首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于混沌的序列密码生成方法
引用本文:王相生,甘骏人.一种基于混沌的序列密码生成方法[J].计算机学报,2002,25(4):351-356.
作者姓名:王相生  甘骏人
作者单位:中国科学院上海冶金研究所传感器国家重点实验室CAD中心,上海,200050
摘    要:由于混沌系统对实始条件和混沌参数非常敏感以及生成的混沌序列具有非周期性和伪随机性的特性,近年来混沌系统在密码学领域中得到了较多研究,该文提出一种基于混沌的序列密码生成方法,该方法通过随改变混沌映射的参数来提高混沌的复杂性,同时在有限精度实现时,通过引入扰动序列使输出的混沌序列具有良好的自相关性、均匀分布特性和随机统计特性,而且其周期可用混沌参数改变的周期与扰动序列的周期的乘积来度量,理论研究和模拟结果表明,该混沌序列加密方法具有较好的保密性并且便于软硬件实现。

关 键 词:混沌  扰动  m序列  序列密码生成方法  密码学
修稿时间:2001年1月16日

A Chaotic Sequence Encryption Method
WANG Xiang,Sheng,GAN Jun,Ren.A Chaotic Sequence Encryption Method[J].Chinese Journal of Computers,2002,25(4):351-356.
Authors:WANG Xiang  Sheng  GAN Jun  Ren
Abstract:Chaotic systems are sensitive to initial conditions and chaotic parameters, and the chaotic sequences are non periodic and pseudo random. These properties of chaotic systems are suitable for the sequence encryption. But under the finite precision in practical application, the period and the complexity of the chaotic sequence are hard to determine, depending on different initial conditions and parameters. In this paper, a sequence encryption method based on chaos is proposed. The method makes full use of the chaotic properties. By randomly changing the parameters of discrete chaotic map, the method can improve the complexity of chaos and the anti broken strength for chosen plain texts, and enlarge the sequence period. With the introducing of appropriate perturbation aimed to change the initial conditions, the chaotic sequence has the good self correlation property, uniform distribution property and random statistical property under the finite precision in practical applications. In order to facilitate the realization of the method mentioned above, we use m sequences as the parameter sequence and the perturbation sequence. The theoretical study shows that the period of the chaotic sequence generated by this method can be measured with the product of the period of the parameter sequence and the period of the perturbation sequence. In practical applications, users can choose the appropriate m sequences as parameter sequences and perturbation sequences, according to their different requirements for security. In this paper, the software pseudo code implemented in programming and the hardware structures implemented in hardware are included, and how each part of the hardware works and cooperates is explained in details. The computer simulation results also show that the chaotic sequence has good cryptography properties. Therefore, this method is fairly good in security and can be implemented easily in both software and hardware.
Keywords:chaos  perturbation    m    sequence  sequence cipher
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号