic system provides a new direction for the Modern Cryptography, the surge of cryptographic algorithm based on chaos have been proposed. Because of the characteristic of aperiodic continuous broadband spectrum and noise-like, it has a natural concealment; it is a very broad prospect of application of chaos in the field of information security. The research of chaotic cryptography not only benefits to construct a new more secure encryption, but also help us to understand the existing cryptosystem, which both in theory and in practice, are very useful.In this paper, we analysed the security of a cipher based on a map of chaos,on account of the information leakage that the firstly several chaotic states generated by this encryption system is not sensitive to the change of the low order of the key, the system can effectively resist the divide-and-conquer attack after making some improvement.On that basis, we choose the chaotic system with better features,and present a public key encryption scheme by compounding two low-dimensional chaotic systems, which avoids the complex and computational of high-dimensional chaos. The result analysis illustrate that this alogritm can resist chosen-plaintext attack and divide-and-conquer attack with a well key sensitivity, it has potential developments.
Keywords/Search Tags:chaotic map, public key encryption, divide-and-conquer attack, compound
PDF Full Text Request
Related items