Encryption method and device using random clock based on chaos

A random clock and clock technology, which is applied in the field of information security and can solve the problems of poor security performance of linear feedback shift registers.

Active Publication Date: 2014-02-05
BEIHANG UNIV
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the safety performance of the linea

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device using random clock based on chaos
  • Encryption method and device using random clock based on chaos
  • Encryption method and device using random clock based on chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The specific implementation steps are as figure 1 The overall structure diagram and Figure 4 The method flow chart is as follows:

[0026] Step 1: Initialization of the chaotic map control module and the pseudo-random sequence generation module. First define the interference signal para_ob=0, give a certain initial value to the chaotic map control module and the pseudo-random sequence generation module, and then run 180 clocks respectively, so as to realize the initialization of the chaotic map control module and the pseudo-random sequence generation module procedure, go to step 2.

[0027] Step 2: Enter the seed key. There are two ways to enter the seed key. It can be entered manually or automatically generated by an external physical noise source. Go to step 3.

[0028] Step 3: The plaintext input module reads the plaintext and inputs it into the encryption module. The phase-locked loop PLL1 accepts the pre-calculated frequency division coefficient para_pll1, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption method and device using a random clock based on chaos, and belongs to the field of information safety. According to the system, a design scheme which is integrated from top to bottom is adopted. The device is composed of a crystal oscillator, a PLL1, a PLL2, a pseudorandom sequence generating module, a chaotic mapping control module, a disturbance generating module, a clear text input module, an encryption module, a secret key extension module and a cipher text output module. According to the encryption method and device using the random clock based on chaos, a common linear feedback shift register, chaotic mapping control and cipher text feedback are combined to generate the random clock, the safety of the random clock is effectively improved, and power attack and electromagnetism attack can be effectively resisted. The encryption method and device using the random clock based on chaos can be applied to industrial and technical production of encrypted hardware storage device static encryption, microwave or photo-communication chains, and a receiving or transmitting port of a computer terminal and the like.

Description

technical field [0001] The invention relates to high-speed encryption technology in information transmission, encryption circuit design and encryption control circuit design technology, and belongs to the field of information security. Background technique [0002] With the rapid development of computer technology and communication technology, people pay more and more attention to the issue of information security, and various new encryption techniques and analysis techniques are constantly emerging. Compared with traditional software encryption technology, hardware encryption technology has the advantages of occupying less host resources and fast encryption speed, and undoubtedly has greater development potential. However, similarly, attack methods against hardware encryption technology emerge in endlessly, among which relatively effective attack methods are energy attack and electromagnetic analysis. These two methods pose a huge threat to the security of hardware encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/00H04L7/033
Inventor 郑志明张筱姚望张尧唐绍婷郭炳晖
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products