Based on Elliptic Curve and Combination Chaos Mapping Security System

被引:0
|
作者
Liang, Dongying [1 ]
机构
[1] Shenzhen Inst Informat Technol, Shenzhen, Peoples R China
关键词
chaos; Hash algorithm; elliptic curve; chaotic map; COMMUNICATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new type of chaotic map based on the combination of chaotic encryption methods are given based on the new pseudo-random number generator of the Hash table transformation principle, In this program, the elliptic curve algorithm is used for the key distribution. After the linear transformation, the original chaotic sequence generated by drive system can be combined to chaotic mapping, converted to an encryption key sequence and constructed as Hash table for message authentication. Chaotic maps on the combination of means of communication to establish a mathematical model was designed and implemented a test bed. Corresponding experimental results show that in low-dimensional chaos and high-dimensional spatio-temporal chaos, or chaotic environment. This program is effective and safe and reliable.
引用
收藏
页码:868 / 872
页数:5
相关论文
共 15 条
  • [1] SECURE RANDOM NUMBER GENERATION USING CHAOTIC CIRCUITS
    BERNSTEIN, GM
    LIEBERMAN, MA
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, 1990, 37 (09): : 1157 - 1164
  • [2] Clarifying chaos: Examples and counterexamples
    Brown, R
    Chua, LO
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1996, 6 (02): : 219 - 249
  • [3] CHENG QS, 2009, J ELECT INFORM TECHN, V35, P120
  • [4] [龚美静 Gong Mei-jing], 2009, [电子与信息学报, Journal of Electronics & Information Technology], V31, P1442
  • [5] Breaking a chaotic direct sequence spreading spectrum secure communication system
    Hu Jin-Feng
    Guo Jing-Bo
    [J]. ACTA PHYSICA SINICA, 2008, 57 (03) : 1477 - 1484
  • [6] [黄丽莲 Huang Li-lian], 2009, [电子与信息学报, Journal of Electronics & Information Technology], V31, P2402
  • [7] Generalized projective synchronization of chaotic system based on a single driving variable and its application in secure communication
    Li Nong
    Li Jian-Fen
    [J]. ACTA PHYSICA SINICA, 2008, 57 (10) : 6093 - 6098
  • [8] Matthews R., 1989, Cryptologia, V13, P29, DOI DOI 10.1080/0161-118991863745
  • [9] MI B, 2006, COMPUTER ENG APPL, P141
  • [10] Sun X H, 2006, CHINESE J SCI INSTRU, V27, P805