The research of hardware encryption card based on chaos

In recent years, with the rapid development of computer information technology, a lot of information has been speeded with the internet. The information leaks often cause huge losses, so more and more attentions were paid to the research of information security. Hardware encryption card based on chaotic encryption algorithm is compared with traditional software encryption method, it has a speed computing, difficultly gain and easily be stolen, etc. Discussed in this article is based on the research of the DSP chaotic encryption card, its three aspects in detail including the study of chaotic algorithms, hardware design and software design.

[1]  Bin Deng,et al.  Adaptive synchronization control of coupled chaotic neurons in an external electrical stimulation , 2013 .

[2]  Jiun-In Guo,et al.  A new image encryption algorithm and its VLSI architecture , 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461).

[3]  V.S. Anishchenko,et al.  Attractors of dynamical systems , 1997, 1997 1st International Conference, Control of Oscillations and Chaos Proceedings (Cat. No.97TH8329).

[4]  Bo Zhang,et al.  Analysis of the chaotic phenomena in permanent-magnet synchronous motors based on Poincare map , 2000, Proceedings of the 3rd World Congress on Intelligent Control and Automation (Cat. No.00EX393).

[5]  Xiaojun Tong,et al.  Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation , 2010, Science in China Series F: Information Sciences.

[6]  Eyad H. Abed,et al.  Stabilization of period doubling bifurcation and implications for control of chaos , 1992, [1992] Proceedings of the 31st IEEE Conference on Decision and Control.

[7]  Fatimata B Dianda Attractors in Dynamical Systems , 2012 .

[8]  Xiqin Wang,et al.  Weak key analysis for chaotic cipher based on randomness properties , 2012, Science China Information Sciences.