Font Size: a A A

Chaotic Neural Network And A Public Key Encryption Algorithm Implementation And Application In The Mail System

Posted on:2012-02-23Degree:MasterType:Thesis
Country:ChinaCandidate:W W TangFull Text:PDF
GTID:2218330368498308Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In 1990 K.Aihara et al. introduces the chaotic dynamical behavior concept of biological neuron into the academic research of the neural network,which made the behavior model of the neural network closer to the thinking process of human brain. The discovery simulated people to make a further practical study on the relevant aspect of neural network. And because of the complex characteristic of the chaos system,which is essential for cryptology research,the chaotic neural network was gradually brought into the field of encryption communication. And it is just started the stage for the research of public key cryptography based on chaotic neural networks.This article has carried on the introduction and the analysis to public key cryptography based on chaotic neural networks,and aimed to make the improvement to the existing algorithm.Has researched Overstoraged Hopfield neural network (OHNN) emphatically,and given analysis to strange attractors according from its structural property. Has researched the public key encryption concept and the background,has studied the Diffie.Hellman key consultation algorithm emphatically and introduced based on the status revelation third party attack.Has researched and given analysis to one kind of public key scheme based on the chaotic neural network, Has given the analysis and the improvement to the algorithm according to the avalanche effect as well as the choice of attraction domain.By adopting a kind of hybrid-coding and chaotic map,the modified algorithm performs better result on avalanche test. The result from the test on avalanche,cipher-text balance and independence indicates that the modified algorithm performs much better on resisting decryption.The research of cryptosystem based on chaotic neural network still in the preliminary stage and there are more researches needed to be done in this field.
Keywords/Search Tags:Secure communications, Public key cryptosystem, Chaotic neural network, Attractor
PDF Full Text Request
Related items