信息网络安全 ›› 2024, Vol. 24 ›› Issue (2): 203-216.doi: 10.3969/j.issn.1671-1122.2024.02.004

• 理论研究 • 上一篇    下一篇

混沌密码理论研究与应用新进展

赵耿(), 马英杰, 董有恒   

  1. 北京电子科技学院,北京 100070
  • 收稿日期:2023-12-10 出版日期:2024-02-10 发布日期:2024-03-06
  • 通讯作者: 赵耿 E-mail:dr_zhaogeng@163.com
  • 作者简介:赵耿(1964—),男,四川,教授,博士,主要研究方向为混沌密码|马英杰(1979—),女,吉林,副教授,博士,主要研究方向为混沌保密通信|董有恒(1995—),男,山东,讲师,博士,主要研究方向为混沌密码及其应用
  • 基金资助:
    国家自然科学基金(60773120);国家自然科学基金(61170037);国家自然科学基金(61640216);国家自然科学基金(61778047)

New Progress in Research and Application of Chaotic Cryptography Theory

ZHAO Geng(), MA Yingjie, DONG Youheng   

  1. Beijing Electronic Science and Technology Institute, Beijing 100070, China
  • Received:2023-12-10 Online:2024-02-10 Published:2024-03-06
  • Contact: ZHAO Geng E-mail:dr_zhaogeng@163.com

摘要:

混沌密码研究主要包括混沌序列密码、混沌分组密码和混沌公钥密码。混沌序列密码具有软硬件实现简单、加解密处理速度快、没有或只有有限的错误传播等特点。混沌序列密码的设计方面研究成果极为丰硕,但其安全性分析一般停留在统计性验证分析阶段,而对可证明安全性或其他有条件安全性的证明和分析很少,因此证明混沌序列密码的安全性已成为该领域亟需填补的空白。混沌分组密码的研究颇为成熟,但其整体结构一般受限于Feistel结构、SPN结构、Lai-Massey结构及其变形结构。因此,构建突破传统结构的创新性密码架构成为混沌分组密码亟待解决的关键问题之一。混沌公钥密码的研究相对薄弱,利用混沌系统特有的密码特性和公钥密码系统相结合的混沌公钥密码算法不仅具有理论研究意义,而且具有实际应用价值。混沌系统也被广泛应用于通信传输、语音加密、图像加密和扩频通信等保密通信领域。电、光混沌系统实现简便,其计算复杂性不会随着密钥空间的增大而明显增大,能够为无线通信、物理层链路安全、应用层数据安全等不同场景提供安全保护。

关键词: 保密通信, 混沌系统, 混沌序列密码, 混沌分组密码, 混沌公钥密码

Abstract:

The research on chaotic cryptography mainly includes chaotic sequence cryptography, chaotic block cryptography, and chaotic public key cryptography. Chaotic sequence cryptography has the characteristics of simple software and hardware implementation, fast encryption and decryption processing speed, and no or only limited error propagation. The research achievements in the design of chaotic sequence ciphers are extremely fruitful, but their security analysis generally stays at the stage of statistical verification analysis, and there are few proofs and analyses of provable security or other conditional security. Therefore, proving the security of chaotic ciphers has become an urgent research gap in this field that needs to be filled. The research on chaotic block cipher is quite mature, but the overall structures used are generally limited by the types of cryptographic structures: Feistel structure, SPN structure, Lai-Massey, and others(mostly deformations and improvements of the basic structures). Therefore, building an innovative cryptographic architecture that breaks the traditional structures has become one of the key issues that chaotic block ciphers urgently need to solve. The research on chaotic public key cryptography is relatively weak. The chaotic public key cryptography algorithm that combines the unique cryptographic characteristics of chaotic systems with public key cryptography not only has theoretical research significance but also has practical application value. Chaos systems are also widely used in secure communication fields such as communication transmission, speech encryption, image encryption, and spread spectrum communication. The implementation of electrical and optical chaotic systems is simple, and their computational complexity does not significantly increase with the increase of key space. It can provide security protection for different scenarios such as wireless communication, physical layer link security, and application layer data security.

Key words: secure communication, chaotic system, chaotic sequence cryptography, chaotic block cryptography, chaos public key cryptography

中图分类号: