Chaos defined in general in quantitative characteristics is not a strict definition In this paper two new chaos functions are proposed and theoretical proof about chaos is finished based on a strict Devaney definition...
详细信息
ISBN:
(纸本)9781424413119
Chaos defined in general in quantitative characteristics is not a strict definition In this paper two new chaos functions are proposed and theoretical proof about chaos is finished based on a strict Devaney definition. Using composite chaotic system character, a composite chaos sequences cipher algorithm is designed, which map have uniform distribution function and delta-like self-correlation, and can produce balance nature series to 0-1 after quantified. The unchanged probability of composite chaos makes ciphertext has a good random. As the sensitivity to initial condition and random nature to iterative function choice, key and plaintext and ciphertext form complex and sensitive nonlinear relations, and the correlation is very small. The leaking of ciphertext to key and plaintext information can effectively be prevented. The experimental result show that the system has a very high safety and the key space is expanded.
This paper proposes a new efficient and secure Diffie-Hellman key agreement protocol based on Chebyshey chaotic map. The proposed key agreement protocol uses the semi-group property of Chebyshev polynomials to agree D...
详细信息
This paper proposes a new efficient and secure Diffie-Hellman key agreement protocol based on Chebyshey chaotic map. The proposed key agreement protocol uses the semi-group property of Chebyshev polynomials to agree Diffie-Hellman based session key. The proposed protocol provides strong security compared with the previous related protocols. In addition, the proposed protocol does not require any timestamp information and greatly reduces computational costs between communication parties. As a result, the proposed protocol is more practical and provides computational/communicational efficiency compare with several previously proposed key agreement protocols based on Chebyshev chaotic map. (C) 2010 Elsevier B.V. All rights reserved.
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of ...
详细信息
ISBN:
(纸本)9781936338184
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data. This research investigated the processing times of alternative encryption algorithms under specific conditions. The paper presents the architecture of a model multiplatform tool for the evaluation of candidate encryption algorithms based on different data and key sizes. The model software was used to appraise the performance of DES, AES, 3DES, MD5, SHAT, and SHA2 encryption algorithms.
This paper mainly studied how to improve security system by analyzing the current situation and defects of existing encryption security systems. Based on existing studies, optimized GPRS wireless security system (GPRS...
详细信息
ISBN:
(纸本)9783642233203;9783642233210
This paper mainly studied how to improve security system by analyzing the current situation and defects of existing encryption security systems. Based on existing studies, optimized GPRS wireless security system (GPRS-based WSS) based on AES was designed by using principles of designing a security system and basic theories in Cryptography. This new system can increase its query efficiency, accuracy and security.
ATM(Automatic Teller Machine)PIN (personal identification number)pad is essential in *** present,DES (Data encryption Standard),RSA (public key encryption algorithm),DUKPT(Derived Unique Key per Transaction)etc encryp...
详细信息
ISBN:
(纸本)9781457702686
ATM(Automatic Teller Machine)PIN (personal identification number)pad is essential in *** present,DES (Data encryption Standard),RSA (public key encryption algorithm),DUKPT(Derived Unique Key per Transaction)etc encryption algorithm was applied in the ATM PIN *** the paper,a PIN Pad system is designed based on 3DES encryption algorithm,and the exception handling is added in the PIN Pad (such as:jitter,command coverage,the wrong password more than three times).The experimental results demonstrate feasibility of designed system.
The recording and playback system (RPS) in video conference system needs to store mass of media data real-timely. Considering the security issue, media data should be encrypted before storing. Traditional full encrypt...
详细信息
The recording and playback system (RPS) in video conference system needs to store mass of media data real-timely. Considering the security issue, media data should be encrypted before storing. Traditional full encryption and partial encryption algorithms are not applicable to RPS because they could not adjust their speed to meet the throughput variation of media data in real-time RPS. In this paper, a novel lightweight speed-adaptive media-data encryption (SAME) scheme is proposed firstly. Secondly, the SAME is improved to a packet-based algorithm according to the implementation of data storage in RPS system. Thirdly, an RPS oriented queue theory-based autoadaptive speed control mechanism for SAME is designed. Finally, these schemes are integrated into the practical system, that is, AdmireRPS, an RPS of a heterogeneous wireless network-(HWN-) oriented video conference system. Theoretical analysis and experimental results show the SAME is effective enough to support real-time applications. In addition, the proposed schemes also can be used in video surveillance and other video recording systems.
Using the characteristics of the chaotic system, such as ergodicity, sensitivity to initial condition, system parameters and random like behavior, this paper proposes a new image encryption algorithm based on chaotic ...
详细信息
ISBN:
(纸本)9781424458561
Using the characteristics of the chaotic system, such as ergodicity, sensitivity to initial condition, system parameters and random like behavior, this paper proposes a new image encryption algorithm based on chaotic sequences and wavelet transform. This algorithm controls the initial parameters of two onedimensional chaotic sequences through keys, generates the chaotic sequence, diffuses the image, and then does wavelet decomposition to the diffused image, finally, scrambles the image using two-dimensional hyper-chaotic sequences. The experimental results show that this algorithm has a good encryption effect and a high security.
Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-...
详细信息
Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-known protocols, some parameters must be specified, the most important of which are usually algorithm identifiers and key or hash-output lengths. The author reviews some recent key length recommendations and compares those to current usage. He raises some issues that come up once we start to do the updates called for by various cryptographic experts and authorities who\'ve made recommendations on this topic - some of which call for widespread changes to occur in 2010.
As the aggregation of information, database system is the core part of computer information system. The security of the database system is of great importance, as the important resource of the website, the security of...
详细信息
ISBN:
(纸本)9781424429097
As the aggregation of information, database system is the core part of computer information system. The security of the database system is of great importance, as the important resource of the website, the security of its account is even more a focus of network security. According to the encrypt and encryption algorithm characteristics of database, to protect the security of database account, method can be used through setting unique value and implementing double hash encryption during encrypting.
Considering the inefficiency of using traditional RSA algorithm in SSL protocol at E-Business area, a new E-commerce security scheme which the ECC is embed into SSL Protocol has been put forward, and the test has been...
详细信息
ISBN:
(纸本)9781424452729
Considering the inefficiency of using traditional RSA algorithm in SSL protocol at E-Business area, a new E-commerce security scheme which the ECC is embed into SSL Protocol has been put forward, and the test has been carried out based on the OpenSSL source codes. The result of the test indicates that the security and efficiency of E-Business can be improved by adopting the new schemes.
暂无评论