Font Size: a A A

Research On Chaotic Theory Achieves The Authentication Of DRM

Posted on:2015-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y SunFull Text:PDF
GTID:2180330422989083Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Digital Rights Management (DRM) is a crucial technology to a healthydevelopment of digital contents industry. For authentication is the origin of DRM, thesecurity of authentication is essential. However, with the traditional hash functions ofauthentication is being challenged, it is pressing to find a new hash function. Chaoticsystems have properties of initial sensitivity, collision resistance, and confusion anddiffusivity, for which it can be used to construct hash function. The purpose of thisdissertation is to use the chaotic system to construct Hash function, and apply it tothe authentication of DRM.1. Statistics test suite are used to check the common discrete chaotic maps, andtwo chaotic maps of superior performance are selected. Statistics tests suite developedby NIST are used to check and compare the randomness of the pseudorandomsequences generated by six common discrete chaotic maps, it is decided that therandomness of piecewise Logistic map and Chebyshev map are good.2. A hash function based on double chaotic maps is designed, and the simulationis done to the new hash function algorithm based on double chaotic maps. Firstly, anovel hash function based on piecewise Logistic map and Chebyshev map is proposedafter combining the feature of DRM with the design method of hash function. In thisalgorithm construction, a new numerical conversion table is designed. It not onlyreduces the number of iterations, but also accelerates the speed. At the same time,variable parameter can ensure the “One Time Padding” and large demand for password.And then, by analyzing the distribution of hash values, the sensitivity of the messageplaintext, confusion and diffusivity statistic analysis, and the collision resistance ofalgorithm, it is shown that the new algorithm has better initial sensitivity, collisionresistance, confusion and diffusivity, and quick speed. In comparison with existingwork which based on chaotic maps, this scheme exhibits superior performance, andsatisfies the various performance requirements of hash function. 3. An improved authentication scheme based on chaotic maps is proposed. Inorder to solve the collisions in the traditional hash function of OTP authenticationscheme, the hash function based on double chaotic maps are substituted for traditionalHash function. And then, two existing OTP authentication schemes based on chaostheory are compared and analyzed. According to the existing flaws, this dissertationproposes an improved authentication scheme based on chaotic maps. Theoreticalanalysis indicates that the new scheme can effectively realize authentication betweenclient and server, encryption the message for plaintext transform, and resist littlenumbers attack, replay attack and etc.
Keywords/Search Tags:DRM, Chaos, Hash function, NIST, Authentication
PDF Full Text Request
Related items