Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Shanghai Jiaotong University》 2001-01
Add to Favorite Get Latest Update

Security Property of Chaotic Encryption Systems

ZHOU Li hui, PENG Zhao wang, FENG Zheng jin, ZHONG Ting xiu (School of Mechanical Eng., Shanghai Jiaotong Univ., Shanghai 200030, China)  
The measure of security of chaotic secure communication schemes based on the active passive decomposition of natural chaotic systems was discussed in the contents of its characteristics of sensitivity to parameter mismatches. The result shows that the chaotic secure communication schemes based on the decomposition of low dimensioinal chaotic systems are not secure enough to resist the attack of adaptive synchronization. A class of chaotic secure communicatioin schemes based on the chaotic noise generator, which can eliminate such defects, was studied. The scheme is found to have characteristics that can make adaptive synchronization attack invalid. The proposed scheme is easy to implement by circuits, and its level of security can be easily adjusted. These properties make it superior to the schemes based on the active decomposition decomposition of low dimensional chaotic systems.
【CateGory Index】: TN918
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 10 Hits
1 ZHU Guiliang 1 WANG Weiping 1 ZHANG Xiaoqiang 2 WANG Mengmeng 1(1 Department of Information Engineering,North China University of Water Conservancy and Electric Power Zhengzhou 450011;2 State Key Lab of Software Development Environment,Beijing University of Aeronautics and Astronautics Beijing 100191);Digital image encryption algorithm based on multi-level and multilayer scramble[J];Information Security and Technology;2010-06
2 ZHANG Jing-hua,CHEN Yi (College of Computer Science and Technology, Beijing Technology and Business University, Beijing 100037, China);DESIGN AND IMPLEMENT OF A CHAOS ENCRYPTION ALGORITHM[J];Journal of Beijing Technology and Business University (Natural Science Edition);2004-04
3 LIU Jing JIN Zhen YU Cui-e (School of Mathematical Science,South China University of Technology,Guangzhou 510640,China);New Grouping Double-Key Cryptogram Scheme[J];Journal of Dongguan University of Technology;2007-03
4 JIN Jian-guo1,LIN Rui1,ZHANG Qing-ling2,HOU Guo-qiang1,DI Zhi-gang1,JIA Chun-rong1(1.College of Information,Hebei Polytechnic University,Tangshan 063009;2.Division of Research,Hebei Polytechnic University,Tangshan 063009);Real-time Encryption System for Audio Frequency Domain Based on Cascaded Chaos[J];Computer Engineering;2009-11
5 ZHAO Gen-hua,HE Yi-gang (College of Electrical and Information Engineering,Hunan University,Changsha 410082,China);RFID Secure Mechanism Based on Chaotic Encryption[J];Computer Engineering;2011-12
6 JIN Jian-guoa,WEI Ming-juna,DI Zhi-gangb,XU Guang-lia,JIA Chun-rongb,ZHAO Hong-weia(a.College of Sciences;b.College of Electrical Engineering,Hebei United University,Tangshan 063009,China);Research on Lyapunov Exponent of Cascade Chaos System[J];Computer Engineering;2011-19
7 Wang Chengjun Zhang Fang (Computer & Communication Engineering College,Changsha University of Science and Technology,Changsha 410076);A New Communication Encryption Algorithm Based on Chaos[J];Computer & Digital Engineering;2006-02
8 LV Feng,FAN Bing,WU Dan wen (School of Information Engineering,Wuhan University of Technology,Wuhan Hubei 430070,China);The Research on Four Kinds of New-type Encryption Techniques[J];Application Research of Computers;2002-11
9 Jiang Li~(1,2) Yang Mingfu~1 Huang Guimin~1~1(College of Information,East China University of Science and Technology,Shanghai 200237,China)~2(The Department of Computer,Lianyungang Teachers College,Lianyungang Jiangsu 222006,China);A MULTISTAGE CHAOTIC ENCRYPTION ALGORITHM BASED ON NEURAL NETWORK[J];Computer Applications and Software;2006-08
10 YUAN Chun-hui (Air Force Engineering University,Xi'an 710077,China);A Modified Chaotic Cryptographic Method[J];Journal of Jinling Institute of Technology;2005-04
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Ma Wenqi;Yu Lincheng(Jilin Teacher College) (The Union College of Jilin city);Chaos Synchronization by Feedback of a Single Variable[J];;1997-05
2 LI Qing, ZHENG Deling, YAN Linhao (Information Engineering School, UST Beijing, Beijing 100083, China ; Handan Iron & Steel Corporation, Handan 056000, China);Synchronization of Chaos Based on Fuzzy Genetic Algorithm[J];Journal of University of Science and Technology Beijing;2001-02
3 GUAN Chunyang,GAO Fei(Department of Electronic Engineering, School of Information Science and Technology, Beijing Institute of Technology, Beijing100081, China);An Encryption Algorithm Based on Chaotic Sequences[J];Journal of Beijing Institute of Technology;2003-03
4 WENG Yi fang 1,\ YU Pei 2 (1 College of Information Engineering, Beijing Technology and Business University, Beijing 100037, China; 2 Dept. of Applied Mathematics, University of Western Ontario, Canada N6A 5B7);APPLICATIONS OF CHAOS SYNCHRONIZATION IN SECURE COMMUNICATION[J];Journal of Beijing Institute of Light Indusry;2000-01
