Public key cipher encrypting and decrypting method based on neural network chaotic attractor

A technology of chaotic attractor and neural network, which is applied to the public key of secure communication, user identity/authority verification, digital transmission system, etc., and can solve problems such as inappropriate long message encryption, slow public key encryption speed, and low security level

Active Publication Date: 2011-02-16
XIAMEN UNIV
View PDF1 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although public key encryption has many advantages, but public key encryption is slow and has message expansion, so it is not suitable for long message encryption, and single key encryption is much more effective, so the combination of the two concepts, that is, hybrid encryption is used in practical applications. It has become an important method for designing public key encryption, and it is also a method to make public key encryption with low security level reach IND-CCA2 (indistinguishability for adaptive chosen ciphertext attack) security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key cipher encrypting and decrypting method based on neural network chaotic attractor
  • Public key cipher encrypting and decrypting method based on neural network chaotic attractor
  • Public key cipher encrypting and decrypting method based on neural network chaotic attractor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] One, encryption and decryption method of the present invention:

[0036] The present invention is a kind of public key cryptographic encryption and decryption method based on neural network chaotic attractor, comprising the following steps:

[0037] 1) Key generation and distribution

[0038] (1) A group of users who need confidential communication share a carefully selected synaptic connection matrix T 0 , each user randomly selects a different transformation matrix in the nth-order square matrix exchange family;

[0039] (2) Each user saves his own public key, together with other information such as user name and address, in the public key repository of the certification center by means of digital signature, and obtains the public key certificate issued by the certification center. Before the second data encryption communication, the identity authentication of both communication parties is carried out through the public key certificate;

[0040] (3) Use the authent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a public key cipher encrypting and decrypting method based on a neural network chaotic attractor with high safety and high encrypting speed, relating to the information encrypting technology. The public key cipher encrypting method is implemented as the following steps: inputting secret keys; generating a secret key sequence; and generating a cipher text. The public cipher decrypting method is implemented as the following steps: authenticating the identity of a sender by a receiver; decrypting the cipher text in case of a legal user by checking the digital signature andverifying the identity of the opposite side based on the identity information of the sender; otherwise, notifying a system administrator; and calculating a new synapsis connection matrix, generating a secret key sequence, performing xor bitwise operation on secret key sequences and cipher texts at random, and recovering a plaintext until the plaintext is completely recovered.

Description

technical field [0001] The invention relates to an information encryption technology, in particular to a hybrid public key encryption and decryption method based on a neural network chaotic attractor. Background technique [0002] The rapid development of social informatization puts forward higher requirements for the security and speed of network communication. The security of modern network communication is mainly based on cryptography. Since Diffie.W and Hellman.M proposed the idea of ​​public key cryptography in 1976, it has become a hotspot in cryptography research due to its advantages of convenient password management and small number of keys, and has played an important role in network security and information security. Huge effect. Among all public key cryptosystems so far, the RSA system is the most famous and widely used one. However, the security of the RSA public key cryptography algorithm depends on the factorization of large numbers, which is slow. With the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L9/00
Inventor 郭东辉李国刚刘年生
Owner XIAMEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products