首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于混沌理论的分布式系统的加密算法
引用本文:石季英,张磊,曹明增,许光全.一种基于混沌理论的分布式系统的加密算法[J].计算机仿真,2006,23(6):137-138,170.
作者姓名:石季英  张磊  曹明增  许光全
作者单位:天津大学自动化学院,天津,300072
摘    要:20世纪90年代开始计算机网络技术开始应用于安全管理,多年来技术手段虽然有长足的进步,但计算机网络应用水平还比较低,分布式应用系统处于起步阶段.该文介绍了分布式应用系统中信息安全的保障措施.结合混沌理论中混沌映射对初始条件的敏感性、具有白噪声的统计特性和混沌系列容易生成的特点,提出了一种采用混沌对称加密算法和一次性混沌口令身份认证技术用于增强系统安全机制的新方案.

关 键 词:分布式系统  安全  混沌加密
文章编号:1006-9348(2006)06-0137-02
收稿时间:2005-04-12
修稿时间:2005-04-12

An encryption algorithm of Distributed System Based on Chaos
SHI Ji-ying,ZHANG Lei,CAO Ming-zeng,XU Guang-quan.An encryption algorithm of Distributed System Based on Chaos[J].Computer Simulation,2006,23(6):137-138,170.
Authors:SHI Ji-ying  ZHANG Lei  CAO Ming-zeng  XU Guang-quan
Affiliation:Tianjin University, Automation College,Tianjin 300072, China
Abstract:Since 90th decade of 20th century,the technology of computer network has been applied in the safety management.Although there is substantial advance of technique means in the last years,the application level of computer network is still low.Distributed application system is still in the start stage.In this paper, the author introduces the means for ensuring the information security in the distributed application system.A new chaos-based scheme for enchancing distributed application system security is proposed.The basic idea is to utilize the chaotic map's characteristics of being sensitive to initial conditions,having the statistic property of white noises and being easy to generate chaotic sequences.The chaotic symmetric encryption algorithm and one-time chaotic password identity authentication method are given which can take over the existing security scheme.
Keywords:Distributed system  Security  Chaotic encryption
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号