期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
A self-adapting image encryption algorithm based on spatiotemporal chaos and ergodic matrix 被引量:3
1
作者 罗玉玲 杜明辉 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第8期316-324,共9页
To ensure the security of a digital image, a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper. First, the plain-image is divided into different bloc... To ensure the security of a digital image, a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper. First, the plain-image is divided into different blocks of the same size, and each block is sorted in ascending order to obtain the corresponding standard ergodic matrix. Then each block is encrypted by the spatiotemporal chaotic system and shuffled according to the standard ergodic matrix. Finally, all modules are rearranged to acquire the final encrypted image. In particular, the plain-image information is used in the initial conditions of the spatiotemporal chaos and the ergodic matrices, so different plain-images will be encrypted to obtain different cipherimages. Theoretical analysis and simulation results indicate that the performance and security of the proposed encryption scheme can encrypt the image effectively and resist various typical attacks. 展开更多
关键词 spatiotemporal chaos ergodic matrix standard map image encryption
原文传递
Public Key Cryptography Based on Ergodic Matrices over Finite Field 被引量:8
2
作者 PEI Shihui ZHAO Hongwei ZHAO Yongzhe 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1525-1528,共4页
A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over fini... A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over finite fields. This problem has been shown to be NP-complete and can't be solved with polynomial time algorithm. 展开更多
关键词 ergodic matrix strong matrix public key cryptography
在线阅读 下载PDF
Polynomial Time Algorithm for the Two-Side Exponentiation Problem about Ergodic Matrices over Finite Field
3
作者 GU Chunsheng JING Zhengjun YU Zhiming 《Wuhan University Journal of Natural Sciences》 CAS 2012年第3期233-237,共5页
By using the minimal polynomial of ergodic matrix and the property of polynomial over finite field,we present a polynomial time algorithm for the two-side exponentiation problem about ergodic matrices over finite fie... By using the minimal polynomial of ergodic matrix and the property of polynomial over finite field,we present a polynomial time algorithm for the two-side exponentiation problem about ergodic matrices over finite field (TSEPEM),and analyze the time and space complexity of the algorithm.According to this algorithm,the public key scheme based on TSEPEM is not secure. 展开更多
关键词 ergodic matrix characteristic polynomial finite field public key cryptography
原文传递
Cryptanalysis of Key Exchange Protocol Based on Tensor Ergodic Problem
4
作者 Chunsheng Gu Youyu Gu +2 位作者 Peizhong Shi Chunpeng Ge Zhenjun Jing 《China Communications》 SCIE CSCD 2018年第10期172-181,共10页
Recently, Mao, Zhang, Wu et al. constructed two key exchange(KE) protocols based on tensor ergodic problem(TEP). Although they conjectured that these constructions can potentially resist quantum computing attack, they... Recently, Mao, Zhang, Wu et al. constructed two key exchange(KE) protocols based on tensor ergodic problem(TEP). Although they conjectured that these constructions can potentially resist quantum computing attack, they did not provide a rigorous security proof for their KE protocols. In this paper, applying the properties of ergodic matrix, we first present a polynomial time algorithm to solve the TEP problem using O(n^6) arithmetic operations in the finite field, where n is the security parameter. Then, applying this polynomial time algorithm, we generate a common shared key for two TEP-based KE constructions, respectively. In addition, we also provide a polynomial time algorithm with O(n^6) arithmetic operations that directly recovers the plaintext from a ciphertext for the KE-based encryption scheme. Thus, the TEP-based KE protocols and their corresponding encryption schemes are insecure. 展开更多
关键词 key exchange KE-based encryption tensor decomposition ergodic matrix
在线阅读 下载PDF
A Resistant Quantum Key Exchange Protocol and Its Corresponding Encryption Scheme 被引量:11
5
作者 MAO Shaowu ZHANG Huanguo WU Wanqing LIU Jinhui LI Shuanbao Wang Houzhen 《China Communications》 SCIE CSCD 2014年第9期124-134,共11页
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua... The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc. 展开更多
关键词 ergodic matrix tensor problem resist quantum key exchange protocol ENCRYPTION
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部