共查询到19条相似文献,搜索用时 31 毫秒
1.
2.
基于广义混沌映射切换的单向Hash函数构造 总被引:22,自引:1,他引:22
如何设计快速高效的单向Hash函数一直是现代密码学研究中的一个热点.提出了一种基于广 义混沌映射切换的Hash函数构造方法.这种方法首先构建产生多种混沌序列的广义混沌映射 模型,然后在明文信息的不同位置根据切换策略产生不同的混沌序列,并用线性变换后的信号 信息对混沌参数进行调制来构造单向Hash函数.初步分析了利用混沌映射实现单向Hash函数 的不可逆性、防伪造性、初值敏感性等特点.研究结果表明:这种基于广义混沌映射切换的Ha sh函数具有很好的单向性、弱碰撞性,较基于单一混沌映射的Hash函数具有更强的保密性能 ,且实现简单.关键词:Hash函数混沌混沌映射切换 相似文献
3.
4.
提出了一种用于图像加密的可逆二维混沌映射,该映射由左映射和右映射两个子映射组成。通过对图像的拉伸和折叠处理,实现了图像的混沌加密。首先沿图像的对角线方向将正方形图分为上下两个部分并重新组合成一个平行四边形的图像;然后利用平行四边形图像的两列像素之间的像素数目差将某列中的像素插入到相邻下一列像素之间。经过这样的过程,原始图像拉伸成为一条直线。最后按照原始图像的大小将这条直线折叠成为一个新的图像。推导出了映射的数学表达式,设计了密钥产生的方法,分析了图像加密算法的安全性问题。仿真验证了该图像加密算法的有效性。 相似文献
5.
6.
7.
一种新的分段非线性混沌映射及其性能分析 总被引:4,自引:0,他引:4
研究了logistic混沌映射的相关性质,指出当系统参数取值改变时,产生的混沌序列在相空间不具有遍历性.基于以上分析,构造了一种分段logistic混沌映射,对logistic映射和定义的分段logistic映射的分岔图和Lyapunov指数进行了研究,同时通过实验对这二种映射生成序列的随机性、相关系数、功率谱等性能进行了比较分析.在此基础上,定义了一种新的混沌系统性能评价指标——分岔迭代次数.结果表明,定义的分段logistic映射不仅具有良好的遍历性,而且对应的混沌系统相关评价指标的性能良好.关键词:混沌系统相关系数Lyapunov指数功率谱 相似文献
8.
基于广义混沌映射切换的混沌同步保密通信 总被引:24,自引:3,他引:24
提出了一种基于广义混沌映射切换的混沌同步保密通信方式.这种通信方式首先构建产生多种混沌序列的广义混沌映射模型,然后在不同时段根据切换策略产生不同混沌序列,在发送端,将信号与混沌载波之和取模运算后再嵌入混沌映射的输入端进行迭代运算以实现调制;在接收端,根据切换协议,用同一个相应的广义混沌映射模型从接收信号中提取混沌载波并进而恢复信息信号.研究结果表明:这种基于广义混沌映射切换的混沌同步通信方式比基于单一混沌系统的保密通信方式具有更强的抗干扰能力,保密性能更好,且实现简单.关键词:混沌混沌映射切换同步保密通信 相似文献
9.
10.
结合线性反馈移位寄存器(LFSR)和混沌理论各自的优点,采用循环迭代结构,给出一种将LFSR和混沌理论相结合的伪随机序列生成方法.首先根据LFSR的计算结果产生相应的选择函数,通过选择函数确定当前迭代计算使用的混沌系统,应用选择的混沌系统进行迭代计算产生相应的混沌序列;然后把生成的混沌序列进行数制转换,在将得到的二进制序列作为产生的伪随机序列输出的同时将其作为反馈值与LFSR的反馈值进行相应的运算,运算结果作为LFSR的最终反馈值,实现对LFSR生成序列的随机扰动.该方法既可生成二值伪随机序列,也可生成实值伪随机序列.通过实验对生成的伪随机序列进行了分析,结果表明,产生的序列具有良好的随机性和安全性. 相似文献
11.
