Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

46results about How to "Expand the key space" patented technology

Image encryption method based on projection synchronization of hyperchaotic system

The invention discloses an image encryption method based on the projection synchronization of a hyperchaotic system. The method comprises the steps of plaintext image quantifying and ciphertext image quantifying. The first step comprises generating of a hyperchaotic sequence of a hyperchaotic driving system, image row scrambling, image column scrambling, image diffusing, circulation image row scrambling, image column scrambling, multiple rounds of image diffusing, and a ciphertext image is acquired. The second step comprises ciphertext image quantifying, generating of a hyperchaotic sequence of a hyperchaotic response system, time acquiring, column scrambling index and line scrambling index valuing, image inverse diffusing, image inverse column scrambling, image inverse row scrambling, circulation image inverse diffusing, image inverse column scrambling, multiple rounds of image inverse row scrambling, and a decrypted image is acquired. According to the invention, a feedback mechanism with the current image is introduced; the row (column) scrambling address code and the key matrix are dynamically changed in each round of encryption; experiments show that the method has the advantages of good encryption effect, high security and large key space, can resist selected plaintext attacks, known plaintext attacks and various statistical attacks.
Owner:SHAANXI NORMAL UNIV

Hyper-chaotic encryption method based on Josephf traversal and bit plane reconstruction

The invention provides a hyper-chaotic encryption method based on Josephf traversal and bit plane reconstruction. The hyper-chaotic encryption method comprises the following steps: converting a grayscale image into an image matrix; inputting the image matrix into an SHA-256 algorithm as a secret key, and obtaining initialization parameters according to the secret key; substituting the initialization parameters into a hyper-chaotic Lorenz system for iteration to generate four chaotic sequences, processing one chaotic sequence to serve as a variable step size sequence, performing pixel positionscrambling on a one-dimensional sequence of an image matrix by utilizing an improved Josephf traversal method, and rearranging a pixel scrambling matrix; dividing the pixel scrambling matrix into eight bit planes, and performing bit plane reconstruction on the pixel scrambling matrix by using the other three chaotic sequences and a bit plane reconstruction method to generate a bit plane reconstruction image matrix; and diffusing the bit plane reconstruction image matrix to generate a final encrypted image. According to the method, different types of images can be encrypted into uniformly distributed encrypted images, and the method has very sensitive key sensitivity and can resist various attacks.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Chaotic key distribution system and method based on dispersion keying synchronization

The invention belongs to the technical field of secret communication. The invention in particular relates to a chaotic key safety distribution system and method based on dispersion keying synchronization. The problems in the background technology are solved. The system comprises a first DFB laser 1, a first 1*2 optical fiber coupler 2, a CFBG chirped fiber bragg grating 3, a second 1*2 optical fiber coupler 4, a communication party A and a communication party B. Each of the communication party A and the communication party B comprises an optical fiber circulator, an optical switch, a memory,a first dispersion module, a second dispersion module, a photoelectric detector, an analog-to-digital converter and a bit filter. When the optical switch is switched, a random sequence of dispersion feedback can be directly obtained, involved key distribution is not influenced by synchronous recovery time, and the key distribution rate is improved; and, meanwhile, the chaotic light state of the first DFB laser is changed through dispersion feedback, so that the chaotic light directly emitted by the first DFB laser is not related to the chaotic light after dispersion feedback, and the securityof key distribution is enhanced by using nonlinear characteristics.
Owner:TAIYUAN UNIV OF TECH

Color image encryption and decryption method and system based on double-chaos cross diffusion

The invention discloses a color image encryption and decryption method and system based on double chaotic cross-diffusion. First, the parameters of Logistic and ChebyShev iterations are randomly generated, and then the initial key required for Logistic and ChebyShev iterations is input, and the transient state is eliminated by multiple iterations. Afterwards, Logistic and ChebyShev are used to iterate three times, and the results of the iterations are used as the initial keys for encryption, thereby actually increasing the key space. Then take the pixel in the picture, if the value corresponding to the pixel position is an odd number, use ChebyShev iteration to get the encryption key, otherwise use Logistic iteration to get the encryption key, so as to reduce the correlation between adjacent pixels. Then use the three channels of R, G, and B of this pixel to perform XOR operation with the R', G', and B' of the previous encrypted pixel to diffuse. The present invention reduces the number of iterations on the premise of ensuring safety, can reduce encryption time, and improves efficiency, and is especially suitable for image encryption of mobile devices such as mobile phones and tablet computers that require high real-time performance.
Owner:HENGYANG NORMAL UNIV

