Chaos theory-based information label encryption method and system thereof

An information tag and chaos theory technology, applied in the field of information tag encryption method and its system based on chaos theory, can solve the problems of poor decryption and decreased decryption effect, and achieve simple design, good encryption effect and strong key sensitivity. Effect

Active Publication Date: 2018-08-17
CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF11 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this technology is easy to cause bad decryption. If any one of the contents is lost, then the splicing cannot be completed, and the decryption effect will also decrease.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaos theory-based information label encryption method and system thereof
  • Chaos theory-based information label encryption method and system thereof
  • Chaos theory-based information label encryption method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The embodiments of the present invention will be described in detail below with reference to the accompanying drawings, but the present invention can be implemented in many different ways defined and covered by the claims.

[0025] Logistic mapping is a typical one-dimensional chaotic system, and its formula is defined as follows:

[0026] x k+1 =μχ k (1-χ k )

[0027] Among them: μ is the branch parameter, k is the number of iterations, 0≤μ≤4, χ k ∈(0,1). When 3.569≤...≤μ≤4, the Logistic map is in a chaotic state, and the bifurcation of the chaotic state is similar to random but not random, showing a disordered, unpredictable, and chaotic phenomenon. In addition, there is no periodicity. Its parameters The relationship with the mapping value is as follows Figure 4 shown. When it is used in the encryption field, the randomly generated mapping value can only be cracked through the parameters given by the encryptor.

[0028] The present invention firstly provides...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a chaos theory-based information label encryption method and a system thereof in the field of information encryption. The method comprises the following steps of: obtaining anobject attribute of an information label; encrypting the object attribute through a Logistic mapping function in a chaos state; and replacing the original information label by the encrypted information label to serve as a new information label. According to the method, contents of information labels are encrypted through a chaos theory, so that the chaos mapping initial conditions and parameters are sensitive; and when sequential encryption is carried out through sequences generated by the chaos theory, the encryption algorithm is simple to design and has good encryption effect and safety.

Description

technical field [0001] The invention relates to the field of information encryption, in particular to an information tag encryption method and system based on chaos theory. Background technique [0002] With the continuous advancement of technology in modern society, smart phones have become an indispensable thing in people's daily life. In addition to sending and receiving text messages, making calls, mobile phones can also surf the Internet and play games. More importantly, the emergence of barcodes has changed the existing information exchange methods in China. For example, Alipay uses scanning QR codes to make electronic cash transactions gradually become mainstream. By scanning QR codes, mobile phones can perform operations such as payment and transfer. Convenient. In addition, a lot of product information is made into barcodes, and mass users can see detailed information about the products on the screen of their mobile phones by scanning the barcodes with their mobile...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L9/00
CPCH04L9/001G06F21/602
Inventor 傅明曾勇陈锦蓉
Owner CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products