Based on the spatiotemporal chaotic system,a novel algorithm for constructing a one-way hash function is proposed and analysed.The message is divided into fixed length blocks.Each message block is processed by the hash compression function in parallel.The hash compression is constructed based on the spatiotemporal chaos.In each message block,the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function.The final hash value is generated by further compressing the mixed result of all the hash compression values.Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key,good statistical properties,and strong collision resistance. 相似文献
12.
The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefore, the original algorithm is insecure and vulnerable. An improved algorithm is proposed to avoid the collisions. 相似文献
13.
本文研究了Hénon映射在噪声诱导下发生的间歇现象.通过数值模拟和全局分析手段,揭示了噪声诱导间歇现象的机理.基于随机敏感度函数法,通过检测噪声作用下周期吸引子的置信椭圆与混沌鞍的碰撞情况,给出了诱发间歇现象的噪声强度临界值的估算方法.结果表明,Hénon映射中噪声诱导间歇现象是由随机周期吸引子和混沌鞍不稳定流形的相互作用引发,随机敏感度函数的方法可以较好地估算发生间歇现象的噪声强度临界值. 相似文献
14.
We study a phenomenon of noise-induced intermittency for the stochastically forced one-dimensional discrete-time system near tangent bifurcation. In a subcritical zone, where the deterministic system has a single stable equilibrium, even small noises generate large-amplitude chaotic oscillations and intermittency. We show that this phenomenon can be explained by a high stochastic sensitivity of this equilibrium. For the analysis of this system, we suggest a constructive method based on stochastic sensitivity functions and confidence intervals technique. An explicit formula for the value of the noise intensity threshold corresponding to the onset of noise-induced intermittency is found. On the basis of our approach, a parametrical diagram of different stochastic regimes of intermittency and asymptotics are given. 相似文献
15.
Shinji Doi 《Journal of statistical physics》1989,55(5-6):941-964
Matsumoto and Tsuda studied the effects of noise on chaos in a one-dimensional Belousov-Zhabotinsky (BZ) map and found noise-induced order, that is, an external noise destroys a chaotic behavior and produces some kind of order (periodicities). This phenomenon is very interesting in understanding the relation between chaos and natural phenomena. The present paper proposes a unimodal piecewise linear map which has a flat segment. It is shown numerically that the noise-induced order can be observed in this simple map in the same way as the BZ map. These numerical results clarify the mechanism of noise-induced order. 相似文献
16.
We investigate the fair quantum blind signature scheme proposed by Wang and Wen [Wang T Y and Wen Q Y 2010 Chin.Phys.B 19 060307],which uses the fundamental properties of quantum mechanics and the availability of a trusted arbitrator.However,in this paper,we find that the protocol cannot satisfy the property of non-forgeability even under the condition that the trusted arbitrator is totally credible.Moreover,a simple feasible suggestion for improving the protocol is proposed. 相似文献
17.
This paper proposes a scheme for secure authentication of classicalmessages with single photons and a hashed function. The securityanalysis of this scheme is also given, which shows that anyonecannot forge valid message authentication codes (MACs). In addition,the lengths of the authentication key and the MACs are invariableand shorter, in comparison with those presented authenticationschemes. Moreover, quantum data storage and entanglement are notrequired in this scheme. Therefore, this scheme is more efficientand economical. 相似文献
18.
We present a new fair blind signature scheme based on thefundamental properties of quantum mechanics. In addition, we analysethe security of this scheme, and show that it is not possible toforge valid blind signatures. Moreover, comparisons between thisscheme and public key blind signature schemes are also discussed. 相似文献
19.
More and more attention has been focused on effectively generatingchaos via simple physical devices. The problem of creating chaoticattractors is considered for a class of nonlinear systems withbacklash function in this paper. By utilizing the Silnikovheteroclinic and homoclinic theorems, some sufficient conditions areestablished to guarantee that the nonlinear system hashorseshoe-type chaos. Examples and simulations are given to verifythe effectiveness of the theoretical results. 相似文献