Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for generating random pseudorandom sequence based on discrete progressive determinacy

A technology of pseudo-random sequence and random sequence, which is applied in the field of password generation in information security, and can solve problems such as short-term unpredictability of sequence

Inactive Publication Date: 2010-05-05
SOUTHEAST UNIV
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 1997, it was found that when the explicit expression x is not an integer n = sin 2 (πθz n ) produces sequences with short-term unpredictability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating random pseudorandom sequence based on discrete progressive determinacy
  • Method for generating random pseudorandom sequence based on discrete progressive determinacy
  • Method for generating random pseudorandom sequence based on discrete progressive determinacy

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0033] Example 1: We use the above PRBG for image encryption as an example. In order to protect image data from being stolen, illegally copied and disseminated during transmission, various encryption schemes have been proposed to protect image data security. A common feature of these encrypted data is that the encrypted data is transformed into a set of meaningless codes. Once interceptors spot such code, they know they have valuable information. In order to protect the security of image data and avoid exposing the value of image data, the information redundancy characteristics of images can be used to hide one image into another image. For image encryption, possible monitors or illegal interceptors can intercept and decipher the ciphertext, or destroy the ciphertext before sending it, thereby affecting the security of confidential information; but for image information hiding , it is difficult for a possible monitor or illegal interceptor to judge whether the confidential i...

example 2

[0034] Example 2: An important field of random sequence application is frequency hopping communication. The carrier frequency of the frequency hopping communication system is controlled by a set of code sequences. In a frequency band much wider than the information bandwidth, it randomly hops according to a certain rule. The variable law is called the frequency hopping pattern. The code sequence that controls the frequency hopping pattern is called a frequency hopping sequence. Frequency hopping sequences are generally generated by pseudo-random sequences. A frequency hopping sequence with excellent performance must have good randomness, as long as possible period, uniform distribution in the working frequency band and good nonlinear performance.

[0035] Apply PRBG to the frequency hopping communication system, the schematic diagram is as follows Figure 5 shown. Use PRBG to control the frequency hopping frequency table to generate the hopping carrier frequency. Here, the...

example 3

[0036] Example 3: Ultra Wideband (UWB) technology is a new type of short-distance high-speed wireless communication technology that is currently receiving much attention. UWB communicates by directly transmitting narrow pulses. In view of the high requirements of the system on power efficiency, the modulation method of pulse radio generally adopts binary pulse phase modulation (PPM). In order to improve the confidentiality of communication, Chaotic Pulse Phase Modulation (CPPM) is adopted. This communication scheme is based on chaotic pulse trains, and the time interval between pulses is controlled by PRBG. This pulse train with chaotic pulse spacing can be used as a carrier. The binary information is modulated onto the carrier by the method of pulse position modulation, and the left edge of each pulse is unchanged or delayed at a certain moment depending on whether "0" or "1" is transmitted. By synchronizing the receiving system with the chaotic pulse sequence, the pulse ti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for generating a random pseudorandom sequence based on a discrete progressive determinacy, which comprises the steps of: (1) selecting a discrete or chaotic map Xn+1=aXnmod2N, setting an initial value X0 and a chaotic control parameter a, and performing iterative operation with an input value Xn at the time of n, namely, the current time, so as to obtain output Xn+1 of a chaotic system at the time of Xn+1, namely, the next time; (2) nonlinearly changing the Xn into Yn=bXnmod2N to obtain the corresponding random pseudorandom Yn of the discrete progressive determinacy, wherein the nonlinear control parameter b=2k, and k is a positive integer; and (3) building a discrete progressive determinacy random system from step (1) to step (2), and changing an integer sequence Y two value into 0-1 sequence Z with a coupling method to obtain a random sequence output Z. The method has good balance, ideal run distribution, and the statistical characteristic of self correlation and mutual correlation similar to white noise, and can be taken as the pseudorandom sequence with high safety.

Description

technical field [0001] The present invention belongs to the password generation technology in information security, specifically, it is a method of pseudo-random sequence generated by using electronic computer technology, information coding technology and discrete progressive deterministic random system. Background technique [0002] In a general sense, there is a close relationship between chaos and cryptography, and the basic characteristics of chaotic dynamic systems, such as initial value sensitivity and ergodicity, can be intuitively related to the concepts of confusion and diffusion in traditional cryptography. In 1948, Shannon proposed in his paper "Communication Theory of Secrecy Systems" that the basic "Rolled-out and folded-over" operation can be used to design the hybrid transformation of the secrecy system, which is related to the reason why stretching and folding cause chaos. similarity. In 1990, Ott, Grebogi, and Yoke proposed the OGY chaos control method, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F7/58
Inventor 王开裴文江孙庆庆侯旭勃詹金狮朱光辉沈毅周思源
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products