Font Size: a A A

Comparative Studies On Chaotic And Traditional Cipher And Application

Posted on:2013-08-20Degree:MasterType:Thesis
Country:ChinaCandidate:E F ZhaoFull Text:PDF
GTID:2248330395956429Subject:Cryptography
Abstract/Summary:PDF Full Text Request
In this paper, Chaotic cipher and Traditional cipher were contrasted, and two applications were proposed, based on Chaos theory and Block cipher. Include:The indicators of performance were studied in Chaos theory. Lyapunov exponent, Discrete entropy, and Discrete chaos. The relationships were researched and calculated, from mathematical point of view, between Lyapunov exponent and Chaotic state; The methods of calculating uncertainty entropy was derived in Discrete Chaotic phase space; The relations were certificated from the definition of Discrete chaos and Lyapunov exponents.The methods of performance in traditional encryption were analyzed between traditional cipher and chaotic cipher. From the view of Structure, S-Box, P-box, operator, and security, the performance was calculated from the different parts of chaotic cryptography. The two algorithms were analyzed in the methods of traditional cipher by a large number of simulation experiments.It is present an improved scheme on differential resistance. On the differential analysis of the fixed original S-box, On the basis of the structure of the original cipher, we propose an algorithm on key generation and dynamic S-box. Based on several rounds of iteration, which takes advantage of the property of initial sensitivity in chaotic systems, this algorithm generates large key space, and dynamic S-box with good features on nonlinear and independence criterion. Theoretical and experimental results indicate that the cryptosystem has high security with differential resistance.A new chaotic image encryption algorithm based on multi dimension maps were proposed, on the basis of the research on different chaotic maps, it achieves the structure of more overall rounds of confusion stage and a single diffusion stage. It contains pixel confusion and the key stream,as well as the way of encryption operator generate.Both the simulated and statistical results and security analysis show that the proposed algorithm is of excellent encryption effect and high security, which protect the cipher against attack.
Keywords/Search Tags:Chaotic Cipher, Block Cipher, Comparative, Image encryption
PDF Full Text Request
Related items