The Research of Confidential Communication Based on the Elliptic Curve and the Combined Chaotic Mapping

نویسندگان

  • Weikun Zheng
  • Dongying Liang
چکیده

This paper presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, Hash Table, and elliptic curve. In this program, the elliptic curve algorithm is used for the key distribution. After the linear transformation, the original chaotic sequence generated by drive system can be combined to chaotic mapping, converted to an encryption key sequence and constructed as Hash table for message authentication. Communication experiment shows that this program is safe and is easy to implemented by software.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Chaos-Based Communication Scheme Using Proportional and Proportional-Integral Observers

In this paper, we propose a new chaos-based communication scheme using the observers. The novelty lies in the masking procedure that is employed to hide the confidential information using the chaotic oscillator. We use a combination of the addition and inclusion methods to mask the information. The performance of two observers, the proportional observer (P-observer) and the proportional integra...

متن کامل

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

Investigating the Chaotic Nature of Flow the Upstream and Downstream of Zayandehrud-Dam Reservoir Using Chaotic Systems’ Criteria

River discharge is among the influential factors on the operation of water resources systems and the design of hydraulic structures, such as dams; so the study of it is of great importance. Several effective factors on this non-linear phenomenon have caused the discharge to be assumed as being accidental. According to the basics the chaos theory, the seemingly random and chaotic systems have re...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009