基于浮点格式的数字混沌系统周期研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字混沌系统的周期及其分布是混沌退化与混沌抗退化机制研究的必要内容,是衡量混沌系统抗退化能力以及能否用于混沌加密算法的重要指标。一维混沌系统的平均周期与计算精度的经验关系,以及周期分布范围的经验式先后被提出,但这些成果均是基于定点格式的,虽沿用至今,却只有定性意义,实际意义有限,特别是要作为混沌抗退化机制研究的定量评估标准,理论依据不充分。
     为获得一个具有理论和实际应用价值的关于数字混沌系统的周期及周期分布的经验关系,本文研究了计算机迭代下基于浮点格式的数字混沌系统的周期及其分布规律。鉴于标准浮点数格式种类有限,通过定义一套与标准浮点数格式相匹配的非标准浮点数格式,将精度变量引入浮点数格式中,同时在计算上用标准浮点数格式代替非标准浮点数格式,解决了非标准浮点数格式下的计算算法难题;提出了一种搜索数字混沌系统周期的快速算法,使得在有限时间内采用多种不同精度的浮点数格式测算各种混沌系统的周期成为可能;使用VisualC++6.0编程,统计测算了11种一维混沌系统、4种二维混沌系统以及基于切延迟椭圆反射腔映射混沌系统(Tangent-Delay Ellipse Reflecting Cavity map System, TD-ERCS)在不同迭代初始值、不同系统参数和不同浮点计算精度下的轨道周期;通过线性拟合方法获得了浮点格式下数字混沌系统周期随计算精度变化的经验关系,研究发现了影响数字混沌系统周期分布的主要原因,纠正了多年来沿用的基于定点格式的相应经验关系,为混沌抗退化机制研究提供了一个合理的可用于实验测试的参考标准。本文的研究结果表明,对于混沌系统而言,基于定点格式的结论不能简单随意推广到浮点格式。
The periods and their distribution of a digital chaotic system, essential content of chaotic degradation and anti-degradation mechanism research, is an important indicator of assessing the capacity of anti-dagradation and the safety of a chaotic encryption algorithm. The existing conclusions about empirical relation of 1-D chaotic system's average period and the distribution range of periods are all based on fix-point formats. If using them as the quantitative assessment criteria of chaotic anti-dagration, theoretical basis is not sufficient.
     To get an empirical relation with more theoretical and applicative value, the periods and their distribution of digital chaotic systems based on floating-point formats are studied in this paper. Because standard floating-point formats are not sufficient, non-standard floating-point formats matching with the standard ones are constructed, by putting precision variables into floating-point formats and using standard floating-point formats for storing non-standard ones. A fast searching algorithm is designed, making it possible to find out the chaotic periods under different floating-point precisions. Using Visual C++ 6.0, the periods of eleven 1-D chaotic systems, four 2-D chaotic systems and TD-ERCS (Tangent-Delay Ellipse Reflecting Cavity map System) are measured, by condition of different initial iterating values, different system parameters, or different floating-point computing precisions. Factors impacting periods are figured out. Using a linear fitting method, the distribution relationship between periods and numerical precisions is obtained, which corrects the one based on fixed-point formats. Moreover, it gives a rational criterion for the study of chaotic anti-degradation mechanism. This paper also shows that for chaotic systems, conclusions based on fixed-point formats can not be simply extended to ones based on floating-point formats.
