Chaotic sequence generation method and sequence generator of high speed high-precision chaotic function
A chaotic function and chaotic sequence technology, applied in the field of network security, can solve problems such as inability to work continuously for 24 hours, high cost of ADC, and difficult application
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0097] Embodiment 1: Chaotic encryption circuit without multiplication and division of Qian chaotic function.
[0098] Figure 88 is a block diagram of the chaos encryption circuit without multiplication and division of the present invention, the block diagram of the chaotic sequence generator of f(x) shown in Figure 70 in the lower dotted line, which outputs the chaotic sequence; the plaintext chaos shown in Figure 89 in the upper dotted line Queue - Chaotic XOR partial block diagram. Wherein the chaotic sequence has two functions: 1. the chaotic transformation of the queuing code, so that the plaintext serial requeues (chaotic formula). ② Serial requeuing is a mixture of plaintext and chaotic sequences. Figure 89 is a circuit diagram of the core part of the chaotic encryption circuit without multiplication and division, which is described as follows:
[0099] ① Plaintext N data The circuit is the plaintext data buffer. On the one hand, it constantly receives the plaintext ...
Embodiment 2
[0107] Embodiment 2: Chaos deciphering circuit without multiplication and division of Qian chaotic function.
[0108] Fig. 102 is the circuit diagram of the core part of the chaotic decryption circuit without multiplication and division of the Qian chaotic function of the present invention, the chaotic decryption circuit and the chaotic encryption circuit are mostly the same, only the data selector MUX (1) ~ MUX (8) ) to data allocator DIS (1) ~DEL (8) , and then exchange the input and output lines of the 8 XOR gates in the plaintext-chaotic XOR circuit (that is, the 8 XOR gates z 0 ~z 7 The output is changed to input, and the data selector MUX is connected in Figure 89 (1) ~ MUX (8) The input to the data distributor DIS in Figure 102 is changed to (1) ~DEL (8) output), chaotic decryption is the inverse process of chaotic encryption, mainly in the process of ciphertext→plaintext, that is, the input z of the 8 XOR gates 0 ~z 7 A byte of ciphertext is then passed throug...
Embodiment 3
[0111] Embodiment 3: Chaotic spread spectrum circuit without multiplication and division of pre-chaotic function.
[0112] The electromagnetic environment of modern radio equipment has become extremely complex, and the interference is becoming more and more serious, which poses a severe challenge to the rapid, accurate and confidential communication. Spread spectrum communication enables smooth communication in the complex electromagnetic environment and serious interference, and becomes the development direction of future communication. Spread spectrum code with excellent performance is the key in spread spectrum technology. Most traditional spread spectrum communications use linear or nonlinear shift registers to generate pseudo-random sequences as spread spectrum sequences. The disadvantages are that the number of available code group sequences is small, the sequence complexity is low, and the correlation function is periodic, which is easy to be deciphered. However, the pr...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com