基于Chebyshev多项式的公钥密码及相关研究
发布时间:2019-02-09 16:55
【摘要】:随着信息化进程的飞速发展,云计算和大数据等新技术应用所面临的信息安全隐患不断增加,密码成为保证信息安全的关键技术。由于通信环境的日趋复杂和破译能力的不断提升,一些传统密码算法被攻破或安全性受到威胁。混沌是由确定系统产生的貌似随机性的行为,具有对初始条件和系统参数的极端敏感性和长期不可预测性等特征,满足密码设计的混淆与扩散原则,因而混沌理论为新形态密码学技术研究注入了新的活力。目前混沌密码学的研究集中在序列密码、分组密码等方面,混沌公钥密码的研究相对薄弱。本文对基于Chebyshev多项式的混沌公钥密码进行研究,涉及到混沌Hash函数、公钥密码的安全构造、数字签名和密钥交换协议的设计以及公钥密码在混沌图像加密中的应用研究,主要成果如下:(1)基于全局耦合时空混沌系统提出一种具有并行结构的Hash函数设计方案(HFGCS),'它可以根据实际需要灵活调整所处理明文块的大小以及生成Hash值的长度。实验分析表明HFGCS方案具有较好的明文敏感性和混淆扩散能力,相关的比较也显示了其良好的性能。混沌Hash函数为公钥密码及相关研究提供了工具。(2)针对有限域Chebyshev-Elgamal类型的公钥密码方案(CEPKC)无法抵抗选择密文攻击的缺陷,提出两种基于Chebyshev多项式的公钥密码的安全设计方案:CEPKC-Ⅰ和CEPKC-Ⅱ都能够抵抗选择密文攻击,并保证信息的完整性验证。相比于CEPKC-Ⅰ, CEPKC-Ⅲ能够突破加密明文长度的限制,具有更小的密文扩张率,并且在标准模型下针对不可区分适应性选择密文攻击模型(IND-CCA2)是可证明安全的。利用基于Chebyshev多项式的公钥密码提出一种基于身份的前向安全数字签名方案(IBFSS),它可以通过身份信息对签名进行验证,并且即使在当前密钥泄露的情况下仍能保证其先前签名消息的不可伪造性。IBFSS方案安全性基于大整数因式分解和Cheyshev离散对数难题(CDLP),具有结构简单和计算量小的优点。指出一种基于Chebyshev多项式的三方密钥交换协议方案(3PKAC-Ⅰ)存在的安全和性能缺陷,然后提出一种改进方案(3PKAC-Ⅱ)。它能够保证用户身份信息保密性和相互认证,降低密钥分配和管理费用。为了降低密钥交换协议的网络通信负担,本文提出一种新的基于Chebyshev多项式的两方密钥交换协议方案(2PKAC),具有高效的密钥分发和管理策略,安全分析表明2PKAC方案能够抵抗各种不同的攻击。(3)利用DNA编码和混沌系统,提出一种新的选择图像加密方案(SIE)。Loistic和时空混沌系统的极端敏感性以及结构复杂性可以增加其复杂度,DNA编码和代数操作可以加快图像混淆和扩散的速度,通过选择每个像素前四个高处有效位能减少一半的加密数据量。SIE方案将图像信息熵调制为时空混沌系统的参数,使其能抵抗选择明文攻击。为了解决密钥分发和信息熵传输问题,本文结合SIE方案和CEPKC-Ⅱ公钥密码方案,形成一种混合加密体制。实验模拟和安全性能分析表明SIE方案能够保证安全性和高效性。
[Abstract]:With the rapid development of the information process, the information security hidden danger faced by new technology applications such as cloud computing and big data is increasing, and the password becomes the key technology to ensure information security. Due to the increasing complexity of the communication environment and the continuous improvement of the decoding ability, some traditional cipher algorithms have been breached or the security is threatened. It is a kind of random behavior that is produced by the system, which has the characteristics of extreme sensitivity and long-term unpredictability to the initial conditions and system parameters, and satisfies the confusion and diffusion principle of the cipher design. At present, the research of hybrid cryptography is relatively weak in the key cryptography, packet cipher, and so on. This paper studies the code of the public key based on Chebyshev polynomial, which involves the design of the hash function, the security structure of the public key's password, the design of the digital signature and the key exchange protocol, and the application of the public key code in the encryption of the hybrid image. The main results are as follows: (1) a Hash function design scheme (HFGCS) with a parallel structure is proposed based on a global coupling space-time hybrid system, it can flexibly adjust the size of the processed plaintext block and the length of the hash value according to the actual needs. The experimental results show that the HFGCS solution has good clear-text sensitivity and confusion diffusion ability, and the related comparison also shows its good performance. The hybrid Hash function provides a tool for the public key cryptography and the related research. (2) The public key cryptography scheme (CEPKC) of the Chebyshev-Elgamal type of the finite field is unable to resist the selection of the defect of the ciphertext attack, and proposes two security designs of the public key password based on the Chebyshev polynomial: Both CEPKC-I and CEPKC-II can resist the selection of ciphertext attack and ensure the integrity verification of the information. Compared with the CPKC-I, the CPKC-鈪,
本文编号:2419183
[Abstract]:With the rapid development of the information process, the information security hidden danger faced by new technology applications such as cloud computing and big data is increasing, and the password becomes the key technology to ensure information security. Due to the increasing complexity of the communication environment and the continuous improvement of the decoding ability, some traditional cipher algorithms have been breached or the security is threatened. It is a kind of random behavior that is produced by the system, which has the characteristics of extreme sensitivity and long-term unpredictability to the initial conditions and system parameters, and satisfies the confusion and diffusion principle of the cipher design. At present, the research of hybrid cryptography is relatively weak in the key cryptography, packet cipher, and so on. This paper studies the code of the public key based on Chebyshev polynomial, which involves the design of the hash function, the security structure of the public key's password, the design of the digital signature and the key exchange protocol, and the application of the public key code in the encryption of the hybrid image. The main results are as follows: (1) a Hash function design scheme (HFGCS) with a parallel structure is proposed based on a global coupling space-time hybrid system, it can flexibly adjust the size of the processed plaintext block and the length of the hash value according to the actual needs. The experimental results show that the HFGCS solution has good clear-text sensitivity and confusion diffusion ability, and the related comparison also shows its good performance. The hybrid Hash function provides a tool for the public key cryptography and the related research. (2) The public key cryptography scheme (CEPKC) of the Chebyshev-Elgamal type of the finite field is unable to resist the selection of the defect of the ciphertext attack, and proposes two security designs of the public key password based on the Chebyshev polynomial: Both CEPKC-I and CEPKC-II can resist the selection of ciphertext attack and ensure the integrity verification of the information. Compared with the CPKC-I, the CPKC-鈪,
本文编号:2419183
本文链接:https://www.wllwen.com/shoufeilunwen/xxkjbs/2419183.html