期刊文献+

基于混沌序列的密钥生成新方法 被引量:3

A New Method of KEY Generation Based on Chaotic Sequence
原文传递
导出
摘要 设计了一种从混沌序列生成密钥的新方法.其基本原理是从混沌序列依次取若干数据构成实值序列,将其按非线性规则映射成二值序列,再用实值序列和任意指定序列分别置乱这个二值序列,被置乱后的二值序列即为所生成密钥.实验表明,在混沌密码体制研究中,这种密钥较一般序列密钥更具有独立性、均匀性和不可预测性. This paper is about a design of a new method for generating the keys from Chaotic sequence. The basic principles of this method can be summarized as follows: firstly, much data was collected in turn from Chaotic sequence to constitute a real value sequence; secondly, the real value sequence was mapped into binary sequence in terms of nonlinear rules; lastly, this binary sequence was disarranged respectively by use of the real value sequence and randomly designated sequence. Thus the disarranged binary sequence was the generated KEY. The experiments indicated that this key is more independent, symmetrical and unpredictable than the key with general sequence in the research of key cryptosystem.
出处 《数学的实践与认识》 CSCD 北大核心 2006年第12期160-164,共5页 Mathematics in Practice and Theory
基金 徐州建筑职业技术学院自然科学基金(JYA30409)
关键词 混沌序列 密码体制 密钥 chaotic sequence cryptosystem KEY
  • 相关文献

参考文献6

  • 1冯登国编著..网络安全原理与技术[M].北京:科学出版社,2003:379.
  • 2[加]Douglas Rstinson(冯登国译).Cryptography Theory and Practice,Second Edition[M].北京:电子工业出版社,2003.1-185. 被引量:1
  • 3[美]Bruce Scllneier(吴世忠等译).Apptied Cryptography Protocols,Algorithms,and Source Codein C(Second Edition)[M].北京:机械工业出版社.2000.261-330. 被引量:1
  • 4王丽娜,郭达等.倍息隐藏技术实验教程[M].武昌:武汉大学出版社,2004.25-262. 被引量:1
  • 5Kocarev L, Jakimoski G, Stojanovski T, Parlitz U. From chaotic maps to encryption schemes, In Proc[J]. IEEE Int Sym CAS,1998,4:514-517. 被引量:1
  • 6齐东旭著..分形及其计算机生成[M],1994:211.

同被引文献25

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部