Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Cryptographic Calculation Method Based on Nonlinear Theory

A calculation method and nonlinear technology, applied in the field of cryptography, can solve the problems of chaotic orbit collapse and low efficiency, and achieve the effect of improving efficiency

Active Publication Date: 2019-01-18
GUIZHOU CHENGJINZHENG INFORMATION SYST ENG SUPERVISION CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] When the dynamic behavior of the chaotic system is realized digitally on the computer, due to the precision problem of converting the continuous domain to the digital domain, there is a problem of the collapse of the chaotic orbit. This is also a problem that the cryptographic system based on chaos needs to solve through technical means, but this is still Problems easily overlooked by published chaotic encryption systems
[0007] At present, it is known that these designs are generally lower in efficiency than the commonly used AES or DES algorithms. Therefore, drawing on the design results of existing systems and jumping out of the classic ideas in chaotic cipher design, a safe and efficient non-linear cipher is designed. The system is a problem that those skilled in the art are committed to solving

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Cryptographic Calculation Method Based on Nonlinear Theory
  • A Cryptographic Calculation Method Based on Nonlinear Theory
  • A Cryptographic Calculation Method Based on Nonlinear Theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be described in further detail below by means of specific embodiments:

[0046] 2.2 Main technical solutions

[0047] In our inventive design, there are two chaotic systems in the form:

[0048]

[0049]

[0050] Both chaotic systems are piecewise linear maps (PLCMs). This choice is due to the fact that PLCMs have better chaotic dynamics behavior than other chaotic systems such as Logistic maps. The difference between them is that they have different control parameters b 1 and b 2 , these two parameters are also added with F 1 the initial state x 0 , that is, the triplet (b 1 ,b 2 ,x 0 ) constitutes the key Key of the cryptosystem, when (b 1 ,b 2 ,x 0 When the three values ​​of ) all belong to the interval (0,1), the iteration of the equation (1, 2) has the characteristics of chaotic dynamics.

[0051] The plaintext information P consists of a series of m-bit plaintext blocks, so there are N=2 m different plaintext block value...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a high security code computing method. The method comprises two chaotic systems F1 and F2. According to the method, a plaintext is calculated through an equation (1) so as to obtain a chaotic state ciphertext; an equation (2) takes the ciphertext obtained in the equation (1) as an original state and starts computation; and a computation result of the equation (2) is returned to the equation (1) again and used as the original state to realize iterative operation, unless the ciphertext intensity meets the encryption requirement. The decryption method is inverse operation of the encryption method. The code computing method as a high security code system provides another beneficial choice for various users needing information security protection.

Description

technical field [0001] The invention relates to a password system for information security, which can ensure the safe transmission and storage of digital signals. Background technique [0002] At present, based on nonlinear science, especially the research on cryptography based on chaos has received extensive attention. Its theory comes from the unpredictability of the chaotic dynamics behavior of the chaotic system when the initial state or control parameters are unknown. Some publications have been published. Classical related cryptographic systems, for the input plaintext, these systems generally use the number of chaotic iterations based on the lookup table (look_up table), or some kind of mixing of chaotic state values ​​and other values ​​to generate ciphertext. [0003] Baptista proposed a search mechanism-based cryptographic system Cryptographywith chaos in Physics Letters A and later a series of improved versions based on this design. The plaintext unit length is an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 韦军
Owner GUIZHOU CHENGJINZHENG INFORMATION SYST ENG SUPERVISION CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products