Hybrid chaotic virtual optical image encryption method

The invention discloses a hybrid chaotic virtual optical image encryption method, which comprises the following steps of: 1, assuming that the size of a plaintext image is M * N, and sequentially reading pixel values of each point of the image from left to right to obtain a pixel matrix F (x, y); step 2, performing phase encoding on the plaintext image F (x, y) to obtain Q (x, y); step 2, modulating Q (x, y) through a random phase template RM1 to obtain F1 (x, y); step 3, carrying out Fourier transform on F1 (x, y), and carrying out random phase template RM2 modulation to obtain F2 (alpha, y);step 4, carrying out inverse Fourier transform on F2 (alpha beta) to obtain a ciphertext image U1; and step 5, performing secondary encryption of pixel value substitution on U1 (x, y) to obtain a ciphertext image U2. According to the invention, a coparametric generalized Fibonacci chaotic system and a coupled tent space-time chaotic system are adopted to respectively construct random templates with good uniformity; therefore, the two chaotic systems have a linkage effect, the defect that the distribution of random template elements constructed by the Logistic chaotic system is not uniform isovercome, and the hiding property on a ciphertext and the sensitivity on a secret key are enhanced.
Owner:QIQIHAR UNIVERSITY

Method and device for realizing Shield block cipher generated by novel secret key and readable storage medium

The invention discloses a method and a device for realizing a Shield block cipher generated by a novel secret key, and a readable storage medium. According to the method, the Shield grouping length isdesigned to be 128 bits, a secret key is any length, an encryption round function is based on an SPN structure, and the encryption sequence is round secret key addition, S box replacement, row shifting and column hybrid transformation in sequence. The secret key expansion function divides an original secret key into three parts, generates three round secret keys by using a hash function MD5, anduses the round secret keys in different rounds of addition operation. According to the S box replacement transformation, 128-bit data replacement transformation is carried out by adopting two 4 * 4 Sboxes; the data are divided into 32 4-bit units; and along with the change of encryption/decryption rounds, the data units respectively carry out corresponding S box increasing/decreasing replacementoperation. According to the invention, the occupied area resource of the Shield cipher is small; the storage space for storing the original secret key is reduced; and the known attack can be well resisted by increasing the length of the secret key and expanding the secret key space.
Owner:HENGYANG NORMAL UNIV

Multiple image encryption method based on pwlcm chaos

A multi-image encryption method based on piecewise linear chaotic map (PWLCM) belongs to the field of information encryption, and aims to solve the problems that most of the conventional image encryption methods take a single image as an encryption object, and cannot adapt to mass image encryption, and the encryption efficiency of the conventional image encryption methods is relatively low. Being different to the conventional image encryption methods, the multi-image encryption method takes multiple images as encryption objects, and adopts the steps of converting the multiple images into a single large image, encrypting the single large image, and converting the encrypted single large image into multiple encrypted images, so as to protect contents in the multiple images. The multi-image encryption method comprises the key steps of combining k interactive images into a large image, encrypting the large image according to PWLCM to obtain an encrypted large image, dividing the encrypted large image into k encrypted images, and naming the k encrypted images sequentially according to a chaotic sequence generated based on PWLCM. Test results show that the method is easy to implement, the encryption effect is favorable, the encryption efficiency and security are high, and communication security of contents of any multiple images can be protected simultaneously.
Owner:CHINA UNIV OF MINING & TECH

JPEG image encryption method based on similar coefficient scrambling

The invention relates to an intra-class coefficient scrambling-based JPEG image encryption method. The method comprises the following steps: firstly reading in a JPEG image file, acquiring a Huffman coding table and image data which undergoes JPEG coding compression, carrying out decoding to acquire all the non-zero quantized DCT coefficient numerical values and positions and carrying out classification; selecting a password, carrying out chaotic iteration by utilizing the password, so as to generate a chaotic sequence, and scrambling the non-zero coefficients and 8*8 block of each class by utilizing the chaotic sequence; and carrying out entropy coding on a scrambled quantized DCT coefficient matrix, and writing the coded data into the JPEG image file so as to complete intra-class coefficient scrambling-based JPEG image encryption. According to the method disclosed in the invention, scrambling is carried out on different classes of quantized DCT coefficients through the chaotic sequence, and the quantized DC coefficients and the non-zero AC coefficients are processed by directly using one encryption scheme, so that the safety and the high efficiency are both considered; and the encrypted images are similar to clear text image files in the aspect of size, and have high compression ratios.
Owner:CHANGAN UNIV

A large key space chaotic optical communication transceiver

The present invention is a chaotic optical communication transceiver with a large key space, which belongs to the technical field of secure optical communication; the key space is increased by increasing the number of external cavities, the structure is complex, and it is susceptible to environmental interference, and the pseudo-random code modulation increases the key space and cannot play chaos The unique hardware encryption advantage of secure communication increases the complexity of the feedback loop and increases the key space, which is expensive and inconvenient for integration and large-scale production; the present invention provides a chaotic optical communication transceiver with a large key space, and the key space is DFB semiconductor The laser feedback intensity, driving current and key parameters of the random filter module are combined. The random filter module replaces the traditional feedback mirror to realize the random selection function after the optical path range is encoded to the spectrum, which greatly improves the key space of the chaotic optical communication transceiver and meets the legal requirements. The confidential communication of users increases the difficulty of stealing by illegal users, effectively hides delay characteristics, ensures hardware consistency, facilitates chaotic synchronization, and facilitates large-scale production.
Owner:TAIYUAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products