Home > Table of Contents


Proceedings of 2009 International Symposium on Computer Science and Computational Technology (ISCSCT 2009)

Huangshan, China, December 26-28, 2009

Editors: Fei Yu, Guangxue Yue, Jian Shu, Yun Liu

AP Catalog Number: AP-PROC-CS-09CN005

ISBN: 978-952-5726-07-7 (Print), 978-952-5726-08-4 (CD-ROM)

Page(s): 398-401

The Research of Confidential Communication Based on the Elliptic Curve and the Combined Chaotic Mapping

Weikun Zheng and Dongying Liang

Full text: PDF


This paper presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, Hash Table, and elliptic curve. In this program, the elliptic curve algorithm is used for the key distribution. After the linear transformation, the original chaotic sequence generated by drive system can be combined to chaotic mapping, converted to an encryption key sequence and constructed as Hash table for message authentication. Communication experiment shows that this program is safe and is easy to implemented by software.

Index Terms

Hash Algorithm; elliptic curve; chaotic map

Copyright @ 2009 ACADEMY PUBLISHER All rights reserved