<listing id="l9bhj"><var id="l9bhj"></var></listing>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<var id="l9bhj"></var><cite id="l9bhj"><video id="l9bhj"></video></cite>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"><listing id="l9bhj"></listing></strike></cite><cite id="l9bhj"><span id="l9bhj"><menuitem id="l9bhj"></menuitem></span></cite>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<ins id="l9bhj"><span id="l9bhj"></span></ins>
Volume 37 Issue 1
Jul.  2021
Turn off MathJax
Article Contents
TIAN Qing, XU Zheng-guang, TIAN Li. Chaotic stream encryption scheme based on topological conjugate chaotic systems of Tent map[J]. Chinese Journal of Engineering, 2015, 37(1): 125-131. doi: 10.13374/j.issn2095-9389.2015.01.019
Citation: TIAN Qing, XU Zheng-guang, TIAN Li. Chaotic stream encryption scheme based on topological conjugate chaotic systems of Tent map[J]. Chinese Journal of Engineering, 2015, 37(1): 125-131. doi: 10.13374/j.issn2095-9389.2015.01.019

Chaotic stream encryption scheme based on topological conjugate chaotic systems of Tent map

doi: 10.13374/j.issn2095-9389.2015.01.019
  • Received Date: 2013-11-27
    Available Online: 2021-07-10
  • A general chaotic stream encryption scheme is proposed by using two chaotic systems which topologically conjugate with Tent map and a method to generate independent and identically distributed chaotic streams. The stream encryption scheme is similar to the digital envelop, but the difference is that we only transport the initial values of Tent map and the parameters of the two chaotic sys-tems as the initial key. According to the conjugate relation, the initial values of the chaotic systems are obtained to achieve the purpose of masking these initial values. We calculate two independent and identically distributed chaotic key streams based on the two chaotic systems to encrypt the plaintext through twice feedback XOR. An application result of image cryptograph illustrates that the stream en-cryption scheme is effective and secure.

     

  • loading
  • 加載中

Catalog

    通訊作者: 陳斌, bchen63@163.com
    • 1. 

      沈陽化工大學材料科學與工程學院 沈陽 110142

    1. 本站搜索
    2. 百度學術搜索
    3. 萬方數據庫搜索
    4. CNKI搜索
    Article views (179) PDF downloads(11) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return
    久色视频