引文
[1]黄润生.混沌及其应用[M].武汉:武汉大学出版社,2000.1-10
    [2]Poincare J H. Science and Method [M]. New York:The Science Press,1913. 366-367
    [3]Lorenz E N. Deterministic non-periodic flow [J]. Journal of the Atmospheric Science,1963,20(1):130-141
    [4]Li T Y, Yorke J. Period three implies chaos [J]. American Mathematical Monthly,1975,82(10):985-992
    [5]Feigenbaum M J. The universal metric properties of nonlinear transformations [J]. Journal of Statistical Physics,1979,21(6):669-683
    [6]Matsumoto T. A chaotic attractor from Chua's circuit [J]. IEEE Transactions on Circuits & Systems,1984,31(12):1055-1058
    [7]Pecora L M, Carroll T L. Synchronization in chaotic systems [J]. Physical Review Letters,1990,64(8):821-824
    [8]Devany R L. An introduction to chaotic dynamical systems [J]. Acta Applicandae Mathematicae,1988,13(1-2):221-226
    [9]刘式达,梁福明,刘式适,等.自然科学中的混沌和分形[M].北京:北京大学出版社,2003.2-3
    [10]李树钧.数字化混沌密码的分析与设计[D]:[博士学位论文].西安:西安交通大学,2003
    [11]Chirkikov B V, Vivaldi. An algorithmic view of pseudochaos [J]. Physica D, 1999,129(3-4):223-235
    [12]Yao L S. Computed chaos or numerical errors [J]. Nonlinear Analysis: Modelling and Control,2010,15(1):109-126
    [13]Pereira R F, Pinto S, Viana R L, et al. Periodic orbit analysis at the onset of the unstable dimension variability and at the blowout bifurcation [J]. Chaos,2007, 17(2):23-31
    [14]朱雪龙.应用信息论基础[M].北京:清华大学出版社,2001.52-60
    [15]关新平,范正平,陈彩莲,等.混沌控制及其在保密通信中的应用[M].北京:国防工业出版社,2002.23-25
    [16]赵耿,方锦清.现代信息安全与混沌保密通信应用研究的进展[J].物理学进展,2003,23(2):212-255
    [17]王玫.混沌通信中的关键技术研究[D]:[博士学位论文].西安:西安电子科技大学,2003
    [18]李辉.混沌数字通信[M].北京:清华大学出版社,2006.96-125
    [19]Cuomo K M, Oppenheim A V, Strogatz S H. Synchronization of Lorenz-based chaotic circuits with application to communication [J]. IEEE Transaction on Circuits and Systems II,1993,40(10):626-632
    [20]颜森林.光纤混沌相位编码保密通信系统理论研究[J].物理学报,2005,54(5):2000-2006
    [21]郑志刚,周昌松.耦合混沌系统的相同步:从高维混沌到低维混沌[J].物理学报,2000,49(12):2320-2327
    [22]王宏霞.混沌技术在现代保密通信中的应用研究[D]:[博士学位论文].成都:电子科技大学,2002
    [23]冯登国.国内外密码学研究现状及发展趋势[J].通信学报,2002,23(5):18-26
    [24]Robert M. On the derivation of a chaotic encryption algorithm [J]. Cryptologia, 1989,13(1):29-42
    [25]Wei J, Liao X, Wang K W, et al. Analysis and improvement for the performance of Baptista's cryptographic scheme [J]. Physics Letters A,2006,354(1-2): 101-109
    [26]Jokimoski G, Kocarev L. Analysis of some recently proposed chaos-based encryption Algorithm [J]. Physics Letters A,2001,291(6):381-384
    [27]Li S J, Chen G R, Wong K W, et al. Baptista-type chaotic cryptosystems: problems and countermeasures [J]. Physics Letters A,2004,332(5-6):368-375
    [28]Dachselt F, Schwarz W. Chaos and cryptography [J]. IEEE Transaction on Circuits and Systems I,2001,48(12):1498-1509
    [29]Jakimoski G, Kocarev L. Chaos and cryptography:block encryption ciphers based on chaotic maps [J]. IEEE Transaction on Circuits and Systems I,2001, 48(2):163-169
    [30]Kocarev L. Chaos-based cryptography:a brief overview [J]. IEEE Circuits and Systems Magazine,2001,1(3):6-21
