Font Size: a A A

Design Of Multi-dimensional Chaotic System And Application In Information Encryption

Posted on:2013-08-30Degree:MasterType:Thesis
Country:ChinaCandidate:M SunFull Text:PDF
GTID:2268330428460945Subject:Electrical theory and new technology
Abstract/Summary:PDF Full Text Request
Nowadays internet and multi-media technologies progresses at full speed, theuse of the information resources has become an important part of people’s life, whichtriggered information security problems become a focus for researchers. The chaosphenomenon occurs widely in the nature, one of the most important achievements ofnonlinear sciences consists in the knowledge of chaos, therefore, this research hasimportant guided significance as well as actual using value.Firstly, this thesis introduced the birth and development of chaos theory, andconcluded the actuality of chaos in the field of secure communication, from the viewof nonlinear dynamical analysis, the definition, characteristics and research methodsof chaos system were given. This essay analyzed the exiting model and constructed asix-dimensional chaotic system whose chaotic behavior is validated by calculatingLyapunov exponent, Matlab, the hardware circuit was designed and simulated byMultisim, which showed a perfect agreement between Multisim and Matlab simulation results.Secondly, in order to obtain complex chaotic behavior, seven-dimensional andeight-dimensional chaotic system and their implement circuit were constructed.Matlab simullation of the system and realization of circuit simullation completelyconsistent. The simulation results show that the scheme is correct and feasible.Finally, they were applied to signal encryption, image encryption and textencryption research in terms of the six-dimensional, seven-dimensional andeight-dimensional chaotic system that have been discussed. By iterating, anti-noiseand anti-damage analysis, it prove to be safe and reliable, and is of theoretical andapplied value.
Keywords/Search Tags:multi-dimensional chaos, information security, secure communication
PDF Full Text Request
Related items