Encryption and decryption method based on chaos ciphers
A technology of chaotic cryptography and chaotic sequence, applied in the field of information, can solve the problems of system orbit evolution, orbit instability, complex spatial structure, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0075] Such as figure 1 As shown, in the flowchart of Embodiment 1 of the encryption method using chaotic ciphers of the present invention, the encryption method includes the following steps:
[0076] Step S101. Divide the interval [-1, 1] into N subfields and M subfields, wherein M and N are natural numbers greater than 1. It should be noted that the present invention does not limit the relationship between M and N. That is, M and N can be equal or unequal; in this step, it is preferable to divide the interval [-1, 1] into N subfields π respectively according to the following formula i and M subdomains
[0077] π i =[t i , t i+1 ), i=0,1,2...N-2; π N-1 =[t N-1 , t N ];
[0078] t i =-cos(iπ / N), i=0, 1, 2...N-1;
[0079] i=0,1,2...M-2;
[0080] u i =-cos(iπ / M), i=0, 1, 2 . . . M-1.
[0081] Step S102. Establish a chaotic sequence model on the interval [-1, 1]; in this step, the constructed chaotic sequence model is preferably:
[0082] x ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 