5 WENG Yi fang 1, WENG Li juan 2 ( 1 College of Information Engineering, Beijing Technology and Business University, Beijing 100037, China; 2 Department of Mathematics and Physics, Beijing Technology and Business University, Beijing 100037, China);HYPERCHAOTIC ENCRYPTION ALGORITHM DESIGN AND SOFTWARE IMPLEMENTATION[J];Journal of Beijing Technology and Business University (Natural Science Edition);2003-01
6 ZHANG Jing-hua,CHEN Yi (College of Computer Science and Technology, Beijing Technology and Business University, Beijing 100037, China);DESIGN AND IMPLEMENT OF A CHAOS ENCRYPTION ALGORITHM[J];Journal of Beijing Technology and Business University (Natural Science Edition);2004-04
7 Wang Zikun (Department of Mathematics,Beijing Normal University,100875,Beijing,PRC)Institute of Mathematics,Shantou University,515063,Shantou,PRC);ON CHAOS AND RANDOMNESS[J];JOURNAL OF BEIJING NORMAL UNIVERSITY;1994-02
8 BAI Fengming,SHEN Ke(College of Electronics and Information Engineering of Changchun University of Science and Technology);Communication System of Speech Secure with Chaos Based on Software Radio[J];Journal of Changchun Institute of Optics and Fine Mechanics;2002-02
9 MIN Lian-quan(Institute of Surveying and Mapping,Information Engineering University,Zhengzhou,Henan 450052);An image encryption algorithm based on double scrambling[J];Science of Surveying and Mapping;2006-03
10 WU Xian-yong (Yangtze University,Jingzhou 434023;Huazhong University of Science and Technology,Wuhan 430074)ZHANG Hong-min (Yangtze University,Jingzhou 434023)LI Tao (Huazhong University of Science and Technology,Wuhan 430074);Design of A New Secure Communication Scheme Based on Chaotic Synchronization[J];;2006-04
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 YU Chun-yu1,ZHU Jian-liang2,GUO Jian-ying1(1.College of Measure-control Technology and Communication Engineering,Harbin University of Science and Technology,Harbin 150080,China; 2.College of Electrical and Electronic Engineering,Harbin University of Science and Technology,Harbin 150080,China);Four-dimensional hyperchaotic system and application research in signal encryption[J];Electric Machines and Control;2012-03
2 ZHANG Jian-hui (Shenzhen Institute of Information Technology , Shenzhen 518029, China);Application Research of Compounding Encryption Algorithm in Instant Messaging[J];Computer Security;2009-03
3 HUI Chen-ben(North China Electric Power University,Beijing 102206,China);The New OVPN System Research Based on the PON Network[J];Computer Knowledge and Technology;2013-02
4 FU Hao(Society Insurance Center of Daqing Oil Field,Daqing 163412,China);Analysis and research of the chaos encryption[J];Information Technology;2007-01
5 ZHU Bo1,SUN Ming2,ZHU Jian-liang2 (1.The Second Electric Power Bureau of Harbin,Harbin 150076,China;2.Harbin University of Science and Technology,Harbin 150080,China);Five-dimensional chaotic system based on signal encryption[J];Information Technology;2011-01
6 ZHU Bo1,HE Shu-juan2,ZHU Jian-liang3,SUN Ming3 (1.Harbin University of Science and Technology,Harbin 150080,China;2.Electronics Technology Institute ofHeilongjiang Province,Harbin 150040,China;3.Harbin the Second Electric Power Bureau,Harbin 150076,China);A new four-dimensional chaotic attractor and encryption of information[J];Information Technology;2011-02
7 ZHU Jian-liang,ZHANG Bo-ya,SUN Ming(School of Electrical and Electronic Engineering,Harbin University of Science and Technology,Harbin 150080,China);Six-dimensional chaos based on signal encryption and image encryption[J];Information Technology;2012-02
8 WEI Peng-Cheng~ 1,2 ZHANG Wei~ 1,2 YANG Hua-Qian~ 1,2 (Department of Computer Science and Engineering, Chongqing University, Chongqing 400044)~1(Department of Computer and Modern Education Technology, Chongqing Education College,Chongqing 400067)~2;An Image Encryption Algorithm Based on Coupled Chaotic Map[J];Computer Science;2006-11
9 ZOU A-jin1,XIAO Xiu-chun1,2(1.Information College,Guangdong Ocean University,Zhanjiang 524088;2.School of Information Science and Technology,Sun Yat-sen University,Guangzhou 510275);Asynchronous Encryption of Neural Networks Based on Chaotic Control System[J];Computer Engineering;2008-12
10 JIN Jian-guoa,WEI Ming-juna,DI Zhi-gangb,XU Guang-lia,JIA Chun-rongb,ZHAO Hong-weia(a.College of Sciences;b.College of Electrical Engineering,Hebei United University,Tangshan 063009,China);Research on Lyapunov Exponent of Cascade Chaos System[J];Computer Engineering;2011-19
China Proceedings of conference Full-text Database 1 Hits
1 CHEN Zengqiang,ZHOU Qian Department of Automation,Nankai University,Tianjin 30071,P.R.China;Kent Chaos Mapping Application in the Digital Fountain Codes[A];[C];2011
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved