Method for carrying out chaotic encryption based on particle travelling

An encryption method, chaotic encryption technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of continuous chaotic systems, discretized chaotic cryptographic systems, etc., and achieve the effect of being difficult to crack and strong confidentiality

Inactive Publication Date: 2012-05-02
NANJING UNIV OF INFORMATION SCI & TECH
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Of course, chaotic cryptography still has some shortcomings and needs to be perfected: for example, the discretization of continuous chaotic systems and the practical design of chaotic cryptosystems, etc., need further consideration and research

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out chaotic encryption based on particle travelling
  • Method for carrying out chaotic encryption based on particle travelling
  • Method for carrying out chaotic encryption based on particle travelling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.

[0030] Following figure 1 Take an example to describe the specific process of embedding information in the text of the document according to the present invention;

[0031] The particle-based nonlinear encryption method is composed of five parts: the encrypted information format conversion module, the information segmentation module processing module, the parameter coordinate conversion module, the nonlinear encryption module, and the encrypted information output module. The specific flow chart of the information encryption is described as follows:

[0032] Before the information is encrypted, first, in step S1, the encrypted information format conversion unit automatically reads the encrypted information, and automatically converts the encrypted information in any format into a binary format. Binary format is a general format for computer storage ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for carrying out chaotic encryption based on particle travelling, comprising the following steps of: (1) initializing: randomly generating or setting initial parameters according to given information, wherein the initial parameters comprise a reflection container parameter, an initial position, a running speed, running time and a running direction; and (2) computing a track by iteration based on the initial parameters and a reflection law to obtain the final collision position and direction and realize the encryption of the data. The method provided by the invention has the advantages of simplicity in operation, sensitivity on the initial parameters and unilateral directivity of a chaotic encryption algorithm, so that the method can be widely applied to information safety of encrypted data, secret communication and the like.

Description

Technical field [0001] The invention involves the field of encryption technology, and specially involves the use of key control for data encryption and decryption related technologies. Background technique [0002] In the modern electronics era, the data processing date that is exchanged on the public telecommunications channel [0003] Common business, official affairs and private affairs are increasing day by day.The latest statistics show that the number of global netizens has exceeded 1 billion, and the Internet penetration rate of the Internet in the EU, the United States, South Korea, Japan and other countries has basically exceeded 50%, up to 68.6%.Compared with traditional information, digital information has many advantages such as low cost, easy organization and processing, convenient preservation, long validity period, and easy communication.Although digital information has many advantages than traditional information, fundamentally, it is only another new type of expr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
Inventor 赵立龙裴世鑫
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products