期刊文献+

基于一维混沌映射的文件加密算法设计与实现 被引量:1

Design and Implementation of the File Encryption Algorithm Based on One Dimensional Chaos Method
在线阅读 下载PDF
导出
摘要 利用混沌影射的方法设计了一种多随机性的文件加密算法.分析了数据加密和Logistic混沌映射的原理,提出了基于混沌方法的多随机性文件加密算法,采用VB完成了文件加密软件的设计.软件测试表明:该加密算法的混沌特性和多随机特性增加了解密的难度,提高了加密数据的安全性,实现了密钥的随机生成和加密算法的随机调用,使得加密后的文件更加安全. A multiple random file encryption algorithm is presented based on the Logistic chaos method. The basic principles of data encryption and Logistic chaos are analyzed, and the file encryption software by using VB is designed. Software testing results show that the chaos character and the multiple random character of the algorithm increase decryption difficulty and the security of encrypted data. The method implements the random creation of secret key and the random call of encryption algorithm, which can increase the security of encrypted files.
出处 《中北大学学报(自然科学版)》 EI CAS 2007年第6期517-520,共4页 Journal of North University of China(Natural Science Edition)
关键词 混沌加密 文件加密 密钥 随机 信息安全 chaos encryption file encryption secret key random information security
  • 相关文献

参考文献3

二级参考文献8

  • 1张雅,冯登国.换位密码及其前景展望[J].北京邮电大学学报,2003,26(z1):134-136. 被引量:7
  • 2Kocarev L, Tasev Z. Public-Key Encryption Based on Chebyshev Maps[ J ]. ISCAN '03 Proceedings of the 2003 International Symposium, 2003,3(3) :Ⅲ-28-Ⅲ-31.
  • 3Xiao D, Liao X, Tang G,et aI. Using Chebyshev Chaotic Map to Construct Infinite Length Hash Chains[J ]. ISCAS'04 Proceedings of the 2004 International Symposium ,2004,1(5) : 11 - 12.
  • 4Xiao D, Liao X, Wong K. An Efficient Entire Chaos-Based Scheme for Deniable Authentication [ J ]. Chaos,Solitons and Fractals,2005,23(4):1327- 1331.
  • 5Kocarev L. Chaos-Based Cryptography: A Brief Overview[J].Circuits and Systems Magazine, IFEE,2001,1(3) :6- 21.
  • 6Kocarev L, Sterjev M, Amato P. RSA Encryption Algorithm Based on Toms Automorphisms[ J ]. ISCAS '04 Proceedings of the 2004 International Symposium,2004,4(5) :IV-577-80.
  • 7Kohda T, Fujisaki H. Jacobian Elliptic Chebyshev Rational Maps[J]. Physica D,2001,148(3) :242 - 254.
  • 8朱鲁华,陈荣良.数据库加密系统的设计与实现[J].计算机工程,2002,28(8):61-63. 被引量:84

共引文献23

同被引文献10

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部