会议专题

The Application of Chaotic Encryption Model in the Network Identity Authentication

  This paper analyzes a sort of color still image algorithm based on the Logistic map sorting,and verifies the confidentiality.Further,this algorithm will be applied to the authentication module in network identity authentication system.A new,safe and effective certification system is realized based on the network identity card,and the authority authentication is provided for users requiring identity identification on the network.Nowadays,cryptography and network security is a hot topic for communication and computer industry.Currently,encryption technique in the information security mainly contains conventional private key encryption system and public key encryption system,the former has low computation overhead,but its encryption strength is not high; the latter,although has high eneryption strength,its computation cost is huge.Therefore,it has profound theoretical significance and wide application prospects to research a sort of information encryption algorithms and information security software system with security,good confidentiality and high calculation speed.Chaos phenomenon is a determinacy process which is similar to random,and often appears in nonlinear dynamical system,this process is neither periodic nor convergent,and is sensitively dependent on initial value 1-3.These basic features of chaotic system can just meet the basic requirements of secret communication and cryptology.The researches of Secret communication,information encryption and information hiding technology are based on chaos theory,and have become one of popular and frontier topics developed by the cross fields of international nonlinearscience and information science.Also it is an international,high-tech researched new field,cryptography based on chaos theory has recently become very popular science 2.In our paper,chaotic model images encryption technology is applied to Network identity authentication system to prevent rampant e-commerce fraud.

chaotic encryption identity authentication information hiding

Pang Chunjiang

Department of Computer Engineering, North China Electric Power University, Baoding 071003,China

国际会议

2012 2nd international Conference on Materials Science and Information Technology(2012第二届材料科学与信息技术国际会议)(MSIT2012)

西安

英文

850-853

2012-08-24(万方平台首次上网日期,不代表论文的发表时间)