Security and confidentiality of network communication using chaotic encryption technology

被引:1
|
作者
Cai, Zhongmin [1 ]
机构
[1] Henan Univ Anim Husb & Econ, Informat Engn Coll, Zhengzhou 450044, Henan, Peoples R China
关键词
Chaotic encryption; network communication; security confidentiality; National Institute of Standards and Technology test; secret key sensitivity;
D O I
10.3233/JCM-193840
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The rapid development of network communication puts forward higher requirements for the security of communication, and chaotic encryption technology is a mature and effective method in the field of security and secrecy. In this study, the application of chaotic encryption technology in network communication security and confidentiality was studied. Firstly, the chaotic encryption technology was briefly introduced. Then a network communication system based on chaotic encryption technology was established, and the specific establishment process was analyzed. Finally, National Institute of Standards and Technology (NIST) randomness test, secret key sensitivity test and confidentiality analysis based on information throughput were carried out to analyze the security and confidentiality of the system. The results showed that the system passed NIST randomness test, effectively defended the external attacks, and kept a favourable stability of confidentiality under different throughput. The experimental results proves the good security of chaotic encryption algorithm in the field of network communication and provides some bases for its specific application.
引用
收藏
页码:1083 / 1092
页数:10
相关论文
共 50 条
  • [1] Security technology of a wireless sensor network based on chaotic encryption
    Hu, Yuxiang
    ENERGY SCIENCE AND APPLIED TECHNOLOGY (ESAT 2016), 2016, : 623 - 627
  • [2] Research on neural network chaotic encryption algorithm in wireless network security communication
    Liang, Chen
    Zhang, Qun
    Ma, Jianfeng
    Li, Kaiming
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [3] Research on neural network chaotic encryption algorithm in wireless network security communication
    Chen Liang
    Qun Zhang
    Jianfeng Ma
    Kaiming Li
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [4] Application of the Data Encryption Technology in the Computer Network Communication Security
    Hu, Xiaoling
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 126 : 283 - 283
  • [5] The Application of Data Encryption Technology in Computer Network Communication Security
    Gong, Lina
    Zhang, Li
    Zhang, Wei
    Li, Xuhong
    Wang, Xia
    Pan, Wenwen
    2017 5TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2017), 2017, 1834
  • [6] The Application of Data Encryption Technology in Computer Network Communication Security
    Liu, Guanxiu
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [7] Research on Applications of Data Encryption Technology in Security of Computer Network Communication
    Li, Na
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017), 2017, 141 : 136 - 139
  • [8] Research on the Application of Data Encryption Technology in Computer Network Communication Security
    Xia, Kuiliang
    Song, Xiaoming
    2020 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND HUMAN-COMPUTER INTERACTION (ICHCI 2020), 2020, : 164 - 167
  • [9] Application Analysis of Data Encryption Technology in Computer Network Communication Security
    Zhang, Xianjing
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 265 - 267
  • [10] Preserving the confidentiality of digital images using a chaotic encryption scheme
    Jolfaei, Alireza
    Matinfar, Ahmadreza
    Mirghadri, Abdolrasoul
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (03) : 258 - 277