Zhan Ming, Zhang Cui-fang. A Scheme for Generating Key Sequences Based on Chaotic Control of m Sequence[J]. Journal of Electronics & Information Technology, 2006, 28(12): 2351-2354.
Citation:
Zhan Ming, Zhang Cui-fang. A Scheme for Generating Key Sequences Based on
Chaotic Control of m Sequence[J]. Journal of Electronics & Information Technology, 2006, 28(12): 2351-2354.
Zhan Ming, Zhang Cui-fang. A Scheme for Generating Key Sequences Based on Chaotic Control of m Sequence[J]. Journal of Electronics & Information Technology, 2006, 28(12): 2351-2354.
Citation:
Zhan Ming, Zhang Cui-fang. A Scheme for Generating Key Sequences Based on
Chaotic Control of m Sequence[J]. Journal of Electronics & Information Technology, 2006, 28(12): 2351-2354.
Directed by Shannons disorder theory, this paper present a scheme for generating key sequences by using the sensitivity to initial values and the long time unpredictability of chaos motion. The generating scheme and process of the key sequence are described in detail. The size of the key space, randomness testing and linear complexity testing are carefully studied by computer simulation. The results indicate that the key sequences satisfy the requirements of data encrypting.
赵耿, 方锦清. 混沌通信分类及其保密通信的研究. 自然杂志, 2003, 25(1): 21-30.[2]Frey D R. Chaotic digital encoding: An approach to securecommunication[J].IEEE Trans. on Circuits Systems II.1993, 40(10):660-666[3]张凤仙, 郑玉洁. 通信保密技术. 北京: 国防工业出版社, 2003, 36-40.[4]Macwillams F J, Sloane N J. A. Pseudo-random sequences and arrays[J].Proc. IEEE.1976, 64(12):1715-1729[5]王宏霞. 混沌技术在现代保密通信中的应用研究. [博士论文],成都:电子科技大学, 2002.[6]许春香, 魏仕民, 肖国镇. 关于周期序列的线性复杂度. 西安电子科技大学学报, 2001, 28(4): 434-437.