期刊文献+

基于Logistic混沌映射的三角形加密体制

Triangular Crypto-system Based on Logistic Map
在线阅读 下载PDF
导出
摘要 针对多变量三角形体制中Jonquières映射的明密文之间存在线性关系导致无法抵抗线性攻击的缺陷,研究Jonquières体制的中心映射中非线性扰动方法。通过将一维混沌Logistic映射及其同步反馈映射进行离散化后对Jonquières体制的中心映射进行扰动,利用混沌序列的非线性特性,破坏明密文之间的线性关系,使线性攻击实施的先决条件不成立,以增强Jonquières体制的安全性。安全性分析表明,进行混沌扰动后的Jonquières体制的明密文之间不存在线性关系,能抵抗线性化攻击。 The linearity relationship between plain texts and cipher texts encrypted by Jonquières map,which is a kind of multivariate triangular cryptosystem,leads to a great security challenge to linear attack.A non-linear perturbation is propose to the central map of Jonquières system.To make the linear attack be ineffective,the onedimension Logistic map and its synchronous feedback map are perturbed into the central map of Jonquières system.Because of the non-linearity of chaos system,the linearity relationship of inputs and outputs are broken.And thus,the security is improved.The analysis confirms that the linear attack doesn ’t work on the chaos perturbed Jonquières system.
出处 《科学技术与工程》 北大核心 2013年第18期5203-5206,5239,共5页 Science Technology and Engineering
基金 上海市晨光计划(09CGB07)资助
关键词 线性 混沌 安全 映射 linearity chaos security map
  • 相关文献

参考文献12

  • 1DiffeE W, Hellman M. New directions in cryptography. Information Theory, IEEE Transactions on, 1976; 22(6) : 644-654.
  • 2Jacques P, Nicolas C, Louis G. FLASH, a fast multivariate signature algorithm topics in cryptology-CT-RSA 2001; Proceedings of the Cryptographers'Track at RSA, San Francisco, April 8-12, 2001, Springer, 2001:298-307.
  • 3Dubois V, Fouque P A, Shamir A, et al. Practical cryptanalysis of SFLASH; Proceedings of the International Crytology Conference- CRYPTO 2007, Santa Barbara, California, USA, August 19-23, 2007 ,Springer-Verlag, 2007:1-12.
  • 4Ding J, Gower Jason E, Schimid D. Multivariate public key erypto- systems. New York : Springer, 2006.
  • 5Wolf C. Multivariate quadratic polynomials in public key cryptogra- phy. Mierl~ : Leuven, 2005.
  • 6Jacques P. Hidden fields equations (HFE) and isomorphisms of pol- ynomials (IP) : two new families of asymmetric algorithms. Advances in Cryptology-EUROCRYFF ' 96, Saragossa, Spain, May 12-16, 1996 ; 1070 : 33-48.
  • 7Jacques P, Louis G. Trapdoor one-way permutations and muhivariate polynomials Information and Communications Security. Han Y, Oka- moto T, Qing S. Information and Communications Security Lecture Notes in Computer Science. Berlin/Heidelberg: Springer, 1997: 356-368.
  • 8Wang Houzhen, Shen Changxiang, Xu Zhenquan,et aL Multivariate public-key encryption scheme based on error correeting codes. China Communications, 2011 ; 17 (04) : 23 -31.
  • 9Yang Xiao-ping, Jing Fu. The design and implementation of a chaos Cryptography. Journal of Sichuan Normal University (Natural Sci- ence), 2004; 27(4) : 431-433.
  • 10袁利国.基于Logistic模型的几类系统的动力学研究及其参数估计.广州:华南理工大学,2012.

二级参考文献6

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部