Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security multicast communication method based on chaotic neural network

A neural network and secure multicast technology, applied in the field of information security, can solve problems such as application limitations of multicast communication security

Inactive Publication Date: 2014-07-30
HUAQIAO UNIVERSITY
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security of multicast communication limits its application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security multicast communication method based on chaotic neural network
  • Security multicast communication method based on chaotic neural network
  • Security multicast communication method based on chaotic neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The present invention will be further described below with reference to the accompanying drawings and specific embodiments.

[0018] A method for secure multicast communication based on chaotic neural network: the symmetric cryptographic algorithm based on chaotic neural network and the centralized group key management protocol LKH are combined and applied to multicast communication;

[0019] The chaotic neural network refers to the introduction of chaos into the neural network, so that the artificial neural network has rich nonlinear dynamic characteristics and high computational complexity, and many neural network models can achieve chaotic characteristics, such as improved discrete with chaotic characteristics. Hopfield neural network; the symmetric cryptographic algorithm of the chaotic neural network uses the output of the parallel LFSR as the input of the discrete Hopfield neural network with chaotic characteristics, and uses the nonlinear dynamic characteristics a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security multicast communication method based on a chaotic neural network. The security multicast communication method is characterized by comprising the steps of combining a symmetric cryptographic algorithm based on the chaotic neural network and a centralized key management protocol LKH, and applying the combination to multicast communication, wherein according to the chaotic neural network, the chaos theory is introduced into a neural network to enable an artificial neural network to have abundant non-linear dynamic characteristics and high computational complexity, and chaotic characteristics can be achieved through multiple neural network models, such as a disperse Hopfield neural network having the chaotic characteristics after improvement; according to the symmetric cryptographic algorithm based on the chaotic neural network, output of concurrent LFSRs is taken as input of the disperse Hopfield neural network having the chaotic characteristics, and random selection is performed on pseudorandom sequences generated by the LFSRs by means of the non-linear dynamic characteristics and the chaotic characteristics of the neural network. Therefore, in a secret key of the symmetric algorithm (as specified in the specification), T0 is a connection weight singular matrix, H is a circulant matrix, and H' is a transposed matrix of H.

Description

technical field, [0001] The invention relates to the field of information security, in particular to a method for information security encryption. Background technique [0002] In recent years, chaotic neural network has a wide range of application prospects in network communication, combinatorial optimization and artificial intelligence, especially in the fields of secure communication. With the development of communication technology, multicast communication has made some progress, and a relatively complete communication model has been formed and widely used. Multicast communication can reduce the overhead of sending packets by the sender, save network bandwidth, increase the scalability of the group communication system, and improve the efficiency and capability of network application services. But the security of multicast communication makes its application subject to certain restrictions. [0003] As a key technology in multicast applications, secure multicast has hi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/18H04L9/00
Inventor 李国刚钟超林王燕琼
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products