Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hyper-chaos encryption method for weak password based on quantum cellular neural network

A technology of neural network and encryption method, which is applied in the field of weak password hyperchaotic encryption, can solve problems such as difficult to guarantee security, and achieve the effects of enhanced ability to resist violent attacks, high security level, and convenient memory

Inactive Publication Date: 2013-01-30
CHANGCHUN UNIV OF SCI & TECH
View PDF1 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem that the security of the existing cryptographic system is difficult to be guaranteed when subjected to brute force cracking attacks due to the limitation of the limited key space, the present invention provides a weak cryptographic hyperchaotic encryption method based on quantum cellular neural network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hyper-chaos encryption method for weak password based on quantum cellular neural network
  • Hyper-chaos encryption method for weak password based on quantum cellular neural network
  • Hyper-chaos encryption method for weak password based on quantum cellular neural network

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0019] Specific implementation mode 1. Combination Figure 1 to Figure 3 Illustrate this embodiment, based on the weak password hyperchaotic encryption method of quantum cellular neural network, this method is realized by the following steps:

[0020] A1. Select a password with a length of n as the encryption object, n is a positive integer, and the combination length of n is within a reasonable range (such as 105 combinations);

[0021] B1. Split the n-bit password into m-bit short password SP and k-bit strong key SK;

[0022] C1. Embed the strong key SK into the two-dimensional image to form the image strong key ISK; the difference from the existing encryption technology is that the user is no longer required to memorize the SK. For the human brain, it is far longer to memorize an image. Much easier than memorizing k-bit characters;

[0023] D1. Perform discrete chaotic mapping on the image strong key ISK in step C1, and set control parameters to obtain a scrambled image S...

specific Embodiment approach 2

[0041] Specific embodiment two, combine image 3Describe this implementation mode, this implementation mode is an embodiment of the quantum cellular neural network-based weak password hyperchaotic encryption method described in the first specific implementation mode:

[0042] 1. Select the seven-digit password "custABC" as the encryption object, of which the first four digits "cust" are the strong key SK, and the last three digits "ABC" are the short password SP;

[0043] 2. Embed "cust" into a two-dimensional image to generate a 128×128 pixel image strong key ISK;

[0044] 3. According to the chaotic map shown in equation (1), set the control parameters p=36, q=3, perform image scrambling processing on the image strong key ISK, and obtain the scrambled image S_ISK. And the scrambled image S_ISK is arranged in order from top to bottom and from left to right to obtain a scrambled sequence S;

[0045] 4. According to the hyper-chaotic system shown in formula (2), set the initi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a hyper-chaos encryption method for a weak password based on a quantum cellular neural network, which belongs to the field of the information security technology. The method provided by the invention solves the problem that the existing password system is limited by limited key space so that the safety of the system is difficult to guarantee when running into brute-force attacks. The encryption method provided by the invention combines the hyper-chaos characteristic of the quantum cellular neural network with the advantages of human brain identification; the safe password is divided into two parts, wherein one part is translated into the picture form; in terms of an initial value and extremely sensitive characteristics of a control parameter, images are encrypted by using the high complexity of the hyper-chaos system; the other part of secret key is encrypted by using an AES (Advanced Encryption Standard) encryption method; and the two parts form a safe password for encrypting the data. The encryption method provided by the invention has great key space; the ability resisting to brute force attack is obviously strengthened; the calculated quantity in the encryption process is reduced when less password number is used; and the encryption method has the characteristics of high safety and convenience for remembering by a user.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a weak password hyperchaotic encryption method based on a quantum cellular neural network. Background technique [0002] Computer and information security issues have been intensively studied for more than 50 years. General security including encryption algorithms, computing devices, operating systems, and networks. Among them, cryptographic systems are widely used in identity verification and data encryption. Humans have a limited ability to remember passwords and tend to choose weak passwords that are too simple and predictable. As a result, vulnerabilities related to weak passwords have become a widespread security problem. Users and businesses all over the world are looking for solutions to the problem of weak passwords. [0003] According to statistics, 86% of American companies will use password authentication and encryption in 2009. Using a weak password ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/06
Inventor 李锦青柏逢明底晓强祁晖从立钢管红梅
Owner CHANGCHUN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products