Time-lag chaos iteration-based digital signature method and device

A digital signature, iterative technology, applied in the field of communication

Inactive Publication Date: 2012-02-29
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Aiming at the technical problem that the existing digital signature technology needs to improve its anti-counterfeiting and anti-collision attack capabilities, the present invention provides a digital signature method and device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time-lag chaos iteration-based digital signature method and device
  • Time-lag chaos iteration-based digital signature method and device
  • Time-lag chaos iteration-based digital signature method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings. The following description is only a specific embodiment of the present invention, rather than limiting the present invention. For those of ordinary skill in the art, other specific implementation modes can also be obtained according to the idea of ​​the present invention without paying creative labor.

[0051] For an original text file whose character length is about 6000, carry out the digital signature based on time-delay chaotic iteration of the present invention, comprising the following steps:

[0052] Step 1: ASCII-encode the original text file character by character to obtain the ASCII code sequence Asc(M[k]) of the original text file (K is the length of the original text file), and set the value range between [0, 255] The ASCII coding sequence Asc(M[k]) in between is subjected to linear transform quantization processing to obtain a disc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a time-lag chaos iteration-based digital signature method and a time-lag chaos iteration-based digital signature device, and belongs to the technical field of communications. The process of generating a digital signature comprises the following steps: 1) performing ASCII encoding on a clear text and linearly quantizing a value domain; 2) performing one-dimensional time-lagchaos iteration; 3) performing a Hash functional transformation with a key; 4) encrypting, and the like. The process of authenticating the digital signature comprises the following steps: 5) performing the same step as the process of generating the digital signature on the received clear text and generating a Hash value; 6) decrypting the received digital signature (the Hash value); 7) authenticating, and the like. Due to the use of the sensitivity and the ergodicity of the time-lag chaos iteration, the clear-text information is modulated in the iteration track (process) of the time-lag chaositeration, so that the generated Hash value has larger key space and higher safety. The time-lag chaos iteration-based digital signature method and the time-lag chaos iteration-based digital signature device are suitable for various secure transmission occasions of texts, video and audio files and the like which need the digital signature for verification, and have the characteristics of simple operation, high speed, irreversibility, anti-counterfeiting, strong attack and collision resistance, and the like.

Description

technical field [0001] The invention belongs to the technical field of communication, and relates to a digital signature method and device. Background technique [0002] The 21st century is the age of information. On the one hand, the rapid development of information technology and industry presents an unprecedented scene of prosperity. On the other hand, incidents that endanger information security continue to occur, and the situation is grim. Information security is related to national security and social stability, therefore, measures must be taken to ensure the information security of our country. [0003] In addition to keeping information confidential, the information security system also needs to resist attacks such as forgery, tampering, impersonation, and denial. These problems between the sender and the receiver need to be solved by using authentication technology to determine the authenticity of the identities of both parties in communication. The emergence of d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 隆克平徐杰杨娣洁刘小林王军浩
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products