Modified RSA encryption algorithm based on chaos and its application in voice encryption system

被引:3
|
作者
Yi, Wang [1 ]
Tan, Zhiping [2 ]
机构
[1] Guangdong Univ Sci & Technol, Software Engn, Dongguan 532000, Guanzhou, Peoples R China
[2] Guangdong Univ Sci & Technol, Network Engn, Dongguan 532000, Guanzhou, Peoples R China
关键词
meminductor; chaos; RSA; voice encryption system; MEMCAPACITORS; MEMRISTORS;
D O I
10.1109/CIS2018.2018.00104
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A modified RSA encryption algorithm based on meminductor chaos circuit is proposed in this paper. On the basis of the original RSA encryption algorithm, utilizing meminductor chaotic circuit generate chaos signal conceals the public key in the RSA algorithm, so it can improve information security effectively. Finally, the modified RSA encryption algorithm is used to complete the real-time voice encryption system design based on the chaotic synchronization system. The simulation results are verified by numerical simulations.
引用
收藏
页码:439 / 444
页数:6
相关论文
共 50 条
  • [1] Optimization of AES and RSA Algorithm and Its Mixed Encryption System
    Liu, Jia
    Fan, Chunlei
    Tian, Xingyu
    Ding, Qun
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 393 - 403
  • [2] A Hybrid Image Encryption Algorithm Based on Chaos System and Simplified Advanced Encryption System
    Zehui, Zhang
    Fu, Yao
    Gao, Tiegang
    INTERNATIONAL JOURNAL OF MULTIMEDIA DATA ENGINEERING & MANAGEMENT, 2020, 11 (04): : 1 - 24
  • [3] A new image encryption algorithm based on chaos system
    Zhang, H
    Feng, WX
    Hui, LZ
    Hai, LD
    Chou, LY
    2003 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS, INTELLIGENT SYSTEMS AND SIGNAL PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2003, : 778 - 782
  • [4] New image encryption algorithm based on chaos system
    Sun, Xin
    Yi, Kaixiang
    Sun, Youxian
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2002, 14 (02): : 136 - 139
  • [5] A Chaos-Based Encryption Algorithm for Database System
    Albahrani E.A.
    Lafta S.H.
    Ghayad N.H.
    Journal of Cyber Security and Mobility, 2023, 12 (01): : 25 - 54
  • [6] Authentication system based on RSA encryption
    Zhu, S.R.
    Li, W.Q.
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2001, 22 (08):
  • [7] RSA encryption algorithm based on torus automorphisms
    Kocarev, L
    Sterjev, M
    Amato, P
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 4, PROCEEDINGS, 2004, : 577 - 580
  • [8] A Novel Face Template Protection Algorithm Based on the Fusion of Chaos Theory and RSA Encryption
    Liu Yunan
    Zhao Fudong
    Xu Yanli
    Cao Yu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 315 - 329
  • [9] An Image Encryption Algorithm Based on Chaos
    Jin, Yong-Xian
    Guan, Yi-Sheng
    Zheng, Lin
    ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 3, 2011, 106 : 493 - 497
  • [10] Chaos Based Perturbation Encryption Algorithm
    Sun, Xiaoyan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ELECTRONICS, MECHANICS, CULTURE AND MEDICINE, 2016, 45 : 117 - 122