首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
研究了两个不同半导体激光器的相互耦合与其他激光器之间的混沌并行同步和多周期并行同步.提出激光并行串联复杂动力学系统与网络,给出光学光路与数学物理模型.由此提出中继器运行原则,给出了信道编码方程.成功实现了激光混沌再生与发送,分别完成了有中继器系统的两个异路混沌加密通信.这是一种新型的混沌编码网络系统,具有中继器核心技术要素,它具有多变量、高维度、多密钥以及两路不同混沌载波特点,具有高度的安全性、不易被破解等特性.其研究结果对混沌在保密通信应用、光网络和激光技术的研究具有重要的参考价值.  相似文献   

2.
周庆  何校栋  胡月 《物理学报》2011,60(9):94701-094701
提出了扩展HPP模型,并与RE阵列结合,构建了一个对称加密系统. 该系统适用于任意维度和精度的数字对象,并具有空间性、并行性和高效性的特点. 实验结果表明,加密系统具有良好的随机性和敏感性. 关键词: 物理模型 对称加密 通用性 并行计算  相似文献   

3.
秦怡  刘旭焱  巩琼 《光子学报》2014,43(3):310004
基于位置和波长参量的并行复用,提出一种高加密容量的光学干涉多图像加密系统.加密时,待加密图像分为两组,每组均利用位置复用技术解析地加密到两个纯相位板中,将所获取的四个相位板再经波长复用技术融合到两个光学相位元件中.加密过程采用数字技术,无需使用迭代算法,而解密过程既可以采用数字技术也可以采用纯光学方法.实验中利用波长与位置的并行复用及相关系数对系统的加密容量进行评估,同时研究了系统对于噪音攻击和剪切攻击的稳健性.结果表明:加密容量较已有方法有较大提高;对于噪音攻击的稳健性较强,但是对于剪切攻击的稳健性较弱.  相似文献   

4.
司红伟  钟国韵 《应用声学》2015,23(7):2475-2477, 2481
为了克服大数据在采用串行加密方式时具有的加密效率低的问题,设计了一种基于双混沌系统的大数据环境的并行加密算法。首先,在对经典的Map-Reduce分布式并行计算框架进行研究的基础上,设计了大数据环境的并行加密模型。然后,设计了改进的Logistic映射和Tent映射构成双混沌系统,在此基础上,设计了Map函数、Sort函数和Reduce函数实现并行加密,在Map函数中通过Logistic映射和Tent映射的不断迭代计算加密密钥或解密密钥,实现明文到密文或密文到明文的转换,在Sort 函数对由Map函数输出的键值对进行排序并剔除重复的数据块,在Reduce函数中对加密后的密文数据块或解密后的明文数据块进一步合并构成输出数据,并生成Logistic映射和Tent映射的迭代次数初始值并保存在历史数据信息中。仿真实验表明:文中设计的基于双混沌系统的Map-Reduce并行加密模型能高效地进行数据加密或解密,能提高数据安全性和加密效率,具有较强的可行性。  相似文献   

5.
温贺平  禹思敏  吕金虎 《物理学报》2017,66(23):230503-230503
针对目前大数据环境中存在的数据安全问题,提出一种基于Hadoop大数据平台和无简并高维离散超混沌系统的加密算法.算法采用流密码对称加密方式,在Hadoop平台上读取存储于HDFS(Hadoop distributed file system)的大数据,进行分片处理和MapReduce编程后,用Map函数实现数据并行加密和解密,通过Reduce函数实现数据的合并操作并存储于HDFS.该算法具有较好的执行效率.与正李氏指数发生简并的低维混沌系统相比,无简并高维离散超混沌加密算法能提高系统安全性能,李氏指数均为正并且足够大,具有更好的统计特性,可通过严格的TESTU01测试,并行加密的密文之间互相关性很小.密钥参数众多使得估计或辨识难度增大.在密文闭环反馈条件下,具有抵御已知明文攻击和选择明文攻击的能力.  相似文献   

6.
光学加密系统的稳健性直接决定其密文在存储和传输过程中的抗干扰能力,并且通常从密文抗裁剪和抗噪声干扰两方面来衡量。针对联合变换相关器光学并行加密系统的多图并行加密和任意图像再现的功能特点,仿真并分析其稳健性。结果表明,当密文面积受到50%裁剪时,各通道图像解密效果明显降低,部分解密图像与原始图像的相关系数(CC)低至0.2左右。分析其原因并对联合功率谱分布进行优化。仿真结果表明,加密系统不仅稳健性得到显著提升(当密文面积受到60%裁剪时,各通道CC值均大于0.49),且能保持优化前加密系统在抗噪声干扰方面的优势。最后,搭建光学实验系统,验证了该加密系统稳健性提升方法的有效性。  相似文献   

