Security and confidentiality of network communication using chaotic encryption technology

被引:1
|
作者
Cai, Zhongmin [1 ]
机构
[1] Henan Univ Anim Husb & Econ, Informat Engn Coll, Zhengzhou 450044, Henan, Peoples R China
关键词
Chaotic encryption; network communication; security confidentiality; National Institute of Standards and Technology test; secret key sensitivity;
D O I
10.3233/JCM-193840
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The rapid development of network communication puts forward higher requirements for the security of communication, and chaotic encryption technology is a mature and effective method in the field of security and secrecy. In this study, the application of chaotic encryption technology in network communication security and confidentiality was studied. Firstly, the chaotic encryption technology was briefly introduced. Then a network communication system based on chaotic encryption technology was established, and the specific establishment process was analyzed. Finally, National Institute of Standards and Technology (NIST) randomness test, secret key sensitivity test and confidentiality analysis based on information throughput were carried out to analyze the security and confidentiality of the system. The results showed that the system passed NIST randomness test, effectively defended the external attacks, and kept a favourable stability of confidentiality under different throughput. The experimental results proves the good security of chaotic encryption algorithm in the field of network communication and provides some bases for its specific application.
引用
收藏
页码:1083 / 1092
页数:10
相关论文
共 50 条
  • [31] Research on Computer Network Security Based on Data Encryption Technology
    Zhang, Yicong
    Zhou, Shujun
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 1383 - 1387
  • [32] Data Security and Encryption Technology Research on Smart Grid Communication System
    Zhu, Wenhao
    Guo, Qiyi
    PROCEEDINGS 2016 EIGHTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION ICMTMA 2016, 2016, : 175 - 178
  • [33] Security in Voip Network Using Neural Network and Encryption Techniques
    Galande, Ashwini
    Londhe, Dattatraya
    Balpande, Mangesh
    INFORMATION AND NETWORK TECHNOLOGY, 2011, 4 : 223 - 227
  • [34] The Application of Public Communication Network Security Management Based on End-to-End Image Encryption Algorithm of LU Chaotic System
    Wang, Yao
    International Journal of Network Security, 2024, 26 (06) : 1071 - 1081
  • [35] Improving Security in Communication Using Switched Chaotic Systems
    Lee, Tae H.
    Park, Ju H.
    Jung, Ho-Youl
    Lee, Sang-Moon
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2015, : 283 - 284
  • [36] Data Encryption by AES: Security Guarantee for Network Communication Sensitive Information
    Shan, Jizhou
    Ma, Hong
    International Journal of Network Security, 2023, 25 (06) : 1064 - 1069
  • [37] Image Encryption using Wavelet based Chaotic Neural Network
    Kumar, Sushil
    Aid, Rohit
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 875 - 879
  • [38] Network security and confidentiality with digital watermarking
    Bansal, Er. Ashish
    Bhadouria, Sarita Singh
    2007 INAUGURAL IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 2007, : 375 - +
  • [39] Analysis of Data Encryption Algorithms for Telecommunication Network-Computer Network Communication Security
    He, Yifeng
    Ye, Nan
    Zhang, Rui
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [40] Speech encryption using chaotic shift keying for secured speech communication
    P. Sathiyamurthi
    S. Ramakrishnan
    EURASIP Journal on Audio, Speech, and Music Processing, 2017