Font Size: a A A

Research On Key Technology And Application Development Of The Multilayer And Multilevel Encryption Algorithm

Posted on:2013-03-12Degree:MasterType:Thesis
Country:ChinaCandidate:W P WangFull Text:PDF
GTID:2248330395963048Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The network information interaction has been widely used in military, aviation,national security, electronic government affairs, finance and online shopping, etc.Today, the network and information security problems have greatly relations not onlywith the state’s political, military and diplomatic matter, but also with the state’seconomic and business activities and individuals. Therefore, information securitytechnology is taking more and more attention from the whole society. The wideapplication of multimedia technology of the network society is a commonphenomenon. Digital image as an extremely important part in digital multimedia, hasbeen used in commercial and military secret field, its safety research receivedextensive attention. The application of the image encryption technology becomingmore and more widely, and then the requirements of the technology of imageencryption is becoming higher and higher.In this paper, we have a further research on the image encryption, and theresearch content and innovation points as follows:(1) We put forward the multilayer and multilevel encryption model. Theencryption scheme of classification and layered in the same level provides variety ofoptional solutions for different users, who has different encryption demands. Itchanged the faults of the traditional encryption algorithm has single function.(2) We put forward the first level hashing algorithm based on the principle of themolecular structure. The second level hashing algorithm based on the principle ofmixed flour. And the third level hashing algorithm is the mixed small images basedon the chaos function. The first level hashing is scrambling the pixels of the image. The second level hashing is mixed the pixels of the true image and the false image.The third level hashing is partition the image into small image blocks with same size.And then generate a chaotic sequence by the chaos function. Using the chaossequence generates a whole arrangement. At last using the whole arrangementrearrange the block images into an encryption image.(3) The multilayer and multilevel encryption algorithm reconstruction symmetryand asymmetric encryption system, sequence password and the packet password intoa new mixed password. The fourth level encryption is encrypted the keys using ECC.The fifth level encryption process is through compress the keys and encryption image,and then send to each other by the special software, which will strengthen the safetyof the image in the process of transportation.(4) According to the needs of different users, we partition the multilayer andmultilevel encryption algorithm into common secret, secret, core secret, and then wedevelop a multilayer and multilevel encryption demonstration system.The article verified the multilayer and multilevel encryption algorithm. Andanalysis the encryption results, encryption efficiency and encryption safety. Theresults show that the algorithm has good encryption effect, has large enough keyspace, and the deciphering time tend to+∞.The algorithm has prominent advantagesof the safety performance and higher efficiency. It provides a new approach formeeting the high confidential information security interactive demand in the field ofaerospace, military confidential, national security, etc.
Keywords/Search Tags:Multilayer and multilevel, Molecular structure conversion, Mixedflour, Mixed block image, Chaos function
PDF Full Text Request
Related items