    [31]Palacios A, Juarez H. Cryptography with cycling chaos [J]. Physics Letters A, 2002,303(5-6):345-351
    [32]Kocarev L, Jakimoski G. Logistic map as a block encryption algorithm [J]. Physics Letters A,2001,289(4-5):199-206
    [33]Wong K W, Man K P, Li S J, et al. A more secure chaotic cryptographic scheme based on dynamic look-up table [J]. Circuits, Systems, and Signal Processing, 2005,24(5):571-584
    [34]Xun Y, Chik H T, Chee K S. A new block cipher based on chaotic tent maps [J]. IEEE Transaction on Circuits and Systems I,2002,49(12):1826-1829
    [35]佟晓筠,崔明根.基于扰动的复合混沌序列密码的图像反馈加密算法[J].中国科学F辑:信息科学,2009,39(6):588-597
    [36]权安静,蒋国平,左涛.基于Logistic映射的分组密码算法研究及其应用[J].东南大学学报(自然科学版),2004,34(B11):11-14
    [37]李红达,冯登国.基于复合离散混沌动力系统的序列密码算法[J].软件学报,2003,14(5):991-998
    [38]李树钧,牟轩沁,纪震,等.一类混沌流密码的分析[J].电子与信息学报,2003,25(4):473-478
    [39]胡汉平,董占球.混沌流密码研究[J].计算机安全,2005,9:10-13
    [40]吴立春.混沌加密技术综述[J].中国水运(学术版),2006,6(12):123-124
    [41]Curiac D I, Iercan D, Drang A O, et al. Chaos-based cryptography:end of the road? [C]. International conference on emerging security information, Systems and Technologies (SECURWARE 2007), Valencia, Spain, October,2007, 71-76
    [42]Li S J, Mou X Q, Cai Y L, et al. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision [J]. Computer Physics Communications,2003,153(1):52-58
    [43]周红,凌燮亭.有限精度混沌系统的m序列扰动实现[J].电子学报,1997,25(7):95-97
    [44]周红,罗杰,凌夔亭.混沌非线性反馈密码序列的理论设计和有限精度实现[J].电子学报,1997,25(10):57-60
    [45]刘镔,张永强,刘粉林.一种新的数字化混沌扰动方案[J].计算机科学,2005,32(4):71-74
    [46]张士杰,刘镔,张杰,等.一种新的数字化三维Baker映射扰动方案[J].计算机应用研究,2006,23(2):50-52
    [47]钟黔川,朱清新,张平莉.参数可变的离散混沌加密系统[J].计算机应用研究,2008,25(10):3094-3096
    [48]高洁,袁家斌,徐涛,等.一种基于混合反馈的混沌图像加密算法[J].计算机应用,2008,28(2):434-436
    [49]周志刚,李苏贵,刘嫕.基于新的变参数混沌系统的图像加密[J].计算机应用,2009,29(7):2972-2976
    [50]周红,俞军,凌燮亭.混沌前馈型流密码的设计[J].电子学报,1998,26(1):98-101
    [51]Li S J, Mou X Q, Cai Y L. Pseudo-random bit generator based on couple chaotic systems and its application in stream-cipher cryptography [J]. Lecture Notes In Computer Science,2001,2247:316-329
    [52]胡勇辉,李星野.基于双混沌互扰系统的图像加密算法[J].计算机应用,2009,29(11):2993-2997
    [53]于为中,马红光,王令欢.基于双混沌系统的序列加密方法研究[J].计算机应用研究,2005,22(8):97-98
    [54]向菲,丘水生.基于混沌系统互扰的流密码设计[J].物理学报,2008,57(10):6132-6138
    [55]Daniel D W. Problems with chaotic cryptosystems [J]. Cryptologia,1989,13(3): 243-250
    [56]Neal R W. The Logistic lattice in random number generation [C]. Proceedings of the Thirtieth Annual Allerton Conference on Communications, Control, and Computing, University of Illinois at Urbana-Champaign,1993,243-250
    [57]Rannou F. Numerical study of discrete plane area-preserving mappings [J]. Astronomy and Astrophysics,1974,31:289-301
    [58]Li S J. On The Dynamical Degradation Of Digital Piecewise Linear Chaotic Maps [J]. International Journal of Bifurcation and Chaos,2005,15(10): 3119-3157
    [59]Chirikov B V, Vivaldi F. An algorithmic view of pseudochaos [J]. Physica D, 1999,129(3-4):151-160
    [60]Cernak J. Digital generators of chaos [J]. Physica Letters A,1996,214(3-4): 151-160
    [61]Beck C, Roepstorff G. Effects of phase space discretization on the long-time behavior of dynamical systems [J]. Physica D,1987,25(1-3):173-180
