Chaos synchronization encrypting/decrypting method and device using data compression encoding

A chaotic synchronization and data compression technology, applied in the field of information security, can solve the problems of low encryption strength, key management and security protection problems, and encryption speed decline, and achieve the effect of improving encryption security.

Active Publication Date: 2013-01-30
SOUTH CHINA UNIV OF TECH
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] Disadvantages: How to safely distribute and transmit the key K to the decryption party is a difficult problem. When multiple parties use different keys for encryption and decryption, key management and security protection will also become difficult problems
[0020] Disadvantages: Compared with single-key encryption technology, the operation speed is relatively slow under the same key length, and the encryption strength is relatively low
[0024] Disadvantage: The encryption speed will still decrease as the key length grows, so the key K cannot be made very long without affecting performance
[0028] Disadvantages: It still belongs to single-key encryption technology, so there are also difficulties in key management and safe distribution and transmission
With the development of technology, the lower limit of the length of the ultra-long key may be extended

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaos synchronization encrypting/decrypting method and device using data compression encoding
  • Chaos synchronization encrypting/decrypting method and device using data compression encoding
  • Chaos synchronization encrypting/decrypting method and device using data compression encoding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The following content is only an example, and is not intended to limit the protection scope of the present invention.

[0071] In view of the problem that the key length of the existing encryption technology will affect the encryption performance, resulting in the problem that the ultra-long key is difficult to be applied in practice, this embodiment uses the adaptive interval encoder for data compression and the dynamic probability statistics of the PPM algorithm as the chaotic dynamic system ,Make the compression coding process a chaotic cryptographic encryption process; combine the public key cryptographic cipher with the chaotic dynamics system, the sender uses the RSA public key cryptographic algorithm to encrypt the randomly generated session key, and then transmits it to the receiver; The sending and receiving parties use the session key to initialize their own chaotic dynamics system to synchronize their system states; the sender uses the initialized system to perfo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a chaos synchronization encrypting/decrypting method and device using data compression encoding. The device comprises a random number generator, a public key cryptography encipher, a public key cryptography decipher, a dynamical probability counter, an entropy encoder and an entropy decoder. The method comprises the steps of taking the entropy encoder and the dynamical probability counter used for the data compression as a chaotic dynamics system; enabling a compression coding process to form a chaotic cryptology encryption process; combining the public key cryptography encipher with the chaotic dynamics system, wherein after a randomly generated session key is encrypted in an asymmetrical encryption manner by a sender, the session key is sent to a receiver; initializing the respective chaotic dynamics system through the respective session key the sender and the receiver so that the system states of the sender and the receiver are synchronous; carrying out data compression encoding through the initialized system by the sender; and carrying out data uncompressing through a system with consistent state by the receiver. The method and the device provided by the invention support overlong session key and improve the encryption safety; and simultaneously, the encryption speed is not affected by the key length.

Description

Technical field [0001] The present invention relates to information security technology for data encryption, decryption and coding, in particular to a method and device for encryption and decryption using data compression. [0002] Background technique [0003] The 21st century is the era of informationization. Information security is related to the national economy and people's livelihood, and information coding is the basic technology of information security. There are three cores in the field of information coding technology: 1. Source coding, which mainly corresponds to data compression; 2. Security coding, which mainly corresponds to data encryption; 3. Channel coding, which mainly corresponds to data error correction coding. The invention relates to data compression and encryption technology, and is related to the knowledge of entropy coding of chaotic cryptography, public key cryptography and lossless compression. [0004] Chaotic cryptography is a combination of chaotic dyn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08H04L9/00
Inventor 覃健诚陆以勤
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products