Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption and decryption method based on chaos ciphers

A technology of chaotic cryptography and chaotic sequence, applied in the field of information, can solve the problems of system orbit evolution, orbit instability, complex spatial structure, etc.

Inactive Publication Date: 2013-02-27
SHENZHEN JIUZHOU ELECTRIC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 3. Sensitive dependence on the initial value, a small change in the initial state will cause the orbital evolution of the system to separate at an exponential rate;
[0009] 4. There is a strange attractor, which comes from the infinite stretching and folding of the orbit. The strange attractor is a phenomenon that the orbital instability and the volume shrinkage of the dissipative system occur at the same time. It exists in a limited area and the space structure is very complicated. ;
[0010] 5. Long-term unpredictability, because the system is sensitive to the initial value, the long-term behavior of the system is similar to Brownian motion, and the long-term behavior of the system can only be described by the method of probability theory, but cannot be described by determinism;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method based on chaos ciphers
  • Encryption and decryption method based on chaos ciphers
  • Encryption and decryption method based on chaos ciphers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] Such as figure 1 As shown, in the flowchart of Embodiment 1 of the encryption method using chaotic ciphers of the present invention, the encryption method includes the following steps:

[0076] Step S101. Divide the interval [-1,1] into N subfields and M subfields, wherein M and N are natural numbers greater than 1. It should be noted that the present invention does not limit the relationship between M and N. That is, M and N can be equal or not; in this step, it is preferable to divide the interval [-1,1] into N subfields π respectively according to the following formula i and M subdomains

[0077] π i =[t i ,t i+1 ), i=0,1,2...N-2; π N-1 =[t N-1 ,t N ];

[0078] t i =-cos(iπ / N),i=0,1,2…N-1;

[0079]

[0080] u i =-cos(iπ / M), i=0,1,2...M-1.

[0081] Step S102. Establish a chaotic sequence model on the interval [-1,1]; in this step, the constructed chaotic sequence model is preferably:

[0082] x n = ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption and decryption method based on chaos ciphers. The encryption method comprises the following steps: A1, respectively dividing an interval [-1,1] into N subfields and M subfields; B1, establishing a chaos sequence model in the interval [-1,1]; C1, generating a permutation sequence and a substitution sequence in accordance with a given first initial value, a given second initial value and the chaos sequence model; D1, judging the subfield sequence number of each element of the permutation sequence in the N subfields to form a permutation symbol sequence, and judging the subfield sequence number of each element of the substitution sequence in the M subfields to form a substitution symbol sequence; E1, carrying out a permutation operation on a plain text in accordance with the permutation symbol sequence; F1, carrying out a substitution operation on the plain text subjected to permutation in accordance with the substitution symbol sequence; and G1, carrying out an inverse permutation operation on the plain text subjected to substitution to form a cipher text. Since the generated permutation symbol sequence and substitution symbol sequence are pseudo-random sequences, the encryption and decryption method provided by the invention has favorable anti-deciphering performance.

Description

technical field [0001] The invention relates to the field of information technology, more specifically, to a method for encrypting and decrypting using chaotic ciphers. Background technique [0002] With the rapid development of global informatization, a large number of information systems built in my country have become the key infrastructure of the country, many of which have to be in line with international standards, such as communications, e-commerce, financial networks, etc. At the same time, in today's information open How to ensure the information security of our country's government, military, commercial and financial industries has become an important issue in our country's construction. Information security has become an urgent key issue that affects the overall situation and long-term interests of the country. [0003] One of the key technologies to solve information security problems is cryptographic technology, which mainly includes encryption technology, authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 余小龙林迎珍崔明根
Owner SHENZHEN JIUZHOU ELECTRIC