ࡱ > ` b _ s [ R u bjbj } ΐ ΐ ( $ P V \ 0 l j/ l/ l/ l/ l/ l/ l/ {1 4 R l/ ] l/ l / - - - j/ - j/ - - - . @ \ ) R - V/ / 0 0 . o4 X, N o4 . o4 . H - l/ l/ - 0 o4 : mlSpe6RNR S A pencR[{lxvz WSNOR~NSs Thf[b {:gyf[Nb/g|q\ Th 0 3 3 0 0 0 Xd@wQ~Oo`b/gvSU\Oo`pencv[hQb:NOo`SQ~Oo`pencǏz-Nv͑0b['YϑOeQz^NpencomvZ NWY:_ gHevpencR[{lb:NpencxvzWvxvzeT0R S A pencR[{l\O:NYN8^(uv[hQ'` gؚv{l(W'YpencR`pencpmlcRvagNNel gHeOpencvR[[hQ0mlSpeNQsR[;e0nQ0peRcI{%N͑v{lom0[dkcQmlSpe6RNR S A pencR[{lxvzǑ(umlSpeyr_YtUSCQ0yr_^R;c6RUSCQNmlF I E - R S A {l[ O~R S A R[{lX[(WvۏL['`㉳Q0ǏNw[fcQvmlSpe6RNR S A pencR[{lxvz-NǑ(uv N|RelwQ gR[YtT^^_0YtЏ{ew0R[[hQ^ؚ0S4x'`:_I{yrp0 sQ.͋mlSpeR S A pencR[{lyr_^R -NVR{|S: T P 3 0 9 0 0 e.shƋx: A 0 U n d e r t h e c h a o t i c p a r a m e t e r m o d u l a t ion RSA data encryption algorithm research Nan Ya-hui,Liu Jihua,XUE Yanfeng (Department of Computer Science and Technology,Lvliang University,Lvliang 033000,China) Abstract:With the development of network information and communication technology, information of the data communication network information security become informationization the important problems in the process of data communication. Faced with the threat of a large number of invasive procedures and data leaks, a strong and effective data encryption algorithms become research direction in the field of study. RSA data encryption algorithm as the current algorithms for security is the highest, and on the big data under the condition of chaotic dynamic data node arrangement, is also unable to effectively ensure the safety of data encryption. Chaotic parameters, the crypto logical rupture, spilling, serious algorithms such as sequence inverse row holes. In this paper, chaotic parameter modulation of RSA encryption algorithm research, using chaotic parameters processing units, feature sequence logic control unit and the chaotic FIE - RSA algorithm for the problem of the traditional RSA encryption algorithm targeted to solve. Through the simulation experiments show that the chaotic parameter modulation of RSA encryption algorithm is put forward in the study, a series of methods have encryption processing fast response speed, operation time is short, with encryption security degree is high, the characteristics of anti cracking performance. Key words:Chao t i c p a r a m e t e r s ; R S A d a t a e n c r y p t i o n