天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

混沌消息認證碼的研究

發(fā)布時間:2018-04-13 12:17

  本文選題:消息認證碼 + 混沌映射 ; 參考:《長沙理工大學》2014年碩士論文


【摘要】:信息時代的到來尤其是互聯(lián)網(wǎng)的快速發(fā)展使得數(shù)字信息的傳播和應(yīng)用受到了空前的關(guān)注重視,確保數(shù)字信息在通信時的安全有效性一直以來都是保密通信研究的熱點。消息認證碼作為驗證數(shù)據(jù)合法性的一種常見方法被應(yīng)用于金融、商業(yè)系統(tǒng)等各種各樣的安全系統(tǒng)中,是確保數(shù)字信息在通信信道中能夠安全傳輸?shù)挠行琳。而混沌加密算法表現(xiàn)出來的良好性能和光明應(yīng)用前景為信息認證碼算法的設(shè)計研究提供了有利條件,將混沌現(xiàn)象的優(yōu)良特性有效應(yīng)用于消息認證碼的算法設(shè)計中是研究混沌密碼學的另一重要研究方向。本文在認真學習研究現(xiàn)有混沌消息認證碼相關(guān)成果的基礎(chǔ)上,針對混沌消息認證碼算法的構(gòu)造方法,以及消息認證碼的核心——混沌hash函數(shù)的設(shè)計研究進行深入學習鉆研,采用理論與實驗相結(jié)合的方法,對算法的實驗數(shù)據(jù)和安全性能做出了詳細解析。首先,在分析證明已有算法HMAC (Hashed Message Authentication Code)算法存在的固有缺陷的基礎(chǔ)上,給出了針對HMAC參數(shù)的偽造攻擊實例。提出了一種基于經(jīng)典混沌映射的改進方案,采用經(jīng)典混沌映射級聯(lián)方式構(gòu)造一個混沌序列發(fā)生器,利用秘密密鑰以及明文消息塊作為混沌映射輸入,動態(tài)生成HMAC參數(shù)值,使攻擊者無法捕捉到參數(shù)生成的軌跡。該方案通過混沌迭代生成HMAC參數(shù)值,混沌系統(tǒng)的初值敏感和不可預(yù)測性確保了參數(shù)值的動態(tài)性,從而有效抵抗偽造攻擊,提高HMAC算法的安全性能。并對算法的統(tǒng)計性能和抗碰撞性能進行了matlab實驗仿真,實驗結(jié)果表明,該方案能夠動態(tài)生成HMAC算法參數(shù),有效地防御因常態(tài)參數(shù)造成的偽造攻擊。此外,針對消息認證碼的核心算法hash函數(shù)部分給出了一種新型時空混沌雙擾動的混沌hash構(gòu)造方案,該方案是一個耦合方式和m序列同時施加擾動的時空混沌系統(tǒng),用Chebyshev映射迭代值作為雙向耦合帳篷時空混沌模型的初值,產(chǎn)生的序列具備較好的擴散和混亂特性,在時空混沌迭代末端,加入m序列產(chǎn)生器對選定的hash初值施加擾動,以抵抗存在性偽造攻擊等攻擊。利用該模型可以實現(xiàn)任意長度明文序列轉(zhuǎn)換成為160位hash值。經(jīng)過matlab實驗仿真,實驗結(jié)果表明,該方案具備了良好的初值敏感性、抗碰撞性能以及其他hash安全性要求,可以抵抗針對帶密鑰hash函數(shù)算法的各種攻擊,是一種安全性能良好且能與消息認證等其他網(wǎng)絡(luò)技術(shù)有效融合使用的算法。
[Abstract]:With the arrival of the information age, especially the rapid development of the Internet, the dissemination and application of digital information has received unprecedented attention. To ensure the security and effectiveness of digital information in communication has always been a hot topic in the research of secure communication.As a common method to verify the validity of data message authentication codes are used in various security systems such as finance commercial systems and so on. It is an effective barrier to ensure the secure transmission of digital information in communication channels.The good performance of the chaotic encryption algorithm and the bright application prospects provide favorable conditions for the design and research of the information authentication code algorithm.It is another important research direction to study chaos cryptography by applying the excellent characteristic of chaos to the algorithm design of message authentication code.On the basis of studying and studying the related achievements of chaotic message authentication code, this paper studies the construction method of chaotic message authentication code algorithm and the design of chaotic hash function, which is the core of message authentication code.The experimental data and security performance of the algorithm are analyzed in detail by combining theory with experiment.Firstly, on the basis of analyzing and proving the inherent defects of the existing algorithm HMAC Hashed Message Authentication Code, an example of HMAC parameter forgery attack is given.In this paper, an improved scheme based on classical chaotic mapping is proposed. A chaotic sequence generator is constructed by cascading the classical chaotic map. The secret key and clear message block are used as the chaotic map input, and the HMAC parameter values are dynamically generated.An attacker is unable to capture the path generated by the parameter.The HMAC parameter value is generated by chaotic iteration. The sensitivity and unpredictability of the initial value of chaotic system ensure the dynamic property of the parameter value, thus effectively resist forgery attack and improve the security performance of the HMAC algorithm.The statistical performance and anti-collision performance of the algorithm are simulated by matlab. The experimental results show that the scheme can dynamically generate the parameters of the HMAC algorithm and effectively defend against forgery attacks caused by the normal parameters.In addition, for the core algorithm of message authentication code (hash), a novel chaotic hash construction scheme is proposed, which is a coupled system with m sequences and m sequences perturbed at the same time.Using the iterative value of Chebyshev map as the initial value of bidirectional coupling tent spatiotemporal chaotic model, the resulting sequence has good diffusion and chaos characteristics. At the end of spatiotemporal chaos iteration, m sequence generator is added to disturb the selected initial value of hash.To resist existential forgery attacks, etc.The model can be used to convert any length of plaintext sequence to 160-bit hash value.Through matlab simulation, the experimental results show that the scheme has good initial value sensitivity, anti-collision performance and other hash security requirements, and can resist all kinds of attacks against the algorithm with key hash function.It is an algorithm with good security and can be used with other network technologies such as message authentication.
【學位授予單位】:長沙理工大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TN918.4;O415.5

【參考文獻】

相關(guān)期刊論文 前1條

1 鄧紹江;廖曉峰;肖迪;;一種基于混沌的可并行Hash函數(shù)[J];計算機科學;2008年06期

,

本文編號:1744451

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/1744451.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶982c7***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com