Encryption and decryption method based on chaos ciphers
A technology of chaotic cryptography and chaotic sequence, applied in the field of information, can solve the problems of system orbit evolution, orbit instability, complex spatial structure, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0075] Such as figure 1 As shown, in the flowchart of Embodiment 1 of the encryption method using chaotic ciphers of the present invention, the encryption method includes the following steps:
[0076] Step S101. Divide the interval [-1,1] into N subfields and M subfields, wherein M and N are natural numbers greater than 1. It should be noted that the present invention does not limit the relationship between M and N. That is, M and N can be equal or not; in this step, it is preferable to divide the interval [-1,1] into N subfields π respectively according to the following formula i and M subdomains
[0077] π i =[t i ,t i+1 ), i=0,1,2...N-2; π N-1 =[t N-1 ,t N ];
[0078] t i =-cos(iπ / N),i=0,1,2…N-1;
[0079]
[0080] u i =-cos(iπ / M), i=0,1,2...M-1.
[0081] Step S102. Establish a chaotic sequence model on the interval [-1,1]; in this step, the constructed chaotic sequence model is preferably:
[0082] x n = ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 