Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Chaotic sequence generation method and sequence generator of high speed high-precision chaotic function

A chaotic function and chaotic sequence technology, applied in the field of network security, can solve problems such as inability to work continuously for 24 hours, high cost of ADC, and difficult application

Inactive Publication Date: 2008-07-16
HEILONGJIANG UNIV
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] ①The generation of many chaotic sequences is realized by computers or programmable devices, such as computer C language and C ++ For programming, double has the highest precision, and double data is expressed as d×10 J , where d is the mantissa, J is the exponent, double commonly used 64-bit binary numbers to represent d and J, the precision depends on the number of bits of d, and the number of binary bits of d is ≤ 56, and higher precision computers are not easy to implement
The integrating circuit is an analog circuit, which is seriously affected by zero drift and thermal noise, and its precision is much lower than that of a digital circuit; the cost of the ADC is high, and the accuracy of the ADC is only a dozen digits, and it is difficult to increase the number of digits. There is no 50-bit ADC yet. Obviously the ADC accuracy is much lower than the computer double type
[0009] The chaotic system that realizes binary digits = 160 bits, 256 bits, etc. higher than double precision has not yet been reported
[0010] 2. Difficulties in application in wireless networks and wireless sensor networks
However, from a practical point of view, network nodes are powered by batteries, especially for military use (the nodes are hidden in the enemy), and it is inconvenient to replace batteries. It requires extremely low energy consumption, fast speed, and short working hours. It cannot work continuously for 24 hours. , the computer simulation results in a shorter time are closer to the actual

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaotic sequence generation method and sequence generator of high speed high-precision chaotic function
  • Chaotic sequence generation method and sequence generator of high speed high-precision chaotic function
  • Chaotic sequence generation method and sequence generator of high speed high-precision chaotic function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0097] Embodiment 1: Chaotic encryption circuit without multiplication and division of Qian chaotic function.

[0098] Figure 88 is a block diagram of the chaos encryption circuit without multiplication and division of the present invention, the block diagram of the chaotic sequence generator of f(x) shown in Figure 70 in the lower dotted line, which outputs the chaotic sequence; the plaintext chaos shown in Figure 89 in the upper dotted line Queue - Chaotic XOR partial block diagram. Wherein the chaotic sequence has two functions: 1. the chaotic transformation of the queuing code, so that the plaintext serial requeues (chaotic formula). ② Serial requeuing is a mixture of plaintext and chaotic sequences. Figure 89 is a circuit diagram of the core part of the chaotic encryption circuit without multiplication and division, which is described as follows:

[0099] ① Plaintext N data The circuit is the plaintext data buffer. On the one hand, it constantly receives the plaintext ...

Embodiment 2

[0107] Embodiment 2: Chaos deciphering circuit without multiplication and division of Qian chaotic function.

[0108] Fig. 102 is the circuit diagram of the core part of the chaotic decryption circuit without multiplication and division of the Qian chaotic function of the present invention, the chaotic decryption circuit and the chaotic encryption circuit are mostly the same, only the data selector MUX (1) ~ MUX (8) ) to data allocator DIS (1) ~DEL (8) , and then exchange the input and output lines of the 8 XOR gates in the plaintext-chaotic XOR circuit (that is, the 8 XOR gates z 0 ~z 7 The output is changed to input, and the data selector MUX is connected in Figure 89 (1) ~ MUX (8) The input to the data distributor DIS in Figure 102 is changed to (1) ~DEL (8) output), chaotic decryption is the inverse process of chaotic encryption, mainly in the process of ciphertext→plaintext, that is, the input z of the 8 XOR gates 0 ~z 7 A byte of ciphertext is then passed throug...

Embodiment 3

[0111] Embodiment 3: Chaotic spread spectrum circuit without multiplication and division of pre-chaotic function.

[0112] The electromagnetic environment of modern radio equipment has become extremely complex, and the interference is becoming more and more serious, which poses a severe challenge to the rapid, accurate and confidential communication. Spread spectrum communication enables smooth communication in the complex electromagnetic environment and serious interference, and becomes the development direction of future communication. Spread spectrum code with excellent performance is the key in spread spectrum technology. Most traditional spread spectrum communications use linear or nonlinear shift registers to generate pseudo-random sequences as spread spectrum sequences. The disadvantages are that the number of available code group sequences is small, the sequence complexity is low, and the correlation function is periodic, which is easy to be deciphered. However, the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a chaotic sequence generation method and a sequence generator for high-speed high-accuracy chaotic functions. An initial key circuit stores the initial value of a chaotic latch unit, a u value key circuit stores a sequence ui value; each cp chaotic function finishes one-time interactive operation: a bitwise conversion circuit outputs a bitwise XOR to the chaotic latch unit, the bitwise XOR is used to realize a subtraction operation N minus one and minus the absolute value of xi and so on; a shift data selector takes the ui as an address code of the data selector, the data is shifted with a plurality of bits toward right, then the subtraction is used to realize a multiplication that the ui is multiplied by the data; the subtraction result is stored into the chaotic latch unit at the rising edge of the cp, each cp generates a 160-bit chaotic output; the randomness is good due to the existence of an initial key and a u value key; the precision is far greater than that of the double type, the cycle of the cp can reach 90ns, the encryption of a 128-bit plaintext needs 1.7us; the invention can be realized by using FPGAs, GPLDs and ASICs and so on, and is used in the network security technical field, particularly in the wireless networks and the wireless sensor networks.

Description

(1) Technical field [0001] The invention belongs to the technical field of network security, in particular to a method for generating a chaotic sequence of a high-speed and high-precision chaotic function and a sequence generator. (2) Technical background [0002] Encryption is an important means to ensure data security now. At present, the rise of Internet, wireless network and wireless sensor network makes encryption technology more and more important. Traditional encryption methods such as DES, RSA, etc. are now widely used and show strong security, but they are all completed on the premise of sufficient resources, and are not suitable for wireless networks and wireless networks with serious shortage of resources. Sensor Networks. For example, DES has been deciphered now, RSA is 100 times slower than DES, and the calculation cost is very high. Elliptic curve encryption consumes a lot of hardware resources. Quantum encryption is an absolutely safe encryption technology i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00G06F17/10
Inventor 方倩刘莹方振贤
Owner HEILONGJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products