首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于Chebyshev多项式的公钥加密和密钥交换方案的改进
引用本文:王大虎,魏学业,李庆九,柳艳红.基于Chebyshev多项式的公钥加密和密钥交换方案的改进[J].铁道学报,2006,28(5):95-98.
作者姓名:王大虎  魏学业  李庆九  柳艳红
作者单位:1. 北京交通大学,电子与信息工程学院,北京,100044;信息安全国家重点实验室(中国科学院软件研究所),北京,100080
2. 北京交通大学,电子与信息工程学院,北京,100044
3. 焦作天方建材股份有限公司,河南,焦作,454002
基金项目:作者感谢中国科学院信息安全国家重点实验室的支持.
摘    要:构成一种公钥加密方案的关键是找到一个带陷门的单向函数。Kocarev利用Chebyshev映射的半群特性,提出了一种混沌公钥加密方案。但是经分析发现其是不安全的,由于三角函数的固有周期性,使得攻击者很容易破解,攻击者在已知密文的条件下很容易解出明文。基于此,提出了一种改进方案。该方案将Chebyshev多项式的状态空间扩展到实数域,从而利用Chebyshev多项式的半群特性构成具有单向带陷门的公钥加密算法,同时又可以避免上述已知密文的攻击。经过对其性能的研究发现,新方案是安全有效的;同时提出基于这种扩展的Chebyshev多项式的半群特性的密钥交换方案。

关 键 词:安全性  混沌映射  公钥加密  密钥交换
文章编号:1001-8360(2006)05-0095-04
收稿时间:2005-03-28
修稿时间:2005-03-282005-09-19

Improvement in Public-key Encryption and Key Exchange Scheme Based on Chebyshev Polynomials
WANG Da-hu,WEI Xue-ye,LI Qing-jiu,LIU Yan-hong.Improvement in Public-key Encryption and Key Exchange Scheme Based on Chebyshev Polynomials[J].Journal of the China railway Society,2006,28(5):95-98.
Authors:WANG Da-hu  WEI Xue-ye  LI Qing-jiu  LIU Yan-hong
Institution:1. School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China; 2. State Key Laboratory of Information Security (Institute of Software of Chinese Academy of Sciences
Abstract:It is essential to discover a one-way trap-door function in constructing a public-key encryption scheme. Kocarev invented an encryption scheme based on the semi-group property of Chebyshev mapping. The scheme was found insecure. Due to the inherent periodicity of the trigonometric function , an attacker can easily decode the scheme when some ciphers are given. In the paper we extend the state space of Chebyshev polynomials to the real number domain, employ the semi-group property of Chebyshev polynomials to construct a one- way door-trap function, and avoid the attack . A new scheme based on the extended Chebyshev polynomials is given. Moreover, the relative public-key encryption and key exchange schemes are presented. The encrypt systems show themselves to be practical and secure.
Keywords:security  chaotic mapping  public-key encryption  key exchange scheme
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号