7.
针对现有光学加密方法对加密系统要求高、受器件性能限制、加密效率低、解密图像易失真的局限性,提出一种基于光场成像原理和混沌系统的多图像加密方法.该方法利用混沌系统随机生成光场成像系统的个数与系统参数,并在计算机中构造出相应的多个光场成像系统;将多幅待加密图像拼接后置于光场成像系统中依次计算得到光场图像,通过提取光场图像的多幅子孔径图像并进行拼接,实现多幅图像的快速加密.解密过程为加密过程的逆过程.该方法将计算成像的方式引入加密过程,使加密不受硬件条件的限制,易于实现.实验结果表明,提出的算法密钥复杂度低,易于传输;对噪声有较好的鲁棒性,密钥空间大,密钥敏感度高,安全性好;加密效率高,解密图像无损失.在需要大量图像进行安全传输的领域具有广泛的应用前景.  相似文献   

8.
对光学扫描全息术中的双光瞳做出改进,提出对多图像并行加密和任意层图像再现的新方法.将其中一个光瞳设置成环形光瞳,另一个光瞳处插入随机相位板,干涉形成环形随机相位板,实现对多层图像的快速扫描和并行加密,扫描信号通过计算机合成为加密全息图,在数字全息再现的过程中进行解密,实现对任意层图像的精准重建.该方法快捷高效、安全可靠,抗噪声能力强.利用相关系数评估了该方法的加密效果,并通过仿真实验验证了该方法的有效性和安全性.  相似文献   

9.
提出了基于空间角度复用和双随机相位的多图像光学加密新方法.加密过程中,首先将原始图像进行随机相位调制和不同距离的菲涅耳衍射;其次,将携带调制后图像的参考光与携带随机相位且具有不同立体角的参考光相干叠加,产生干涉条纹;最后,将不同方向的干涉条纹叠加形成复合加密图像.解密为加密的逆过程,将复合加密图像置于空间滤波和菲涅耳衍射系统中,经过不同相位密钥解调和正确距离的菲涅耳衍射完成解密,得到多幅解密图像.该方法可以同时对多幅图像进行高效的加密,计算简单、安全可靠、抗噪声能力强.利用相关系数评估了该方法的加密效果,并通过仿真实验验证了该方法的有效性和安全性.  相似文献   

10.
大多数光学加密系统都是对称加密系统,在光学图像加密中明文和密文之间具有线性关系,其系统的安全性有待加强.而基于相位截断傅里叶变换(phase-truncated Fourier transform, PTFT)的非对称加密系统,其非线性的相位截断操作使加密系统的安全性得到了极大提升.本文提出使用深度学习方法攻击PTFT加密系统,通过PTFT加密系统构造出明密文对图像数据集,然后将其输入残差网络(residual network, Res Net)中进行训练, Res Net自动学习该加密系统的解密特性.最后应用测试集对训练好的模型进行解密性能测试,数据表明该模型能够较好地恢复图像并且该模型具有一定的抗噪声能力.与两步迭代振幅恢复算法相比,本文所提出方法恢复的图像质量更好.  相似文献   

11.
This paper studies the security of a recently proposed chaos-based cryptosystem. It is shown that the encryption architecture of this cryptosystem exhibits some important problems related to its implementation and its robustness against noise. Some security problems are also highlighted.  相似文献   

12.
In 1998, M.S. Baptista proposed a chaotic cryptosystem using the ergodicity property of the simple low-dimensional and chaotic logistic equation. Since then, many cryptosystems based on Baptista's work have been proposed. However, over the years research has shown that this cryptosystem is predictable and vulnerable to attacks and is widely discussed. Among the weaknesses are the non-uniform distribution of ciphertexts and succumbing to the one-time pad attack (a type of chosen plaintext attack). In this Letter, our objective is to modify the chaotic cryptographic scheme proposed previously. We use a matrix secret key such that the cryptosystem would no longer succumb to the one-time pad attack.  相似文献   

13.
We analyze the security of a recently proposed asymmetric cryptosystem that based on the phase-truncated Fourier transforms (PTFTs), and describe a specific attack method to break the cryptosystem. This specific attack, which is based on a two-step iterative amplitude retrieval approach and works by using the public keys and ciphertexts, would allow an attacker to reveal the encrypted information and the decryption keys that generated in the encryption procedure. The numerical simulation results, which are given to show the effectiveness of the proposed specific attack, imply that some appropriate measurements should be made to enhance the resistance of the PTFT-based cryptosystem against the specific attack when it is used as a public-key cryptosystem.  相似文献   

