基于复合离散混沌的自同步流密码

Weng Yifang, Zheng Rong, Chen Yi
{"title":"基于复合离散混沌的自同步流密码","authors":"Weng Yifang, Zheng Rong, Chen Yi","doi":"10.1109/COGINF.2009.5250746","DOIUrl":null,"url":null,"abstract":"A new methodology by combining chaotic generalized synchronization technique with composite discrete chaotic mappings for self-synchronous stream cipher is proposed to meet the need of secure communication in distributed virtual reality battlefield. The work also concerns the decline of sensitivity to initial conditions caused by synchronization mechanism. The encryption algorithm is developed with it. Since it belongs to asymmetric cryptosystem, it is safe in architecture. The numerical simulation results show that the sequences keep high sensitivity to initial conditions. They are close to ideal randomness with uniform distribution and nice correlation properties. Therefore the validity and feasibility of the proposed methodology are verified.","PeriodicalId":420853,"journal":{"name":"2009 8th IEEE International Conference on Cognitive Informatics","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A self-synchronous stream cipher based on composite discrete chaos\",\"authors\":\"Weng Yifang, Zheng Rong, Chen Yi\",\"doi\":\"10.1109/COGINF.2009.5250746\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A new methodology by combining chaotic generalized synchronization technique with composite discrete chaotic mappings for self-synchronous stream cipher is proposed to meet the need of secure communication in distributed virtual reality battlefield. The work also concerns the decline of sensitivity to initial conditions caused by synchronization mechanism. The encryption algorithm is developed with it. Since it belongs to asymmetric cryptosystem, it is safe in architecture. The numerical simulation results show that the sequences keep high sensitivity to initial conditions. They are close to ideal randomness with uniform distribution and nice correlation properties. Therefore the validity and feasibility of the proposed methodology are verified.\",\"PeriodicalId\":420853,\"journal\":{\"name\":\"2009 8th IEEE International Conference on Cognitive Informatics\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 8th IEEE International Conference on Cognitive Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COGINF.2009.5250746\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 8th IEEE International Conference on Cognitive Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COGINF.2009.5250746","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

为满足分布式虚拟现实战场中安全通信的需要,提出了一种将混沌广义同步技术与复合离散混沌映射相结合的自同步流密码方法。研究还涉及到同步机制引起的初始条件敏感性下降。并据此开发了加密算法。由于它属于非对称密码系统,因此在架构上是安全的。数值模拟结果表明,该序列对初始条件具有较高的灵敏度。它们接近理想随机,具有均匀分布和良好的相关性。从而验证了所提出方法的有效性和可行性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A self-synchronous stream cipher based on composite discrete chaos
A new methodology by combining chaotic generalized synchronization technique with composite discrete chaotic mappings for self-synchronous stream cipher is proposed to meet the need of secure communication in distributed virtual reality battlefield. The work also concerns the decline of sensitivity to initial conditions caused by synchronization mechanism. The encryption algorithm is developed with it. Since it belongs to asymmetric cryptosystem, it is safe in architecture. The numerical simulation results show that the sequences keep high sensitivity to initial conditions. They are close to ideal randomness with uniform distribution and nice correlation properties. Therefore the validity and feasibility of the proposed methodology are verified.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信