Equivalent key acquisition method and device and computer readable storage medium

An acquisition method and key technology, applied in the field of optical cryptography, can solve the problems of limited applicable scenarios, low analysis efficiency and accuracy, and achieve the effect of expanding applicable scenarios and improving efficiency and accuracy

Active Publication Date: 2019-07-30
SHENZHEN UNIV
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the embodiments of the present invention is to provide an equivalent key acquisition method, device and computer-readable storage medium, which can at least solve the problem of optical encryption system security in the related art relying on the geometric parameters and related structures of the optical encryption system Analysis, analysis of problems with low efficiency and accuracy, and limited applicable scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equivalent key acquisition method and device and computer readable storage medium
  • Equivalent key acquisition method and device and computer readable storage medium
  • Equivalent key acquisition method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0028] In order to solve the technical problems in related technologies that rely on the geometric parameters and related structures of the optical encryption system for security analysis of the optical encryption system, the analysis efficiency and accuracy are low, and the applicable scenarios are relatively limited, this embodiment proposes an equivalent The key acquisition method, such as figure 1 Shown is a schematic flow diagram of the basic flow of the equivalent key acquisition method provided in this embodiment. The equivalent key acquisition method proposed in this embodiment includes the following steps:

[0029] Step 101. Obtain a preset training data set; the training data set includes a combination of multiple plaintext images and corresponding ciphertext sequences.

[0030] Specifically, the present invention is based on the Kerckhoffs principle, a basic criterion recognized in the field of cryptanalysis, and adopts a chosen plaintext attack scheme, that is, it ...

no. 2 example

[0055] In order to solve the technical problems in the related art that rely on the geometric parameters and related structures of the optical encryption system for the security analysis of the optical encryption system, the analysis efficiency and accuracy are low, and the applicable scenarios are relatively limited, this embodiment shows an equivalent key acquisition device, see Figure 5 , the equivalent key acquisition device of this embodiment includes:

[0056] The obtaining module 501 is used to obtain a preset training data set; the training data set includes a combination of multiple plaintext images and corresponding ciphertext sequences;

[0057] The training module 502 is used to train the neural network based on the training data set to obtain a trained neural network model;

[0058] The determining module 503 is configured to determine the neural network model as an equivalent key; the equivalent key is used for security analysis of the optical encryption system...

no. 3 example

[0072] This embodiment provides an electronic device, see Figure 6 As shown, it includes a processor 601, a memory 602, and a communication bus 603, wherein: the communication bus 603 is used to realize connection and communication between the processor 601 and the memory 602; the processor 601 is used to execute one or more programs stored in the memory 602 A computer program to implement at least one step in the method for obtaining an equivalent key in the first embodiment above.

[0073] The present embodiment also provides a computer-readable storage medium, which includes information implemented in any method or technology for storing information, such as computer-readable instructions, data structures, computer program modules, or other data. volatile or nonvolatile, removable or non-removable media. Computer-readable storage media include but are not limited to RAM (Random Access Memory, random access memory), ROM (Read-Only Memory, read-only memory), EEPROM (Electri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an equivalent key obtaining method and device and a computer readable storage medium. The method comprises the steps of obtaining a preset training data set,wherein the training data set comprises a combination of a plurality of plaintext images and the corresponding ciphertext sequences; training a neural network based on the training data set to obtaina trained neural network model; determining the neural network model as an equivalent key, wherein the equivalent key is used for carrying out security analysis on the optical encryption system. Through the implementation of the invention, a series of known ciphertext-plaintext pairs are trained in the neural network structure, so that the mapping relation between the ciphertext and the plaintextof an optical encryption system is obtained, the mapping relation serves as an equivalent secret key, the safety analysis efficiency and accuracy are improved, whether the encryption system carries out additional random scrambling or other secondary encryption operation on the ciphertext sequence or not is not considered, and the application scene is expanded.

Description

technical field [0001] The present invention relates to the technical field of optical cryptography, in particular to an equivalent key acquisition method, device and computer-readable storage medium. Background technique [0002] Optical image encryption is a new encryption technology different from traditional mathematical encryption. Compared with traditional mathematical encryption technology, optical image encryption technology has the advantages of multi-dimensionality, large capacity, high robustness, and natural parallel data processing capabilities. Therefore, the encryption technology has received extensive attention and continued development in recent years. [0003] However, as a cryptographic system, its primary concern should be the security of the system, and it must be confirmed whether it is reliable through a rigorous security analysis of the cryptographic system. At present, when analyzing the security of an optical encryption system in related technologi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04B10/85G06N3/08
CPCH04L9/0861H04B10/85G06N3/08H04L2209/12
Inventor 何文奇盘水新彭翔韩本年
Owner SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products