Professional Documents
Culture Documents
Iccasm 2010 5620110
Iccasm 2010 5620110
Iccasm 2010 5620110
Abstract-In this paper , the chaos theory and some specific The nonlinear system has many kinds of forms from the
contents of modern cryptography are introduced. By non-chaotic state to the chaotic state evolutionary process.
analyzing the relationship between chaos and cryptography , And most typical has three kinds:
some approaches and their framework for chaotic 1) Time of cyclical furcation process. Supposes some
cryptography system are proposed. Some criteria about how to
nonlinear system to occupy the constant state at first, along
choose chaotic systems and their parameters in digital
encryption are given in detail •
with controlled variable's increase, when achieves some
value, the system mode has the sudden change, has the
Keywords-component; Chaos Theory; Modern Cryptography; stable periodic oscilation condition, along with controlled
The nonlinear system variable's unceasing increase, system's condition will have a
series of sudden changes, vibrates in the frequency spectrum
I. INTRODUCTION to present the frequency division or the cycle doubling
The computer from appears to the present, already from effect. When the system presents non-cyclical the confusion
used in calculating the turning point to mainly to use in oscillatory regime, namely chaotic motion condition. The
theinformation processing. Internet provides the massive frequency division phenomenon only then in controlled
information service for the user every day. Because the variable's some valve value can appear in the nonlinear
Internet basic agreement is not the completely safe system, it is the overture which the chaotic motion produces.
agreement. Not after the information which specially 2) Intermittence the chaos process. Regarding has the
encrypts transmits when the network, will directly expose in time of cyclical furcation evolutionary process nonlinear
the entire network. Modem high performance's computer, system, when after entering the chaotic state, constitutes a
automated analysis and interception procedure each second
chaos area in controlled variable's some scope. In the chaos
may search several million facts, It had has serious pressure
to traditional encryption algorithm constitution. In the past's area, is not each controlled variable correspondence is the
ten years, along with to the chaos theory research thorough, chaotic state. Between controlled variable's many plots, is
chaos theory's application scope also unceasingly expands corresponding the periodic oscilation condition, between
unceasingly. Chaos in cryptology application becomes these plots is called in the chaos area the cyclical window.
popular research area and proposed the massive chaos Nearby the cyclical window, state variable's time behavior
encryption algorithm .The majority simulation chaos's displays the cycle, suddenly to be from time to time chaotic,
password use chaos synchronization technology, through has jumps stochastically between the two.
chirp the channel to realize the secret signaling. Because the 3) Half of periodic movement to chaos. If the system
chaos theory nearly several dozens years obtained the increases along with the controlled variable, presents two in
enormous development, the innumerable chaos systems may
the vibration frequency spectrum not to be possible the joint
apply in the cryptology, therefore the chaos must become in
the cryptology the new rich resources. pledge frequency, this kind of movement is called the
quasiperiodic movement. The quasiperiodic and the
II. C HAOS THEORY frequency-locking appear alternately, enters the chaotic state
CHAOS mathematical MODEL finally.
In recent years, obtained many meaningful results to Judges the chaotic motion three main characteristic
chaos phenomenon's experiment, but more results come from quantities
to the nonlinear system mathematical model theoretical 1) Dimension. Promotes the dimension concept to the
analysis and the computer simulation. There have some phase space studies the chaos question, strange attracts the
equation to describes these the model: non-line iteration actor's opening words the dimension is score Uygur cannot
equation (group), non-line autonomous simultaneous be integer Uygur.
differential equation and difference differential equation 2) Entropy. kolmogorov in the entropy concept
(group).
introduction dynamic system, judges with the entropy value
Chaos evolutionary process
dynamic system's order or the chaos degree.
decipher transforms DK2 E D, C --+M, k2 E K2 ,realizes by The chaos mapping should have the following attribute:
the decipher. Said that the overall (M, C, K1, K2 , EK 1, Blending attribute, robust chaos and big parameter collection.
Needs to point out that has above attribute chaos system
DK2) is a privacy system. Regarding assigns definite orders uncertain security, but does not have the chaos cryptographic
news m E M, key kl E Kl ,encryption transformation the system which the above attribute obtains is inevitably weak.
definite orders m transformation for scrambled text c, 1) Mixing attribute. Will regard as the initial condition
namely c = f (m, K1) = EKI (m). The receiving end use k territory in black and white, then mixes the attribute is refers
which passes on through the safe key channel (under single to the single definite orders mark influence proliferates to
key system) or decipher key K2 which produces with the many scrambled text marks. Obviously, in this attribute
local key generator E K2 (under double key system) correspondence cryptology proliferation attribute. Has the
controls the decipher to operate D, receives the scrambled blending attribute system to have the good statistical
text carries on definite orders news m which the property:
transformation obtains restores, namely m = g (c, K2 ) = When iterative number of times, the scrambled text
statistical nature does not rely on the definite orders
DK2 (c) (2). But the password assayer, uses its designation
statistical nature. Thus, cannot obtain the definite orders
to break transition function h, carries on the transformation structure by the scrambled text statistical structure.
to interception scrambled text c, obtains definite orders space 2) Robust chaos. The robust chaos is refers to under the
some element m " namely m ' = h (c) (3).
' small parameter perturbation, the series still maintained the
Generally, m tm. if m = m, then the password breaks
chaotic state. But, generally speaking the majority chaoses
'
V7-333
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
VI. CONCLUSION
ACKNOWLEDGMENT
REFERENCES
[I] XUN YI , and CHIK HOW TAN , "A New Block Cipher Based on
Chaotic Tent Maps, Circuits and Systems I" : Fundamental Theory
and Applications[J] . IEEE Transactions on, 2002 , 49(12) : 1 826 -
1 829.
[2] KWOK WONG, and CHING KI, "AChaoticCryptography Scheme
for G enerating Short Ciphertext" [J] . Physics Letters A ,2003 ,310 :
67 -73.
[3] WAI WONG," A Modified Chaotic Cryptographic Method" [ J ] .
ComputerPhysics Communications 2001 ,138 :234 - 236 .
[4] L I SHUJUN, and MOU XUANQIN ," proving Security of a Chaotic
Encryption Approach "[ J] .Physics Letters A,2001 ,290 : 127 - 133.
[5] L I SHUJUN , MOU XUANQIN , CAl YUANLONG, et al. "On the
Security of a Chaotic Encrypti on Scheme Problems with
Computerized Chaos in Finite Computing Precisio "n[J ] . Computer
Physics Communications, 2003,153 :52- 58.
[6] STOJANOVSKI T , KOCAREV L , HARRIS R. :Applicationsof
Symbolic Dynamics in Chaos Synchronization "[J ] IEEE
TRANSACTIONS ON CIRCUITS AND SYSTEMS
I :FUNDAMENTAL THEORY AND APPL ICATIONS,
V7-334