Unlock instant, AI-driven research and patent intelligence for your innovation.
Hyper-chaos encryption method for weak password based on quantum cellular neural network
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of neural network and encryption method, which is applied in the field of weak password hyperchaotic encryption, can solve problems such as difficult to guarantee security, and achieve the effects of enhanced ability to resist violent attacks, high security level, and convenient memory
Inactive Publication Date: 2013-01-30
CHANGCHUN UNIV OF SCI & TECH
View PDF1 Cites 18 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0006] In order to solve the problem that the security of the existing cryptographic system is difficult to be guaranteed when subjected to brute forcecracking attacks due to the limitation of the limited key space, the present invention provides a weak cryptographic hyperchaotic encryption method based on quantum cellular neural network
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
specific Embodiment approach 1
[0019] Specific implementation mode 1. Combination Figure 1 to Figure 3 Illustrate this embodiment, based on the weak password hyperchaotic encryption method of quantum cellular neural network, this method is realized by the following steps:
[0020] A1. Select a password with a length of n as the encryption object, n is a positive integer, and the combination length of n is within a reasonable range (such as 105 combinations);
[0021] B1. Split the n-bit password into m-bit short password SP and k-bit strong key SK;
[0022] C1. Embed the strong key SK into the two-dimensional image to form the image strong key ISK; the difference from the existing encryption technology is that the user is no longer required to memorize the SK. For the human brain, it is far longer to memorize an image. Much easier than memorizing k-bit characters;
[0023] D1. Perform discrete chaotic mapping on the image strong key ISK in step C1, and set control parameters to obtain a scrambled image S...
specific Embodiment approach 2
[0041] Specific embodiment two, combine image 3Describe this implementation mode, this implementation mode is an embodiment of the quantum cellular neural network-based weak password hyperchaotic encryption method described in the first specific implementation mode:
[0042] 1. Select the seven-digit password "custABC" as the encryption object, of which the first four digits "cust" are the strong key SK, and the last three digits "ABC" are the short password SP;
[0043] 2. Embed "cust" into a two-dimensional image to generate a 128×128 pixel image strong key ISK;
[0044] 3. According to the chaotic map shown in equation (1), set the control parameters p=36, q=3, perform image scrambling processing on the image strong key ISK, and obtain the scrambled image S_ISK. And the scrambled image S_ISK is arranged in order from top to bottom and from left to right to obtain a scrambled sequence S;
[0045] 4. According to the hyper-chaotic system shown in formula (2), set the initi...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to a hyper-chaos encryption method for a weak password based on a quantumcellular neural network, which belongs to the field of the information security technology. The method provided by the invention solves the problem that the existing passwordsystem is limited by limited key space so that the safety of the system is difficult to guarantee when running into brute-force attacks. The encryption method provided by the invention combines the hyper-chaos characteristic of the quantumcellular neural network with the advantages of human brain identification; the safe password is divided into two parts, wherein one part is translated into the picture form; in terms of an initial value and extremely sensitive characteristics of a control parameter, images are encrypted by using the high complexity of the hyper-chaos system; the other part of secret key is encrypted by using an AES (Advanced Encryption Standard) encryption method; and the two parts form a safe password for encrypting the data. The encryption method provided by the invention has great key space; the ability resisting to brute forceattack is obviously strengthened; the calculated quantity in the encryption process is reduced when less password number is used; and the encryption method has the characteristics of high safety and convenience for remembering by a user.
Description
technical field [0001] The invention relates to the technical field of information security, in particular to a weak password hyperchaotic encryption method based on a quantumcellular neural network. Background technique [0002] Computer and information security issues have been intensively studied for more than 50 years. General security including encryption algorithms, computing devices, operating systems, and networks. Among them, cryptographic systems are widely used in identity verification and data encryption. Humans have a limited ability to remember passwords and tend to choose weak passwords that are too simple and predictable. As a result, vulnerabilities related to weak passwords have become a widespread security problem. Users and businesses all over the world are looking for solutions to the problem of weak passwords. [0003] According to statistics, 86% of American companies will use password authentication and encryption in 2009. Using a weak password ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.