Block cipher system using multi-chaotic mapping multi-dynamic S-box
A technology of block cipher and chaotic mapping, which is applied in transmission system, digital transmission system, and key distribution, and can solve problems such as slow operation speed, low security, and difficult hardware implementation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] Embodiment one: see figure 1 , figure 2 , figure 1 Among them, the four chaotic maps iterate 1600 times respectively to generate two 128-bit initial sequences with , according to formula (2) to generate the first wheel key . In the figure, Indicates the key First bytes, , , , , 128-bit initial sequence The first byte of (order ), Indicates XOR operation, function Indicates that the key The right 64 bits are assigned to the wheel key .
[0025] figure 2 In, the plaintext block , is the first i round-robin subkey of 8 bytes, the i wheel output block (it is the first ( i +1) round of input).
[0026] This embodiment provides a chaotic block cipher system using multiple discrete chaotic maps and multiple dynamic S-boxes. The cipher system includes four modules in total. The implementation of each module will be further described in detail below.
[0027] Subkey generation module mode:
[0028] The chaotic system used in...
Embodiment approach
[0192] plaintext Divide into a series of chunks of length 64 bits:
[0193] ,
[0194] make representation block 8 bytes, ie . Use the round transformation function f Encrypt each data block in turn, assuming that the number of rounds for each data block encryption is wheel, then the block The encryption process of can be described by the following formula:
[0195] , (3)
[0196] In formula (3), , ,function It is defined as follows:
[0197] , (4)
[0198] In formula (4), the function is the dynamic S-box generated by module (2), is the first i round-robin subkey of 8 bytes. From formula (3), we can see that the first i wheel output block is the first ( i +1) rounds of input (except the last round). Therefore, the r round (last round) output is the ciphertext block. The length of the ciphertext block is also 64 bits (8 bytes), the same as the length of the plaintext block. In the past, the ciphertext file size of many chaotic cr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



