共查询到19条相似文献,搜索用时 109 毫秒
1.
本文首先概述现代保密通信及网络信息安全的主要概念和发展状况 ,对迄今发展的几种现代著名密码算法进行分析比较 ;然后综述国际上已经提出的一些典型的混沌保密通信方案及其应用研究的新发展。从通信角度 ,为了向实用化方向发展 ,我们将混沌通信研究中常用的混沌遮掩、混沌开关、混沌调制三种主要技术方案 ,按照实际应用需要 ,重新把它们分类为三种主要形式 ,即模 模通信、模 数 模通信和数 数通信 ,这样便于实际应用 ,易于借鉴已有知识分析各类通信的性能优劣。在评述性分析了当前国际上三种混沌保密通信方式的典型方案及其进展后 ,最后简要总结混沌保密通信的一些关键技术 ,指出今后值得研究的方向 ,并展望了混沌通信的应用前景。 相似文献
2.
3.
提出了一种基于广义混沌映射切换的混沌同步保密通信方式.这种通信方式首先构建产生多种混沌序列的广义混沌映射模型,然后在不同时段根据切换策略产生不同混沌序列,在发送端,将信号与混沌载波之和取模运算后再嵌入混沌映射的输入端进行迭代运算以实现调制;在接收端,根据切换协议,用同一个相应的广义混沌映射模型从接收信号中提取混沌载波并进而恢复信息信号.研究结果表明:这种基于广义混沌映射切换的混沌同步通信方式比基于单一混沌系统的保密通信方式具有更强的抗干扰能力,保密性能更好,且实现简单.
关键词:
混沌
混沌映射切换
同步
保密通信 相似文献
4.
5.
6.
7.
8.
9.
EMR对混沌同步保密通信系统干扰的初步研究 总被引:2,自引:2,他引:0
使用GTEM Cell实验系统,研究了连续波电磁辐射对基于混沌同步理论的保密通信系统的电磁干扰。混沌保密通信系统采用由典型的Chua氏混沌电路构造混沌同步系统,采用掩盖法对模拟信号进行加密传输。实验发现:在100MHz~150MHz的频率范围内,超过一定功率密度的电磁辐射会导致系统的混沌加密功能失效,此后即使停止电磁辐射,系统仍无法自行恢复到混沌加密状态。 相似文献
10.
11.
12.
Synchronization of randomly multiplexed chaotic systems with application to communication 总被引:5,自引:0,他引:5
Synchronized chaotic systems have recently been applied to the area of secure communications in a variety of ways. At the same time, there have also been significant advances in deciphering messages masked by chaotic signals. It is important, therefore, to explore more secure approaches to using chaos in communication. We show that multiple chaotic systems can be synchronized through a scalar coupling which carries a stochastic signal generated by random multiplexing of the source systems. This approach, which is a variant of the active-passive decomposition method, promises enhanced security in chaos-based communication. 相似文献
13.
《Physics letters. A》2002,298(1):35-40
A common feature in the most recent developments of chaos-based communication systems is the use of a single dynamical rule through the encoding–decoding process. Regarding security, this fact could make the system vulnerable to systematic attack from cryptanalists. In this Letter we introduce a communication system based on the symbolic dynamics of a set of chaotic systems instead of a single one and investigate in what extent this increases security. 相似文献
14.
Luciano Zunino Miguel C. Soriano Alejandra Figliola Darío G. Prez Mario Garavaglia Claudio R. Mirasso Osvaldo A. Rosso 《Optics Communications》2009,282(23):4587-4594
From the estimation of the Hurst exponent and the multifractality degree we discriminate the security levels of two typical encoding schemes usually applied in chaos-based communication systems. We also analyze the effects that the sampling period and the message amplitude have on the goodness of these techniques. We compare our results with those obtained by considering an information theory approach [O.A. Rosso, R. Vicente, C.R. Mirasso, Phys. Lett. A 372 (2007) 1018]. The Hurst exponent seems to be a sensitive and powerful tool for discriminating the presence of a message embedded in a chaotic carrier. 相似文献
15.