    [62]Mao Y B, Cao L, Liu W B. Design and FPGA implementation of a pseudo-random bit sequence generator using spatiotemporal chaos[C]. ICCCAS, Guangxi, China,2006,3:2114-2118
    [63]IEEE. IEEE Std 754TM-2008 [S]. IEEE standard for floating-point arithmetic. New York,2008
    [64]Sun Corporation. Numerical computation guide [CP/OL]. http://docs.sun.com/app/docs/doc/806-3568,2000
    [65]Randal E B, David O H. Computer systems a programmer's perspective [M].北京:电子工业出版社,2004.163-170
    [66]David A P, John L H. Computer organization and design:the hardware/software interface [M].北京:机械工业出版社,1999.275-321
    [67]Goldberg D. What every computer scientist should know about floating-point arithmetic [J]. ACM Computer Surveys,1991,23(1):5-48
    [68]刘纯根.浮点计算编程原理、实现与应用[M].北京:机械工业出版社,2008.211-213
    [69]Microsoft Corporation. Microsoft Visual C++浮点优化[CP/OL]. http://msdn.microsoft.com/zh-cn/library/aa289157(VS.71).aspx,2004
    [70]范啸涛,季光明.计算机浮点数算术运算的舍入误差研究[J].成都理工大学学报(自然科学版),2005,32(2):213-216
    [71]Randall H. Write Great Code [M].北京:电子工业出版社,2006.130-131
    [72]王君丽.周期函数的性质及推广[J].保山师专学报,2005,24(5):37-39
    [73]李力.基于混沌理论的密码算法研究和实现[D]:[硕士学位论文].长沙:中南大学,2005
    [74]Sonja Stima. A classification of inverse limit spaces of tent maps with finite critical orbit [J]. Topology and its Applications,2007,154(11):2265-2281
    [75]王颖学.基于离散斜帐篷映射的混沌加密系统[J].计算机应用,2006,26(11):2602-2604
    [76]Ziyad A, James A. On the periodic logistic equation [J]. Applied Mathematics and Computation,2006,180(1):342-352
    [77]王亥,胡健栋.改进型Logistic-Map混沌扩频序列[J].通信学报,1997,18(8):71-77
    [78]Liao X F, LiXM, Pen J, et al. A digital secure image communication scheme based on the chaotic Chebyshev map [J]. International Journal of communication systems,2004,17(5):437-445
    [79]李昌刚,韩正之,张浩然.一种基于指数性混沌序列的灰度图像加密算法[J].计算机工程与应用,2002,38(8):16-17
    [80]Behnia S, Akhshani A, Ahadpour S, et al. A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps [J]. Phisics Letters A,2007, 366(4-5):391-396
    [81]李晓明,沈海斌,严晓浪.一种分段线性映射的混沌随机数发生器特性研究[J].电子与信息学报,2005,27(6):874-878
    [82]罗启彬,张健.一种新的混沌伪随机序列生成方式[J].电子与信息学报,2006,28(7):1262-1265
    [83]邱跃洪,何晨,诸鸿文.一种无限折叠混沌映射及其量化序列[J].上海交通大学学报,2002,36(12):1788-1790
    [84]Chen G R, Mao Y B, Charles K C. A symmetric image encryption scheme based on 3D chaotic cat maps [J]. Chaos, Solitons and Fractals,2004,21(3):749-761
    [85]Henon M. A two-dimensional mapping with a strange attractor [J]. Communications in Mathematical Physics,1976,50(1):69-77
    [86]廉士国,王执铨.Standard映射及其三维扩展在多媒体加密中的应用[J].东南大学学报(自然科学版),2003,33(Z1):90-94
    [87]张小红,黄剑,谢斐.基于二维混沌映射的数字图像置乱方法[J].华中科技大学学报(自然科学版),2003,31(S1):177-179
    [88]盛利元,孙克辉,李传兵.基于切延迟的椭圆反射腔离散混沌系统及其性能研究[J].物理学报,2004,53(9):65-70
    [89]盛利元,曹莉凌,孙克辉,等.基于TD-ERCS混沌系统的伪随机数发生器及其统计特性分析[J].物理学报,2005,54(9):4031-4036
    [90]盛利元,李更强,李志炜.基于切延迟椭圆反射腔映射系统的单向Hash函数构造[J].物理学报,2006,55(11):5700-5706
    [91]盛利元,闻姜,曹莉凌.TD-ERCS混沌系统的差分分析[J].物理学报,2007,56(1):78-83
    [92]谭司庭,何毅,盛利元.基于切延迟的椭圆反射腔的吸引子研究[J].物理学报,2008,57(10):6103-6109

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700