期刊文献+

输出-密文混和反馈混沌流密码的设计 被引量:4

Design of chaotic output-cipher feedback stream cryptosystems
下载PDF
导出
摘要 针对利用混沌轨道信息的密码分析,设计了一种输出-密文混和反馈模式的混沌流密码.使用一类区间数目参数化的分段线性混沌映射,通过多次迭代此类映射产生混沌信号.混沌信号的奇数位用来生成密钥流,偶数位和密文合并后作为后续状态反馈给密钥流发生器.在有限精度实现时,通过引入m序列扰动,克服混沌系统的有限精度效应对密钥流的影响.理论分析和试验结果表明,产生的密钥流具有良好的统计特性,密码系统是安全的,便于软硬件实现;并且可以在算法级调节加密速度,满足不同应用的速度要求. The chaotic output-cipher feedback mode (OCFM) stream cipher was developed to resist attacks based on chaotic orbits. The chaotic signals were generated based on iterating the piecewise linear chaotic map (PLCM) with a segment number parameter (SNP). Odd bits were used to produce the key streams. After being incorporated, the even bits and ciphers were fed back as the next state of the key stream generator. When the chaotic systems were realized with finite precision, the perturbation approach was applied to remedy the finite precision effect, and the perturbation signal was m-sequence. Theoretical analysis and experimental results show that the OCFM cipher is secure and easy to be realized by hardware or software, and that the encryption speed can be adjusted to meet the application requirement at the algorithm level.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2006年第11期1972-1975,共4页 Journal of Zhejiang University:Engineering Science
关键词 混沌密码 密钥序列 有限精度效应 chaotic cipher key stream finite precision effect
  • 相关文献

参考文献11

  • 1KOCAREV L,JAKIMOSKI G,STOJANOVSKI T.From chaotic maps to encryption schemes[C]∥ Proceeding of IEEE International Symposium on Circuits and Systems.Monterey:IEEE,1998:514-517.
  • 2FORRE R.The Henon attractor as a keystream generator[C]∥ Advances in Cryptology-EuroCrypt'91.Berlin:Spinger-Verlag,1991:76-81.
  • 3ALVAREZ E,FERNONDEZ A,GARCIA P,et al.New approach to chaotic encryption[J].Physics Letters A,1999,263(4-6):373-375.
  • 4JIRI F.Symmetric ciphers based on two-dimensional chaotic maps[J].International Journal of Bifurcation and Chaos,1998,8(6):1259-1284.
  • 5桑涛,王汝笠,严义埙.一类新型混沌反馈密码序列的理论设计[J].电子学报,1999,27(7):47-50. 被引量:40
  • 6HABUTSU T,NISHIO Y,SASASE I.A secret key cryptosystem by iterating a chaotic map[C]∥Advances in Cryptology-EuroCrypt'91.Berlin:Spinger-Verlag,1991:127-140.
  • 7ZHOU Hong,LING Xie-ting.Generating chaotic secure sequences with desired statistical properties and high security[J].International Journal of Bifurcation and Chaos,1997,7(1):205-213.
  • 8SHORT K M.Signal extraction from chaotic communications[J].International Journal of Bifurcation and Chaos,1997,7(7):1579-1597.
  • 9王云峰,沈海斌,严晓浪.一类分段线性混沌映射及其密码应用研究[J].浙江大学学报(工学版),2006,40(10):1725-1727. 被引量:3
  • 10GOLOMB S W.Shifted register sequences[M].Laguna Hills:Aegean Park,1982.

二级参考文献15

  • 1杨义先.密钥序列设计的迹函数方法[J].电子学报,1995,23(10):6-10. 被引量:5
  • 2周红,凌燮亭.有限精度混沌系统的m序列扰动实现[J].电子学报,1997,25(7):95-97. 被引量:99
  • 3Th.Beth.以远程混沌复制为基础的密码体制的分析.1995欧美密会选择[M].北京:密码与信息编码部,1995.45-56.
  • 4欧美密会(译),以远程混沌复制为基础的密码体制的分析,1995年,45页
  • 5MATTHEWS R.On the derivation of a chaotic encryption algorithm[J].Cryptologia,1989,8 (1):29-42.
  • 6ZBIGNIEW K,JANUSZ S.Discrete chaotic cryptography[J].Annalen der Physik,1997,6(5):381-394.
  • 7ZHOU H,FENG J.A new idea of using one-dimensional PWL map in digital secure communications-dual-resolution approach[J].IEEE Transactions on Circuits and Systems-Ⅱ:Analog and Digital Signal Processing,2000,47(10):11071111.
  • 8NAOKI M,KAZUYUKI A.Cryptosystems with discretized chaotic maps[J].IEEE Transactions on Circuits and Systems-Ⅰ:Fundamental Theory and Application,2002,49(1):28-40.
  • 9ZHOU H,LING X T.Problems with the chaotic inverse system encryption approach[J].IEEE Transactions on Circuits and Systems-Ⅰ:Fundamental Theory and Application,1997,44(3):269-271.
  • 10LI S J,ZHENG X,MOU X Q,et al.Chaotic encryption scheme for real-time digital video[C]∥ Proceeding of SPIE Volume 4666.Scan Jose:Kehtarnavaz,2002:149-160.

共引文献41

同被引文献27

引证文献4

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部