Computer Engineering and Applications ›› 2009, Vol. 45 ›› Issue (6): 101-104.DOI: 10.3778/j.issn.1002-8331.2009.06.029
• 网络、通信、安全 • Previous Articles Next Articles
ZHAO Liang1,LIAO Xiao-feng1,XIAO Di1,2,ZHOU Qing1
Received:
Revised:
Online:
Published:
Contact:
赵 亮1,廖晓峰1,肖 迪1,2,周 庆1
通讯作者:
Abstract: For protecting the security of email transmission on the Internet,this paper proposes a fast and easy-to-realize email encryption algorithm based on the one dimension piecewise linear chaotic model.A kind of software for encrypting and decrypting text files has also been implemented based on the proposed algorithm.Finally,the security is analyzed from three sides which include statistical properties,sensitivity to cipher-text and resistance to known attacks and so on mainly.Simulation results indicate the reliability of the system.
Key words: email encryption, chaotic encryption, one dimension piecewise linear chaotic model, look-up table
摘要: 为了保护在网络中所传输邮件的安全性,基于一维分段线性混沌模型,设计了安全高速且易于实现的电子邮件混沌加密软件,给出了对文本文件加密和解密的算法、具体实现和效果,最后主要从统计特性、密文敏感性以及抗攻击性等三方面对安全性进行了分析,证明了系统的可靠性。
关键词: 电子邮件加密, 混沌加密, 一维分段线性混沌模型, 查询表
ZHAO Liang1,LIAO Xiao-feng1,XIAO Di1,2,ZHOU Qing1. Design and implementation of chaotic email encryption soft ware[J]. Computer Engineering and Applications, 2009, 45(6): 101-104.
赵 亮1,廖晓峰1,肖 迪1,2,周 庆1. 混沌电子邮件加密软件的设计及实现[J]. 计算机工程与应用, 2009, 45(6): 101-104.
0 / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://cea.ceaj.org/EN/10.3778/j.issn.1002-8331.2009.06.029
http://cea.ceaj.org/EN/Y2009/V45/I6/101
Mapping between de Bruijn sequences and algorithms for generating de Bruijn sequences by raising stage