a l g o r i t h m ; C h a r a c t e r i s t i c s o f t h e s e q u e n c e 0 _ @wNTQb/gvޘSU\Q~pencb:Ne8^_ NS\vOo`NAmKbk0Q~penc(WcOeO_wcve_vTeX[(W@w N[vpenc[hQΘi0NTQzz-NX[(W@w'YϑvpenceQOz^0NxǏpencs^S^B\v;omNS|~TSvTۏLpencleQ[Q~pencOo`ۏLzS04xOW0%N͑ZQ~pencOo`[hQ0vQ!k'YϑQ~pencNN-Nb*bb/gvދuN^(u/fpenc[hQfRS0RZ[ 1 ] 0:NdkpencR[b/gb:NQ~penc[hQxvzWxvz~bv NR0 'Ypenceg4NeNMRgNLuVQl gNUO Ny[R S A R[e_b_b3z[\O(uv;eQb/g[ 2 ] 0(WyW[2N0R N[^vagNN(uR S A R[vpencOo`elۏLR[4xЏ{d\O0FO(WR^_{TϑP[{:gtebqvN)YR S A R[[hQ'`S0RNcb[ 3 ] 0 'YpencsXagNNYpencvDnmv'`NpencvmlcRb__[ 4 ] O O~vR S A R[{l_[f'Ypenczzv:_'YЏ{RۏLSlQ_Tml9SMe_4x[ 5 ] 0:NdkcQmlSpe6RNR S A pencR[{lxvz0Ǒ(umlSpeyr_YtUSCQ['YpenczzQ萄vYCQSpencۏLmlcRyr_cSYt[bmlpencR[vMRgpenchtNRǏyr_^R;c6RUSCQ[htTvmlyr_cRۏLЏ{;͑~v^NۏLyr_S~[b_bevЏ{cR;:g6R gTǑ(umlF I E - R S A {l[[e:g6RNvmlpencAmۏLpencpƖT͑eЏ{c[bmlSpevpencR[0N['`㉳Q O~R A S X[(Wv N|R0 ǏNw[KmՋfcQvmlSpe6RNR S A pencR[{lxvz-NǑ(uv N|RelwQ gR[YtT^^_0YtЏ{ew0R[[hQ^ؚ0S4x'`:_I{yrp0 mlSpe6RNR S A pencR[{lxvz 1 . 1 R S A pencR[{lN~ R S A lQR[{l/fNASN~NASt^N+gg1u N T{:g[xf[ZSXYec NTQ0v0RNASN~]NASt^N+ggMb_NTYLulQ^S_e NN NT1\LNwt]f[b0R S A R[{l-NvR S A SNNk*NNvYl _4YW[k0R S A /f'YpencЏ{QsKNMRNLuVQY^[TypencOeQW;eQv:g[e_R S A vpencR[e_N;'`I S O ~eQlQpencR[hQ0TypencfR4x㉹e_S[ O~vwpeMOR S A [xwQ g4x\O(u[ 6 ] 0 R S A {l:g6RtegnN N*NnfM'`v{USpeN[: pef[zz-N$N*NNa }peۏLvXNЏ{ASR{USFO/f傁[vQXNyۏLTRЏ{Yt1\>f_ASR YBgVdkR S A {l-N\@b_XNy\O:N{lvfe[R S A {lv[hQOegnN$N*N'YVpeKNvRЏ{^FO NasT@w'YVpevRz^I{NN{lteSOv[hQz^0sSeltB\b Nbc{lvteSO:wv0 O~R S A v:p;N g[ 7 - 8 ] A yub:g6RA~tS0R }peꁫube_vq_T_OyvUS N9SM'`0B ;Rk:g6R荦^'Y:NNOyubvS`'`y|pen \_N 6 0 0 b i t s N NOЏ{;Dnm_ؚЏ{^eln_^(uvBlN[y[x{lvkKNbaQ*Npeϑ~N@wTg:g[penckR㉀b/gvmeQpenckpe؏ NeXЏ{^N^OfR YBg N)RNhQS6R[c^0vMR[hQ5uP[NfOS-NBlC A Ǒ(u2 0 4 8 b i t s v[vQNpenc^(u[SOO(u1 0 2 4 b i t v[0C ) R S A y[hQ~+RX^_0NhRQN[T N[hQ~+R@b[^v[^0 h1 [P[2N^N[hQ~+R[gqh O[~+R [y[^b i t R S A [^b i t E C C [^b i t O[t^P 8 0 8 0 1 0 2 4 1 6 0 2 0 1 0 1 1 2 1 1 2 2 0 4 8 2 2 4 2 0 3 0 1 2 8 1 2 8 3 0 7 2 2 5 6 2 0 4 0 1 9 2 1 9 2 7 6 8 0 3 8 4 2 0 8 0 2 5 6 2 5 6 1 5 3 6 0 5 1 2 2 1 2 0 5 1 2 3 8 4 3 0 7 2 0 7 6 8 2 1 5 0 ُy{l_eNMR1\]~Qs[/f*NY/ecpencR[Nz^penc~{ Tv{l0wQ g_:_vf(u'`Nd\O'`b:N;NAmR[{l0 R S A {lwQY;R[{lv NRyr'`NwQ g^[y'`@b^[y/fcR[:g6R-NOR`ub$N~yb_b N[[^'`[vQ-NUS~[Y[bpencR[NRS N~y(uegۏL9SM'`[0 R S A v{lmS N*NSpek 0c 1 0c 2 0 vQ-Nn /f$N*N'Y(pet 0m vy|pe