Chaotic encryption method for voice information

A technology of chaotic encryption and voice information, which is used in secure communication through chaotic signals, secure communication devices, digital transmission systems, etc., can solve the problems of short period of chaotic sequences, the impact of chaotic system performance, and limited calculation accuracy, so as to reduce the effective accuracy. effect, enhanced encryption security, less resource required effect

Active Publication Date: 2017-02-01
HUAQIAO UNIVERSITY
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the actual application process, due to the limited calculation accuracy of computers and digital circuits, the chaotic sequence will appear short-period phenomenon, and the performance of the chaotic system will be affected to a certain extent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaotic encryption method for voice information
  • Chaotic encryption method for voice information
  • Chaotic encryption method for voice information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described below through specific embodiments.

[0028] A chaotic encryption method for voice information, comprising the steps of:

[0029] 1) Construct a dynamic variable parameter compound chaotic system, which is formed by cascading Logistic mapping and Hénon mapping, and use this system to generate a real-valued chaotic sequence with the same length as the plaintext speech sequence. The Logistic map is a classic one-dimensional chaotic map. When the bifurcation parameter 3.57<μ≤4, the system enters a chaotic state. The Hénon map is a two-dimensional discrete chaotic map. When 0.7≤ɑ≤1.4, the system enters a chaotic state. The Logisitc map and the Hénon map of the chaotic system with dynamic variable parameters can be adjusted in cascading order without affecting the performance of generating chaotic sequences.

[0030] Among them, the dynamic changes of μ and ɑ in the present invention are bifurcation parameters of Logistic map...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a chaotic encryption method for voice information. The method is characterized in comprising the steps of 1), establishing a dynamic variable parameter composite chaotic system and generating a real-value chaotic sequence of which length is the same to that of a plaintext voice sequence through utilization of the system; 2), carrying out binarization processing on the real-value chaotic sequence, thereby obtaining a chaotic key sequence of which length is the same to that of the plaintext voice sequence; and 3), through combination of the chaotic key sequence, carrying out bit-by-bit exclusive or operation on the plaintext voice sequence, thereby obtaining a ciphertext. According to the method, under limited calculation precision, the chaotic sequence with good pseudo-randomness can be generated, the valid precision effect is reduced, and a chaotic sequence cycle is prolonged; and through adoption of a chaotic system cascading mode, the encryption security is improved, a sufficient key space can be generated, and an exhaustive attack can be resisted effectively.

Description

technical field [0001] The invention relates to the technical field of voice information security, in particular to a chaotic encryption method for voice information. Background technique [0002] When using open and shared channels and networks to transmit voice information, voice information will face security issues, especially when voice information carries sensitive information, its security will be threatened. For military, public security, national defense and other departments, the encrypted transmission of voice information is very important. [0003] Due to the large amount of data in voice transmission and the real-time nature of transmission, traditional cryptographic algorithms such as AES, RSA, and DES are no longer suitable. For example, the American encryption standard DES (56 bits) has been broken in 1997. It was reported that 1024-bit RSA could also be broken in 2010. In recent years, in order to improve the security of algorithms, many scholars have prop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06
CPCH04L9/001H04L63/0428
Inventor 张育钊龚雪庄铭杰唐加能
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products