Chaos synchronization encrypting/decrypting method and device using data compression encoding

A technology of data compression and chaos synchronization, which is applied in the field of information security, can solve problems such as low encryption strength, key management and security protection problems, and encryption speed decline, and achieve the effect of improving encryption security

Active Publication Date: 2015-06-03
SOUTH CHINA UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] Disadvantages: How to safely distribute and transmit the key K to the decryption party is a difficult problem. When multiple parties use different keys for encryption and decryption, key management and security protection will also become difficult problems
[0018] Disadvantages: Compared with single-key encryption technology, the operation speed is relatively slow under the same key length, and the encryption strength is relatively low
[0022] Disadvantage: The encryption speed will still decrease as the key length grows, so the key K cannot be made very long without affecting performance
[0026] Disadvantages: It still belongs to single-key encryption technology, so there are also difficulties in key management and safe distribution and transmission
With the development of technology, the lower limit of the length of the ultra-long key may be extended

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaos synchronization encrypting/decrypting method and device using data compression encoding
  • Chaos synchronization encrypting/decrypting method and device using data compression encoding
  • Chaos synchronization encrypting/decrypting method and device using data compression encoding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The following content is for example only, and is not intended to limit the protection scope of the present invention.

[0069] In view of the problem that the key length of the existing encryption technology will affect the encryption performance, resulting in the difficulty of practical application of the ultra-long key, this embodiment uses the adaptive interval encoder for data compression and the PPM algorithm dynamic probability statistic device as the chaotic dynamics system , so that the compression coding process becomes a chaotic cryptography encryption process; the public key cryptography encryptor is combined with the chaotic dynamics system, and the sender encrypts the randomly generated session key with the RSA public key cryptography algorithm, and then transmits it to the receiver; The sender and the receiver each use the session key to initialize their own chaotic dynamics system to synchronize the system states of both parties; the sender uses the initi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a chaos synchronization encrypting / decrypting method and device using data compression encoding. The device comprises a random number generator, a public key cryptography encipher, a public key cryptography decipher, a dynamical probability counter, an entropy encoder and an entropy decoder. The method comprises the steps of taking the entropy encoder and the dynamical probability counter used for the data compression as a chaotic dynamics system; enabling a compression coding process to form a chaotic cryptology encryption process; combining the public key cryptography encipher with the chaotic dynamics system, wherein after a randomly generated session key is encrypted in an asymmetrical encryption manner by a sender, the session key is sent to a receiver; initializing the respective chaotic dynamics system through the respective session key the sender and the receiver so that the system states of the sender and the receiver are synchronous; carrying out data compression encoding through the initialized system by the sender; and carrying out data uncompressing through a system with consistent state by the receiver. The method and the device provided by the invention support overlong session key and improve the encryption safety; and simultaneously, the encryption speed is not affected by the key length.

Description

technical field [0001] The invention relates to the information security technology of data encryption and decryption coding, in particular to a method and device for encryption and decryption by using data compression. Background technique [0002] The 21st century is an era of informatization, information security is related to the national economy and people's livelihood, and information coding is the basic technology of information security. There are three cores in the field of information coding technology: 1. Source coding, which mainly corresponds to data compression; 2. Security coding, which mainly corresponds to data encryption; 3. Channel coding, which mainly corresponds to data error correction coding. The present invention relates to data compression and encryption technology, and is related to chaos cryptography, public key cryptography and entropy coding knowledge of lossless compression. [0003] Chaotic cryptography is the combination of chaotic dynamics i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08H04L9/00
Inventor 覃健诚陆以勤
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products