计算机科学 ›› 2014, Vol. 41 ›› Issue (Z11): 268-271.

• 信息安全 • 上一篇    下一篇

动态混沌加解密及其在VoIP中的应用

石婕,仲伟波,葛秀梅   

  1. 苏州理工学院 镇江212003;江苏科技大学电信学院 镇江212003;江苏科技大学电信学院 镇江212003
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受江苏高校优势学科项目和船舶工业国防科技预研项目(10J3.5.2)资助

Dynamic Chaotic Encryption and its Application in VoIP

SHI Jie,ZHONG Wei-bo and GE Xiu-mei   

  • Online:2018-11-14 Published:2018-11-14

摘要: 随着网络普及和带宽提升,网络语音传输已成为现实,但网络的开放性也给语音安全带来了巨大威胁。数据加密常被用来保证网络语音通信的安全,混沌序列的宽频谱、类随机、参数敏感等特点使其非常适合作为加解密密钥。为避免长时间使用固定混沌序列作为密钥带来的安全隐患,设计并实现了一种用于VoIP的动态混沌加解密方案,利用混沌密钥动态交换机制实现收发端混沌根密钥交换,由根密钥通过Henon映射、改进的Logistic映射及非线性置换随机生成混沌密钥,接收端根据接收到的根密钥先生成解密密钥,然后对语音密文进行解密。测试结果表明,该动态混沌加解密系统具有良好的保密效果,可用于网络语音保密通信中。

关键词: 加解密,网络语音传输,混沌密钥,动态密钥

Abstract: VoIP has become reality with spread of the network and its increasing bandwidthbut the speech is exposed to danger for the openness of network.Data encryption is usually used to ensure the safety of speech communication and chao-tic sequence is very suitable as the decryption cipher for its wide spectrum random ness,sensitiv to initial parameters.In order to avoid the danger come from using fixed chaos sequence as the cipher for long timea VoIP dynamic chao-tic encryption scheme was designed and implemented,in which Henon mapimproved Logistic map and a nonlinear map are combined to update chaotic cipher randomlyand the receiver decrypts data using the dynamic chaotic cipher obtained through the dynamic cipher exchange system .Experiment results show that this dynamic chaotic encryption system has high security and can be used for secure speech transmission.

Key words: Encryption and decryption,VoIP,Chaotic cipher,Dynamic cipher

[1] Wu Shu-hua,Pu Qiong,Fei Kang.Practical authenticationscheme for SIP[J].Peer-to-Peer Netw.Appl.,2013(6):61-74
[2] Schneier B.Applied cryptography:protocols,algorithms andsource code in C[M].New Delhi:Wiley-India,2007:128-131
[3] Kocarev L C.Chaos-based cryptography:a brief overview[J].IEEE Circuits and Systems,2001,1(3):6-21
[4] 朱从旭,胡玉平,孙克辉.基于超混沌系统和密文交错扩散的图像加密新算法[J].电子与信息学报,2012,34(7):1735-1743
[5] Azzaz M S,Tanougast C,Sadoudi S,et al.Robust chaotic key stream generator for real-time images encryption[J].J Real-Time Image Proc,2013(8):297-306
[6] 王育民.信息安全理论与技术的几个进展情况[J].中国科学基金,2003(2):276-81
[7] Wu Xiao-gang,Hu Han-ping,Zhang Bao-liang.Parameter estimation only from the symbolic sequences generated by chaos system[J].Chaos,Solitons and Fractals,2004 (22):359-366
[8] 向菲,丘水生.基于混沌系统互扰的流密码设计[J].物理学报,2008,57(10):6132-6138
[9] 尹汝明,袁坚,山秀明,等.混沌密码系统弱密钥随机性分析[J].中国科学:信息科学,2011,41(7):777-788
[10] 陈铁明,蒋融融.混沌映射和神经网络互扰的新型复合流密码[J].物理学报,2013,62(4):1-7
[11] Vlad A,lyas A I,Luca A.Unifying running-key approach and logistic map to generate enciphering sequences[J].Ann.Telecommun,2013(68):179-186
[12] 杨吉云,廖晓峰,肖迪,等.对一种基于Logistic 映射的分组加密机制的分析和改进[J].通信学报,2008,29(12):86-90
[13] 万佑红,李俊刚.一种基于Logistic的改进混沌映射及其性能分析[J].信息与控制,2012,41(6):675-680
[14] Lai Xue-jia,James M.A proposal for a new block encryption standard[C]∥Proceedings of Advances in Cryptology-EUROCRYPT ’90.1991:389-404
[15] Biryukov A,Nakahara J,Preneel J B,et al.New weak-key classes of IDEA[M]∥Bao F,Deng R H,Qing S.Lecture Notes in Computer Science.Springer-Verlag,2002:315-326
[16] Shen C,Nahum E,Schulzrinne H,et al.The Impact of TLS on SIP Server Performance:Measurement and Modeling[J].IEEE/ACM Transactions on Networking,2012,20(4):1217-1230

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!