Security and confidentiality of network communication using chaotic encryption technology

被引:1
|
作者
Cai, Zhongmin [1 ]
机构
[1] Henan Univ Anim Husb & Econ, Informat Engn Coll, Zhengzhou 450044, Henan, Peoples R China
关键词
Chaotic encryption; network communication; security confidentiality; National Institute of Standards and Technology test; secret key sensitivity;
D O I
10.3233/JCM-193840
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The rapid development of network communication puts forward higher requirements for the security of communication, and chaotic encryption technology is a mature and effective method in the field of security and secrecy. In this study, the application of chaotic encryption technology in network communication security and confidentiality was studied. Firstly, the chaotic encryption technology was briefly introduced. Then a network communication system based on chaotic encryption technology was established, and the specific establishment process was analyzed. Finally, National Institute of Standards and Technology (NIST) randomness test, secret key sensitivity test and confidentiality analysis based on information throughput were carried out to analyze the security and confidentiality of the system. The results showed that the system passed NIST randomness test, effectively defended the external attacks, and kept a favourable stability of confidentiality under different throughput. The experimental results proves the good security of chaotic encryption algorithm in the field of network communication and provides some bases for its specific application.
引用
收藏
页码:1083 / 1092
页数:10
相关论文
共 50 条
  • [41] Speech encryption using chaotic shift keying for secured speech communication
    Sathiyamurthi, P.
    Ramakrishnan, S.
    EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING, 2017,
  • [42] Steps towards improving the security of chaotic encryption
    Fraser, B
    Yu, P
    Lookman, T
    PHYSICAL REVIEW E, 2002, 66 (01): : 1 - 017202
  • [44] The methods of digital communication system chaotic encryption using the duffing oscillator
    Wang, YW
    Shi, YW
    Yi, WS
    Nie, CY
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 1845 - 1848
  • [45] An image encryption scheme using a chaotic neural network and a network with multistable hyperchaos
    Wang, Shuying
    Hong, Ling
    Jiang, Jun
    OPTIK, 2022, 268
  • [46] Chaotic Encryption-Based Network Robot for Indoor Security and Remote Video Monitoring
    Zhang, Man
    Chen, Ning
    Informatica (Slovenia), 2024, 48 (14): : 117 - 130
  • [47] On the Security Analysis of a Hopfield Chaotic Neural Network-Based Image Encryption Algorithm
    Hu, Yingchun
    Yu, Simin
    Zhang, Zeqing
    COMPLEXITY, 2020, 2020 (2020)
  • [48] Proposal for Secure Group Communication using Encryption Technology
    Tanada, Shinya
    Suzuki, Hidekazu
    Naito, Katsuhiro
    Watanabe, Akira
    2016 NINTH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND UBIQUITOUS NETWORKING (ICMU), 2016, : 68 - 73
  • [49] Research on Application Value of Data Encryption Technology in Computer Network Security
    Meng, Xiaoli
    MODERN COMPUTER SCIENCE AND APPLICATIONS II (MCSA 2017), 2017, : 13 - 18
  • [50] Network Information Security Data Protection Based on Data Encryption Technology
    Ping, Han
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (03) : 2719 - 2729