首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于超混沌与圆锥曲线的混合加密算法
引用本文:刘海峰,曹语默,梁星亮.基于超混沌与圆锥曲线的混合加密算法[J].科学技术与工程,2019,19(34):260-266.
作者姓名:刘海峰  曹语默  梁星亮
作者单位:陕西科技大学文理学院,西安710021;电子信息与人工智能学院,西安710021;陕西科技大学文理学院,西安710021
基金项目:陕西省自然科学基础研究计划青年项目;陕西省教育厅专项科学研究计划项目
摘    要:为解决数据安全问题,通过对超混沌加密与圆锥曲线加密算法进行研究,设计了一种基于超混沌与圆锥曲线的混合加密算法。首先运用两个超混沌系统产生一个无关联性的超混沌序列,然后将明文与超混沌序列执行异或操作实现首次加密,再将加密后的密文作为圆锥曲线加密的明文进行二次加密。通过实验对比分析可知,一方面该算法具有密钥空间大、密文统计特性良好、密钥敏感性高的优点;另一方面经过双重加密后的明文与密文之间没有直接联系,无法通过选择特殊的明文、密文对的办法破解密钥序列,且算法中的非线性运算,能抵御选择明文攻击,可见提高了算法安全性。

关 键 词:超混沌系统  混沌序列  圆锥曲线  非线性运算
收稿时间:2019/5/7 0:00:00
修稿时间:2019/6/17 0:00:00

Hybrid Encryption Algorithm Based on Hyperchaos and Conic Curve
Liu Hai-feng,Cao Yu-mo and Liang Xing-liang.Hybrid Encryption Algorithm Based on Hyperchaos and Conic Curve[J].Science Technology and Engineering,2019,19(34):260-266.
Authors:Liu Hai-feng  Cao Yu-mo and Liang Xing-liang
Institution:Shaanxi University of Science & Technology,Shaanxi University of Science & Technology,Shaanxi University of Science & Technology
Abstract:In order to solve the problem of data security, a hybrid encryption algorithm based on hyper chaos and conic curve is designed by studying hyper chaos encryption algorithm and conic curve encryption algorithm. First, two hyperchaotic systems are used to generate a hyperchaotic sequence without correlation. Then the plaintext and hyperchaotic sequences are encrypted for the first time by performing xor operations. Finally, the encrypted ciphertext is used as the plain text of conic curve encryption for secondary encryption. Through experimental comparison and analysis, on the one hand, the algorithm has the advantages of large key space, good ciphertext statistical characteristics and high key sensitivity. On the other hand, there is no direct connection between the plaintext and ciphertext after double encryption, and the key sequence cannot be cracked by selecting special plaintext and ciphertext pairs. Besides, the nonlinear operation in the algorithm can resist the selective plaintext attack and improve the security of the algorithm.
Keywords:Hyperchaotic system    Chaotic sequence    Conic curve    Nonlinear operation
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《科学技术与工程》浏览原始摘要信息
点击此处可从《科学技术与工程》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号