首页 | 本学科首页   官方微博 | 高级检索  
     

混沌系统的变参数前后反馈加密算法
引用本文:毛永毅,邓子超.混沌系统的变参数前后反馈加密算法[J].计算机工程与应用,2011,47(36):115-117.
作者姓名:毛永毅  邓子超
作者单位:1. 西安邮电学院研究生部,西安,710061
2. 西安邮电学院通信与信息工程学院,西安,710061
基金项目:陕西省自然科学基金项目(No.2009JM8015)
摘    要:将混沌映射应用于信息文档加密中,设计了一种基于Logistic映射简单快速的加密算法。为了提高信息加密的安全性和增大密钥空间,选取两个系统参数和初始迭代次数作为密钥,通过明文和密文共同反馈改变Logistic映射的迭代次数且由迭代值反馈改变系统参数和初值,实现对明文的动态加密。仿真结果表明,该算法能够有效地抵抗混沌系统常见的相图攻击、统计攻击和穷举攻击。

关 键 词:数据加密  变参数  Logistic映射  输入-输出反馈
修稿时间: 

Encryption algorithm of input-output feedback based on chaos map
MAO Yongyi,DENG Zichao.Encryption algorithm of input-output feedback based on chaos map[J].Computer Engineering and Applications,2011,47(36):115-117.
Authors:MAO Yongyi  DENG Zichao
Affiliation:1.Department of Postgraduate,Xi’an University of Posts and Telecommunications,Xi’an 710061,China 2.Department of Communications and Information Engineering,Xi’an University of Posts and Telecommunications,Xi’an 710061,China
Abstract:A simple and fast encryption algorithm based on Logistic map is designed for the encryption of the information documents.In order to enhance the security of the encryption system and increase the key space,the Logistic map’s iterations are changed by the plaintext and ciphertext through a common feedback,and then the values of system parameters are altered by the iterative feedback.So the plaintext can be encrypted dynamically.The simulation results show that the encryp- tion algorithm can effectively resist the common assault of chaotic systems,like phase diagrams attack,statistical attack,and brute-force attack.
Keywords:data encryption  dynamic parameter  Logistic map  input-output feedback
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号