2016 Volume 6 Issue 4
Article Contents

Chunlei Fan, Qi Zhang, Haoran Sun, Bingbing Song, Qun Ding. DESIGNING NETWORK ENCRYPTION MACHINE BASED ON HENON CHAOTIC KEY ALGORITHM[J]. Journal of Applied Analysis & Computation, 2016, 6(4): 1126-1134. doi: 10.11948/2016074
Citation: Chunlei Fan, Qi Zhang, Haoran Sun, Bingbing Song, Qun Ding. DESIGNING NETWORK ENCRYPTION MACHINE BASED ON HENON CHAOTIC KEY ALGORITHM[J]. Journal of Applied Analysis & Computation, 2016, 6(4): 1126-1134. doi: 10.11948/2016074

DESIGNING NETWORK ENCRYPTION MACHINE BASED ON HENON CHAOTIC KEY ALGORITHM

  • Fund Project:
  • Nowadays, embedded network products are widely used in various technological fields. However, when such products are used, the transmission of network data could not be guaranteed with high security. To address the issue, this paper designed a network encryption machine based on S3C6410 processor and DM9000 Ethernet controller. The hardware circuit of this encryption machine is designed and developed with conciseness and stability. In software design, an improved algorithm of chaotic encryption based on Henon mapping is proposed. The algorithm overcomes the shortcoming in combining Logistic and Tent chaotic sequences. Moreover, the paper demonstrates some comparative experiments about autocorrelation and randomness. The results indicate that the new algorithm based on Henon chaotic sequences has a good performance in safety and is able to meet the requirements of confidential communications.
    MSC: 62P30;97P30;97R50
  • 加载中
  • [1] A. Akhshani, A. Akhavan and A. Mobaraki, Pseudo random number generator based on quantum chaotic map, Communications in Nonlinear Science & Numerical Simulation, 19(2014)(1), 101-111.

    Google Scholar

    [2] B. Chen, G. H. Liu and Y. Zhang, Hardware-realized method of chaotic encryption, Journal of UEST of China, 35(2006)(1), 32-35.

    Google Scholar

    [3] B. X. Du, X. L. Geng and F. Y. Chen, Generation and realization of digital chaotic key sequence based on double K-L transform, Chinese Journal of Electronics, 22(2013)(1), 131-134.

    Google Scholar

    [4] C. Han and K. R. Wang, Design and realization of embedded system network interface based on DM9000, Industrial Control Computer, 20(2007)(4), 17-18.

    Google Scholar

    [5] G. J. Hu and Z. J. Feng, Security property of a class of digital chaotic encryption system, Journal of Electronics and Information Technology, 25(2003)(11), 1514-1518.

    Google Scholar

    [6] Q. Liu, J. Q. Fang and G. Zhao, Research of chaotic encryption system based on FPGA technology, Acta Physica Sinica, 61(2012)(13), 1-6.

    Google Scholar

    [7] A. Shrobek, Cryptanalysis of chaotic stream cipher, Physics letters A, 363(2007)(1), 84-90.

    Google Scholar

    [8] X. M. Wang, W. F. Zhang and W. Guo, Secure chaotic system with application to chaotic ciphers, Information Sciences, 221(2013)(1), 555-570.

    Google Scholar

    [9] T. Y. Wu and Y. M. Tseng, Publicly veriable multi-secret sharing scheme from bilinear pairings, IET Information Security, 7(2013)(3), 239-246.

    Google Scholar

    [10] T. Y. Wu, T. T. Tsai and Y. M. Tseng, Ecient searchable ID-based encryption with a designated server, Annals of Telecommunications, 69(2014)(7), 391-402.

    Google Scholar

    [11] T. Y. Wu, Y. M. Tseng and T. T. Tsai, A revocable ID-based authenticated group key exchange protocol with Resistant to malicious participants, Computer Networks, 56(2012)(12), 2994-3006.

    Google Scholar

    [12] Y. B. Zheng, J. Pan and Y. Song, Research on the quantifications of chaotic random number generator, International Journal of Sensor Networks, 15(2014)(1), 139-143.

    Google Scholar

    [13] Y. F. Zhou, L. W. Li and L. L. Zou, Practical Tutorial of Embedded Linux, Publishing House of electronics Industry, beijing, 2014.

    Google Scholar

    [14] Y. Zhou, C. Y. Zhu and Y. M. Wang, Study on the performances of logistic digital chaotic sequences, Modern Electronics Technique, 19(2006)(9), 69-71.

    Google Scholar

Article Metrics

Article views(2531) PDF downloads(975) Cited by(0)

Access History

Other Articles By Authors

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint