期刊文献+

一种基于神经网络的多级混沌加密算法 被引量:3

A MULTISTAGE CHAOTIC ENCRYPTION ALGORITHM BASED ON NEURAL NETWORK
在线阅读 下载PDF
导出
摘要 混沌信号具有良好的伪随机性,可用于构成加密系统。提出了一种基于多级混沌模型进行加密的算法,并在此基础上利用混沌对误差的极端敏感性,通过神经网络对误差反向传播,改进算法,使其具有更高的保密性。实验表明该算法安全性好,易于实现。 The chaotic sequence is pseudo-random, and it can be used to compose encryption system. This paper gives a multistage chaotic encryption algorithm. Because chaos is extremely sensitive to error,we use the neural network which can spread error to improve the algorithm. The simulation reveals that the algorithm is more security and easier to implement.
出处 《计算机应用与软件》 CSCD 北大核心 2006年第8期106-108,共3页 Computer Applications and Software
关键词 混沌 LOGISTIC方程 加密 神经网络 Chaos Logistic function Encryption Neural network
  • 相关文献

参考文献8

  • 1王光瑞 于熙龄 陈式刚.混沌的控制、利用与同步[M].北京:国防工业出版社,2001..
  • 2R Matthews. On the derivation of a 'chaotic' encryption algorithm [ J ].Cryptologia, 1989,13 ( 1 ) :29 - 42.
  • 3Murali K. Heterogeneous chaotic systems based cryptography. Phys, Lett,2000,A272(3) :184 - 192.
  • 4Dediue H, Ogorzalek M J. Identifiability and Identification of chaotic systems based on adaptive synchronization[J]. IEEE Trans Circuits & Sys I. 1997.44(10) :948-962.
  • 5Alvarez E, et al. New approach to chaotic enecryption. Phys. Lett, 1999,A 263(4-6) :373 -375.
  • 6匡锦瑜,邓昆,黄荣怀.利用时空混沌同步进行数字加密通信[J].物理学报,2001,50(10):1856-1861. 被引量:63
  • 7易开祥,孙鑫,石教英.一种基于混沌序列的图像加密算法[J].计算机辅助设计与图形学学报,2000,12(9):672-676. 被引量:111
  • 8周黎晖,彭召旺,冯正进,钟廷修.混沌加密系统的保密性能[J].上海交通大学学报,2001,35(1):133-138. 被引量:12

二级参考文献17

  • 1[1]Pecora L M, Carroll T L. Synchronization in chaotic systems[J]. Phys Rev Lett, 1990,64(8):821~824.
  • 2[2]Pecora L M, Carroll T L. Driving systems with chaotic signals[J]. Phys Rev A, 1991,44:2374~2383.
  • 3[3]Short K M. Steps toward unmasking secure communicatios[J]. Int J Bifurcation & Chaos, 1994,4 (4):959~977.
  • 4[4]Short K M. Unmasking a modulated chaotic communications scheme [J]. Int J Bifurcation & Chaos,1996,6(2):367~375.
  • 5[5]Dedieu H, Ogorzalek M J. Identifiability and identification of chaotic systems based on adaptive synchronization [J]. IEEE Trnas Circuits & Syst I,1997,44(10): 948~962.
  • 6[6]Kocarev L, Parliz U. General approach for chaotic synchronization with applications to communication [J]. Phys RevLett, 1995,74(25) :5028~5031.[J]. Phys RevLett, 1995,74(25) :5028~5031.
  • 7[7]Kocarev L, Parlitz U. Generalized synchronization,predictability, and equivalence of unidirectionally coupled dynamical systems [J]. Phys Rev Lett,1996,76(11): 1816~1819.
  • 8[8]Parliz U, Junge L, Kocarev L. Synchronizationbased parameter estimation from time series [J].Phys Rev E,1996,54(6):6253~6259.
  • 9[9]Kelber K. N-dimensional uniform probability distribution in nonlinear auto-regressive filter structures [J]. IEEE Trans Circ & Syst I,2000,47(9):1413~[J]. IEEE Trans Circ & Syst I,2000,47(9):1413~1418.
  • 10[10]Baranousky A, Daems D. Design o{ one-dimensional chaotic maps with prescribed statistical properties [J]. Iht J of Bifurcation and Chaos, 1995,5(6): 1585[J]. Iht J of Bifurcation and Chaos, 1995,5(6): 1585~1598.

共引文献183

同被引文献28

  • 1张小红,黄剑,谢斐.混沌时间序列在密码学应用中的随机性测试[J].信息技术,2005,29(8):1-4. 被引量:3
  • 2胡汉平,董占球.混沌流密码研究[J].计算机安全,2005(9):10-13. 被引量:6
  • 3刘建夏.一种混沌伪随机序列的设计及其应用[J].计算机工程,2005,31(18):150-152. 被引量:12
  • 4于为中,马红光,王令欢.混沌退化及其在加密过程中的影响[J].计算机工程与应用,2005,41(30):77-80. 被引量:2
  • 5PECORA L M, CARROLL T L. Synchronization in chaotic system[ J]. Physical Review Letters, 1990, 64 (8) : 821- 824.
  • 6CROUNSE K R, YANG T, CHUA L O. Pseudo-random sequence generation using the CNN universal machine with applications to cryptography [ C ]//Proceedings of the IEEE Intemational Workshop on Cellular Neural Networks and Their Applications. Singapore: World Scientific Press, 1996 : 433-438.
  • 7MILANOVIC V, ZAQHLOUL M E. Synchronization of chaotic neural networks for secure communications [ J ]. IEEE Intemational Symposium on Circuits and Systems, 1996, 3: 28-31.
  • 8GUO D, CHEN L M, CHEN L L. A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks [ J ]. Applied Intelligence, 1999, 10 : 71-84.
  • 9YANG Tao. Chaotic secure communication systems: history and new results [ J ]. Telecommunication Review, 1999, 9 (4) : 597--634.
  • 10YANG T, WU C W, CHUA L O. Cryptography based on chaosic systems [ J ]. IEEE Transactions on Circuits and System: Fundamental Teheory and Apphcations, 1997, 44 (5) : 469-472.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部