一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

一類混沌流密碼的分析

李樹鈞 牟軒沁 紀(jì)震 張基宏

李樹鈞, 牟軒沁, 紀(jì)震, 張基宏. 一類混沌流密碼的分析[J]. 電子與信息學(xué)報(bào), 2003, 25(4): 473-478.
引用本文: 李樹鈞, 牟軒沁, 紀(jì)震, 張基宏. 一類混沌流密碼的分析[J]. 電子與信息學(xué)報(bào), 2003, 25(4): 473-478.
Li Shujun, Mou Xuanqin, Ji Zhen, Zhang Jihong. Cryptanalysis of a class of chaotic stream ciphers[J]. Journal of Electronics & Information Technology, 2003, 25(4): 473-478.
Citation: Li Shujun, Mou Xuanqin, Ji Zhen, Zhang Jihong. Cryptanalysis of a class of chaotic stream ciphers[J]. Journal of Electronics & Information Technology, 2003, 25(4): 473-478.

一類混沌流密碼的分析

Cryptanalysis of a class of chaotic stream ciphers

  • 摘要: 該文指出一類基于數(shù)字化逐段線性混沌映射的混沌流密碼方案是不夠安全的。在有限數(shù)字精度下,分段線性混沌映射存在可度量的特征退化,這種退化由控制參數(shù)所在的參數(shù)空間子集唯一決定。由此可以推知,在已知明文的情況下,整個(gè)密鑰空間可以分解為強(qiáng)度依次降低的弱密鑰子空間。在此基礎(chǔ)上可以導(dǎo)出一類多分辨率攻擊方法,在密鑰隨機(jī)分配的情況下,該攻擊方法從總體上可以把密鑰嫡降低2bit,試驗(yàn)結(jié)果表明,該文提出的多分辨率攻擊方法是實(shí)際可行的。該文還討論了一些可能采取的改進(jìn)措施及其效果。
  • 周紅,俞軍,凌燮亭,混沌前饋型流密碼的設(shè)計(jì),電子學(xué)報(bào),1998,26(1),98-101.[2]Hong Zhou, Xie-Ting Ling, Problems with the chaotic inverse systems encryption approach, IEEE Trans. on Circuits and Systems-I, 1997, 44(3), 268-271.[3]周紅,羅杰,凌燮亭,混沌非線性反饋密碼序列的理論設(shè)計(jì)和有限精度實(shí)現(xiàn),電子學(xué)報(bào),1997,25(10),57-60[4]Zhou Hong, Ling Xieting, Generating chaotic secure sequences with desired statistical properties and high security, Int. J. Bifurcation Chaos, 1997, 7(1), 205-213.[5]桑濤,王汝笠,嚴(yán)義塤,一類新型混沌反饋密碼序列的理論設(shè)計(jì),電子學(xué)報(bào),1999,27(7),47-50.[6]T. Habutsu, Y. Nishio, I. Sasase, S. Mori, A secret key cryptosystem by iterating a chaotic map,Advances in Cryptology-EuroCrypt91, Brighton, UK: 1991, Spinger-Verlag, 1991, Lecture Notes in Computer Science vol. 0547, 127-140.[7]G. Alvarez, F. Monotoya, G. Pastor, M. Romera, Chaotic cryptosystems, in Proc. 33nd Annual 1999 Int. Carnahan Conf. Security Technology, Madrid, Spain 1999, IEEE, 1999, 332-338.[8]E. Alvarez, A. Fernndez, P. Garcla, J. Jimnez, A. Marcano, New approach to chaotic encryption,Physics Letters A, 1999, 263(4-6), 373-375.[9]Shujun Li, Xuanqin Mou, Yuanlong Cai, Improving security of a chaotic encryption approach,Physics Letters A, 2001, 290(3/4), 127-133.[10]Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou, Yuanlong Cai, Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding, Cryptography and Coding-8th IMA Int. Conf., Cirencester, UK: 2001, Springer-Verlag, Lecture Notes in Computer Science vol. 2260, 205-221.[11]Maciej J. Ogorzatek, Herv Dedieu, Some tools for attacking secure communication systems employing chaotic carriers, Proc. Int. Symp. Circuits and Systems, Monterey, USA: 1998, IEEE,1998, vol.4, 522-525.[12]Eli Biham, Cryptoanalysis of the chaotic-map cryptosystem suggested at EuroCrypt91, Advances in Cryptology-EuroCrypt91, Brighton, UK: 1991, Spinger-Verlag, 1991, Lecture Notes in Computer Science vol.0547, 532-534.[13]Andrzej Lasota, Michael C. Mackey, Chaos, Fractals, and Noise-Stochastic Aspects of Dynamics,Second edition, New York: Springer-Verlag, 1997, Chapter 5-6.[14]A. Baranousky, D. Daems, Design of one-dimensional chaotic maps with prescribed statistical properties, Int. J.[J]. Bifurcation Chaos.1995,5(6):1585-[15]周紅,凌燮亭,有限精度混沌系統(tǒng)的m序列擾動(dòng)實(shí)現(xiàn),電子學(xué)報(bào),1997,25(7),95-97.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  3417
  • HTML全文瀏覽量:  152
  • PDF下載量:  649
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2001-12-17
  • 修回日期:  2002-07-29
  • 刊出日期:  2003-04-19

目錄

    /

    返回文章
    返回