Key generation method based on deep learning generative adversarial network

A technology of key generation and deep learning, applied in the field of communication, can solve time-consuming and difficult problems, and achieve the effect of large key space and high security

Active Publication Date: 2020-09-11
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF10 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to obtain good encryption performance, the manual design process is difficult and time-consuming work, which requires not only professional information security knowledge, but also prior knowledge of mathematical theory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method based on deep learning generative adversarial network
  • Key generation method based on deep learning generative adversarial network
  • Key generation method based on deep learning generative adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0054] Nowadays, deep learning algorithms have been widely used in the security field, but there are still a few researches on using deep learning algorithms to realize key generation. This application utilizes the current research hotspot of deep learning—generative adversarial network to realize key generation. By referring to the idea of ​​image-to-image translation in deep learning and combining key generation methods, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secret key generation method based on a deep learning generative adversarial network, and the method comprises the steps: firstly preparing a training set image; constructinga key generation network: constructing the key generation network according to a generator network and a discriminator network, and inputting the training set image into the key generation network; and training a key generation network: training the key generation network by using a deep learning method to generate a key. The secret key generated by the method has the characteristics of large secret key space, pseudo randomness, one-time pad and sensitivity to an initial value. The method is one of the earliest researches of trying to adopt a deep learning method in the field of key generation, and the generated key is used for encrypting the plaintext medical image, so that relatively high security can be brought.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a key generation method based on deep learning to generate an adversarial network. Background technique [0002] According to the different ways of encrypting plaintext, cryptosystems can be divided into block ciphers and stream ciphers. Traditional block key encryption methods such as Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA) and Advanced Encryption Standard (AES) have been widely used in image encryption. Compared with block ciphers, stream ciphers have the advantages of high security, fast encryption and decryption speed, small error expansion, good synchronization, and low implementation cost. For stream ciphers, the core issue is the design of stream cipher generators. The strength of stream ciphers depends entirely on the randomness and unpredictability of the sequences generated by the stream cipher generators. At pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06N3/04G06N3/08
CPCH04L9/0863H04L9/0891G06N3/084G06N3/045G16H30/20G16H10/60H04L9/0656G06N3/088G06N3/0418G06N3/047H04L9/0869
Inventor 丁熠谭富元秦臻曹明生陈大江邓伏虎秦志光朱桂钦
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products