Font Size: a A A

Based Chaotic Secure Instant Messaging Technology

Posted on:2012-02-01Degree:MasterType:Thesis
Country:ChinaCandidate:L L ZhangFull Text:PDF
GTID:2218330368994858Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With high-speed development of the integration for the computer, communications technology and electronic information technology,rapid development of information has become an inevitable trend. Countries around the world cost a lot of human resources and material resources on information systems research and development as building infrastructure. Instant messaging is a product of informatization. Informatization brings a lot of convenience and benefits, but security issues has become more and more obvious with the convenience and benefits come. Refer to security we think encrypte on information transmitted firstly, then we focus on reaserching cryptography.It is no exaggeration to say that cryptography is one of the most effective tools and key technology for information security. Modern cryptography has a lot of new password systems with the development of information security industry. It plays a pivotal role on confidentiality of the information security. RSA is the most mature and influential public-key cryptosystem in theory.Currently, the international people are discussing on encrypting and hidding information using non-traditional methods. The chaos theory is widespread using, many scientists love chaos because of its outstanding superiority. Secure communications are based on chaos and hiding technology have become hot and leading edge topics which refers on international nonlinear science and information science. It opens up a new field on researching international high-tech.This thesis is an research on theencryption and decryption of informaiton, the chaospassword theory apply to the RSA. It also foucus on the research that the feasibility of Logistic equation after Niterations produce a sequence used in the RSA of analysis and research, as encryption algorithm .then programming, testing in Linux platformfor in order to achieve encryption algorithm.
Keywords/Search Tags:IM, Information security, RSA, Chaotic encryption, Logistic mapping
PDF Full Text Request
Related items