Supercharge Your Innovation With Domain-Expert AI Agents!

Encryption Method of Chaotic Parallel Data Based on Virtual Computing and Data Optimization

An encryption method and data optimization technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as inability to perform encryption processing and ineffective use of physical computing cores

Inactive Publication Date: 2017-12-08
HARBIN UNIV OF SCI & TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The defect of the above-mentioned data encryption method is: the data encryption method directly distributes the data on the physical computing core for calculation
Although parallel encryption can be achieved in dual-core processors, data division is based on the physical computing cores of dual-core processors. When the underlying physical computing cores change, the physical computing cores cannot be effectively utilized.
For example, when the number of underlying physical computing cores changes to 4 or 8, only 2 of them are used for encryption processing without using the remaining 2 or 6 for encryption processing; and when the number of underlying computing cores becomes When 1, encryption processing cannot be performed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption Method of Chaotic Parallel Data Based on Virtual Computing and Data Optimization
  • Encryption Method of Chaotic Parallel Data Based on Virtual Computing and Data Optimization
  • Encryption Method of Chaotic Parallel Data Based on Virtual Computing and Data Optimization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The embodiments of the present invention will be described in further detail below with reference to the accompanying drawings and examples. The following examples are intended to illustrate the present invention, but not to limit the scope of the present invention.

[0034] In parallel computing, if the amount of data processed is small, the parallel computing cost after data division is either equal to the serial computing efficiency of a single processor, or lower than the serial processing efficiency. Therefore, how to perform parallel data division for different data is also an urgent problem to be solved in parallel computing.

[0035] see figure 1 , an embodiment of the present invention proposes an encryption method for chaotic parallel data based on virtual computing and data optimization, including:

[0036] S1, establish a chaos equation, divide the data, obtain the divided data set, and determine the virtual computing core set;

[0037] S2. Determine the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a chaotic parallel data encryption method based on virtual computing and data optimization, including: S1, establishing a chaotic equation, dividing the data, obtaining the divided data sets, and determining the virtual computing core set; S2, judging the The difference between the data set and the virtual computing core set, according to the size of the difference and zero, determine the virtual computing core set in the execution state, and establish a static mapping relationship between the data set and the virtual computing core in the execution state; S3, according to The physical computing core set in the parallel system establishes the execution state physical computing core set, and establishes the static mapping relationship between the execution state virtual computing core set and the execution state physical computing core set, and the execution state virtual computing core obtains the chaos equation key and perform data encryption. The encryption method proposed in the embodiment of the present invention can make full use of the physical computing core according to actual needs, that is, make full use of the computing resources of the parallel system.

Description

technical field [0001] The invention relates to the technical fields of data security and network security, in particular to an encryption method for chaotic parallel data based on virtual computing and data optimization. Background technique [0002] With the development of the Internet and cloud computing technology, people's lives rely more on the Internet. And the data stored and transmitted on the Internet also has security issues. How to ensure the security of these data is of great significance to countries, enterprises and individuals. The protection of sensitive and private data is also an urgent problem to be solved in the development of technologies such as the Internet of Things and cloud computing. [0003] Therefore, in order to ensure the security of data, the existing data encryption method is: use Logistic chaotic map and Fibonacci sequence to mix, divide the data into odd and even numbers in the dual-core processor according to the order of bytes, and div...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 刘嘉辉宋大华孙广路何勇军李岩
Owner HARBIN UNIV OF SCI & TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More