| With the continuous development of Network socialization, therelationship between the network and people’s lives is growing more and moreclose. In our lives, the network can be said to be pervasive,From the basicneeds of clothing, food, shelter, to the way to communicate with friends,fromthe common shopping online to the arrival of mobile micro era and so on,none of which can not indicate clearly the importance of Internet technologyand influence of Internet in our lives.Internet has brought us convenience, but also increases the risk ofinformation leakage.“PRISMâ€â€œApple IP trackingâ€and so on, theinformation leaked through the Internet again and again, they all show theimportance and its inevitability of maintaining network security. It is not justthe needs to protect personal privacy, but also a natural way to safeguardnational security.Cryptographic techniques is the essential measures to safeguard theInternet security.This article studies hybrid encryption algorithm based onchaotic system through the way of theoretical research, practical proof andsummary,and its main process are roughly as follows.First, the importance of maintaining network security is pointed out, theirreplaceable role of Cryptographic techniques in the field of network securityis further pointed out, by multi-angle such as theory and the facts.Secondly, the definition and the basic characteristics of chaos, thecommon chaotic map are introduced. At the same time, existing renownedcryptographic algorithms are described and analysed in detail,then theirfeatures (including their advantages and weaknesses) are pointed out.Thus thenew direction of cryptographic algorithms are explored.Third, Mixed encryption algorithm of DES and RSA based a chaos maphas been constructed by generating the key of DES algorithm through a chaos map. The hybrid encryption algorithm is described in detail, and the hybridencryption algorithm design and implementation of a Java program isdesigned, and at last the communication process of this algorithm and one ofits application in authentication field is discussed.Finally, several encryption algorithms mixed with DES and ECC based onmulti-chaotic map are discussed by the introduction of multi-chaotic system.. |