14.
Smell is a physical process used by us all, but fully understood by none. A physicist seeks to understand the mysterious phenomena of nature and so it is natural to apply physics to this problem. There is a reluctance in the field of olfactory science to explore the physical processes of fundamental interactions in odorant recognition because the system is complex. However, nature is often compliant to our simple models, and part of the art is to reduce the problem to a soluble one, and part of the beauty of science is often that the simple model with the simple answers give the right ones. This article reviews the applicability of some physical models to olfaction and looks in particular at one theory within the realm of olfactory science. This theory was first endorsed by Turin in 1996, that smell signalling may be based on a form of Inelastic Electron Tunnelling (IETS). This review looks at the mystery of olfaction and the physical principles that may unveil such mysterious phenomena.  相似文献   

15.
王兴元  段朝锋 《计算物理》2006,23(5):621-625
分析了E.Álvarez密码系统的加密方法及其弱点,在此基础上给出了一种基于遍历性的混沌加密新算法。即以混沌系统的控制参数和初始点为密钥,迭代混沌映射以便产生一个比特链,在该比特链中搜索明文分组,记下迭代次数作为密文分组。新算法避免了E.Álvarez密码方案中的若干弱点,增强了密码系统的安全性。最后通过对Logistic映射的仿真研究,验证了新密码系统满足密码学中的混淆和散布特性,并进而阐明了新密码系统的有效性。  相似文献   

16.
《Physics letters. A》2005,343(6):432-439
A 3D Cat map based symmetric image encryption algorithm, which significantly increases the resistance against statistical and differential attacks, has been proposed recently. It employs a 3D Cat map to shuffle the positions of image pixels and uses the Logistic map to diffuse the relationship between the cipher-image and the plain-image. Based on the factor that it is sufficient to break this cryptosystem only with the equivalent control parameters, some fundamental weaknesses of the cryptosystem are pointed out. With the knowledge of symbolic dynamics and some specially designed plain-images, we can calculate the equivalent initial condition of diffusion process and rebuild a valid equivalent 3D Cat matrix. In this Letter, we will propose a successful chosen-plain-text cryptanalytic attack, which is composed of two mutually independent procedures: the cryptanalysis of the diffusion process and the cryptanalysis of the spatial permutation process. Both theoretical and experimental results show that the lack of security discourages the use of these cryptosystems for practical applications.  相似文献   

17.
Device calibration impacts security of quantum key distribution   总被引:1,自引:0,他引:1  
Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.  相似文献   

18.
The data presented here show that human drivers apply a discrete noisy control mechanism to drive their vehicle. A car-following model built on these observations, together with some physical limitations (crash-freeness, acceleration), lead to non-Gaussian probability distributions in the speed difference and distance which are in good agreement with empirical data. All model parameters have a clear physical meaning and can be measured. Despite its apparent complexity, this model is simple to understand and might serve as a starting point to develop even quantitatively correct models.  相似文献   

19.
Spatial deterministic chaos in optical systems and methods of its modeling   总被引:1,自引:0,他引:1  
The phenomenon of spatial deterministic chaos is described. A transition from an ordinary differential equation to a discrete map is justified for modeling of the chaos. Methods of studying the chaos dynamics in this model are suggested. It is established how the physical properties of a nonlinear ring interferometer influence the structure of charts of the Lyapunov exponents. The approaches developed in the present study allow an optical cryptosystem to be optimized.__________Translated from Izvestiya Vysshikh Uchebnykh Zavedenii, Fizika, No. 12, pp. 65–71, December, 2004.  相似文献   

20.
In recent years, a variety of effective chaos-based image cryptosystems have been proposed. One of the architectures of this kind of cryptosystems is composed of multiple rounds of substitution and diffusion. As the confusion and diffusion effects are solely contributed by the substitution and the diffusion stages, respectively, the required overall rounds of operations in achieving a certain level of security is found more than necessary. In this Letter, we suggest to introduce a certain diffusion effect in the substitution stage by simple sequential add-and-shift operations. Although this leads to a longer processing time in a single round, the overall encryption time is reduced as fewer rounds are required. Simulation results show that at a similar performance level, the proposed cryptosystem needs less than one-third the encryption time of an existing fast cryptosystem. The effective acceleration of chaos-based image cryptosystems is thus achieved.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号