【24h】

Fractal Theory Based on the pseudo-attacks on encryption model

机译:基于伪攻击的分形理论加密模型

获取原文

摘要

From the angle of improving data encryption in the information domain, put forward an arithmetic that applys the fractal geometry characteristic and spatial alternation to data encryption technology, Simultaneously uses the method that spoil the data to achieve the purpose that protect the data. Turn a ordered and significant data into several out-oforder and insignificant data, then combine the data which is got by pscudo-attacking and the rules which are brought by the attacking, and augment the additive data.The experiments show that the arithmetic can make the fractal transformation be focused on any details of encryption, and make the scale of fractal achieve to the operation of bit. Simultaneously,the arithmetic has certain safety, and it can be used with the existing data encryption technology to increase the safety of the existing encryption technology.The arithmetic can also be applied to logic circuit, namely to encrypt the digital signal which are transmitted on medium.
机译:从改进信息域中数据加密的角度出发,提出了一种将分形几何特征和空间交替应用于数据加密技术的算法,同时采用破坏数据的方法来达到保护数据的目的。通过将有序数据和重要数据转换为若干无序数据和无意义数据,然后将伪攻击得到的数据与攻击带来的规则相结合,扩充了可加数据。分形变换的重点是加密的任何细节,并使分形的规模达到位运算的目的。同时,该算法具有一定的安全性,可以与现有的数据加密技术结合使用,以提高现有加密技术的安全性。该算法还可以应用于逻辑电路,即对介质上传输的数字信号进行加密。 。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号