Confidentiality is an important issue when digital images are transmitted over public networks, and encryption is the most useful technique employed for this purpose. Image encryption is somehow different from text encryption due to some inherent features of image such as bulk data capacity and high correlation among pixels, which are generally difficult to handle by conventional algorithms. Recently, chaos-based encryption has suggested a new and efficient way to deal with the intractable problems of fast and highly secure image encryption. This paper proposes a novel chaos-based bit-level permutation scheme for secure and efficient image cipher. To overcome the drawbacks of conventional permutation-only type image cipher, the proposed scheme introduced a significant diffusion effect in permutation procedure through a two-stage bit-level shuffling algorithm. The two-stage permutation operations are realized by chaotic sequence sorting algorithm and Arnold Cat map, respectively. Results of various types of analysis are interesting and indicate that the security level of the new scheme is competitive with that of permutation-diffusion type image cipher, while the computational complexity is much lower. Therefore the new scheme is a good candidate for real-time secure image communication applications. 相似文献
16.
混沌光通信与混沌激光测距的研究进展 总被引:1,自引:0,他引:1
激光器的不稳定性是一个普遍现象,而混沌是激光器不稳定性的一个重要特例。近年来,基于混沌激光的一些应用技术相继被提出及完善。结合国内外研究现状,简要介绍了混沌激光在通信及测量领域的应用,包括混沌保密通信、混沌激光雷达和混沌光时域反射仪等技术,并指出了混沌光通信与混沌激光测距的发展趋势。 相似文献
17.
基于混沌载波的有界性和最优定界椭球(OBE)准则,推导出了已知干扰信号模型参数的状态估计和未知干扰信号模型参数的自适应状态估计的干扰对消算法.与基于最小相空间体积(MPSV)的Kalman滤波和传统的递归最小二乘(RLS)算法相比,本算法具有选择更新特性,能在仅有少量数据参与更新的情况下达到与前者接近的性能,降低了计算量.该方法的性能通过在混沌参数调制(CPM)和差分混沌相移键控(DCSK)两种通信方式下对自回归(AR)型和单音两种窄带干扰的有效抑制得到了验证.
关键词:
最优定界椭球
混沌通信
干扰抑制
集员估计 相似文献
18.
This paper presents a novel chaos-based technique of steganography in spatial domain. In the last decade, chaos theory has gained utmost importance in multimedia security applications. Generally, 1-D chaotic maps are employed because of computational ease and structural simplicity but their limited chaotic range is an obstacle. In the proposed work, we model the nonlinear combinations of 1-D chaotic maps. These chaotic systems possess chaotic behavior throughout the domain. We, for the first time, propose an effective application of these improved chaotic systems in steganography. These newly synthesized systems are used to embed secret information in the least significant bits (LSBs) of the host image. By comparing with some recent models, we prove that involving improved chaotic systems in steganographic approach really produces extraordinary outcomes. We determine the strength of our steganographic algorithm through the most significant statistical analyses such as information entropy, correlation, contrast, energy, homogeneity, peak signal to noise ratio (PSNR) and mean square error (MSE). We further prove the robustness of the anticipated technique against several image processing attacks. The upshot of these analysis techniques shows that our algorithm is highly reliable and produces coherent results. 相似文献
19.
Chaos-based encryption schemes have been studied extensively, while the security analysis methods for them are still problems to be resolved. Based on the periodic orbit theory, this paper proposes a novel security analysis method. The periodic orbits theory indicates that the fundamental frequency of the spiraling orbits is the natural frequency of associated linearized system, which is decided by the parameters of the chaotic system. Thus, it is possible to recover the plaintext of secure communication systems based on chaotic shift keying by getting the average time on the spiraling orbits. Analysis and simulation results show that the security analysis method can break chaos shift keying secure communication systems, which use the parameters as keys. 相似文献