Symmetric key encryption method based on deterministic particle evolution simulation system

A technology of symmetric key encryption and particle system, which is applied in the field of symmetric key encryption, can solve problems such as chaos and inability to encrypt, and achieve the effects of increasing the difficulty of cracking, improving decryption efficiency, and ensuring security

Pending Publication Date: 2021-05-25
INST OF PROCESS ENG CHINESE ACAD OF SCI
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The similarity between chaos and cryptography inspires people to apply chaos to the field of cryptography, but there are also differences between chaos and cryptography: cryptographic systems work on finite discrete sets, while chaos works on infinite continuous real number sets , so chaos cannot be directly used for encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetric key encryption method based on deterministic particle evolution simulation system
  • Symmetric key encryption method based on deterministic particle evolution simulation system
  • Symmetric key encryption method based on deterministic particle evolution simulation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make those skilled in the art understand the core idea of ​​the present invention more clearly, it will be described in detail below with reference to the accompanying drawings.

[0032] Such as figure 1 As shown, a symmetric key encryption method based on a deterministic particle evolution simulation system includes the following steps:

[0033] Step 1, randomly generate a particle system.

[0034] It should be noted that the particle system can be randomly generated by the computer, run the particle system to reach the relaxation state, and then send the relaxation state information to the encryption party and the decryption party respectively in advance, such as figure 1 As shown, the encryption party initializes the particle system according to the relaxation state information to obtain the first particle system, and the decryption party initializes the particle system according to the relaxation state information to obtain the second particle system. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security, and discloses a symmetric key encryption method based on a deterministic particle evolution simulation system. The method comprises the steps: an encryption party initializing a particle system according to relaxation state information of the particle system, recording the particle system as a first particle system, setting the transmission attribute of particles of corresponding coordinates in the first particle system as true according to a matrix of a to-be-encrypted plaintext, running the first particle system for a plurality of steps, evolving to random distribution of ciphertext information, and forming a key by the running steps of the first particle system and relaxation state information, wherein the ciphertext is a coordinate corresponding to a particle of which the transmission attribute is set to be true. According to the method, symmetric encryption is realized through the pre-distributed relaxation state particle system information and the operation step number, any information such as characters, numbers and symbols can be directly encrypted, and the information is hidden in the transmitted particle system information, so that information disguising and hiding are realized.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a symmetric key encryption method based on a deterministic particle evolution simulation system. Background technique [0002] Computer network has become the infrastructure of human social life, but the controllability of data transmission in the network is poor, and there is a problem that information is easy to leak, and the security and confidentiality of information is becoming more and more important. With the development of cryptography, many encryption algorithms have appeared, such as private key encryption algorithm DES (Data Encryption Standard), IDEA (International Data Encryption Algorithm), AES (Advanced Encryption Standard) and public key encryption algorithm RSA (RSA algorithm) and El Gamal (ElGamal encryption algorithm) and so on. However, random garbled characters after encryption will also attract the attention of attackers, so information camoufl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F30/25
CPCG06F21/602G06F30/25
Inventor 葛蔚祝爱琦
Owner INST OF PROCESS ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products