Key generation method based on position uniqueness information

A key generation and unique technology, applied in the key field, can solve the problems of low key cost, difficult key distribution and management, and immaturity, and achieve the effect of short running time, increased complexity, and resistance to dictionary attacks

Active Publication Date: 2021-08-06
HARBIN INST OF TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing mature security mechanism is cryptography based on computing systems. However, with the development of science and technology and the increase of communication equipment, some disadvantages of traditional cryptography are gradually emerging. For example, the cost of decrypting keys is getting lower and lower. Access devices make key distribution and management particularly difficult, etc.
However, research in fields such as quantum security and physical layer security is still in its infancy and immature.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method based on position uniqueness information
  • Key generation method based on position uniqueness information
  • Key generation method based on position uniqueness information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0057] Table 1 is a statistical table of the initial value of the Logistic map changing with the time-varying factor. It can be seen that when the time-varying factor changes linearly, the generated random initial value changes irregularly and completely randomly. Under the same conditions, it can be guaranteed that the Logistic chaotic sequence generated by using the initial value is completely random, thereby ensuring the disorder of the filling method, which is beneficial to the MD5 algorithm to resist dictionary attacks.

[0058]

[0059]

[0060] Table 1 Logistic mapping initial value and time factor change result table

[0061] Table 2 and image 3 Respectively reflect the change result of the generated key with the time factor. It can be found from the table that when the time factor changes linearly from 70 to 79, the generated key changes irregularly and completely randomly; image 3 It reflects the key results generated by changing the time factor in repeated...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key generation method based on position uniqueness information, which is improved on the basis of a hash function, and when the hash function fills input information, a chaotic sequence is introduced, an MD buffer area is initialized, and messages are processed by taking groups as units. The information filled each time can be randomly changed along with the change of the input positioning information, so that the defect that a hash function is easily attacked by a dictionary is effectively avoided; meanwhile, a plurality of control parameters are introduced, the change space of a key is increased, and the security of a key generation algorithm and the randomness of the generated key are improved; according to the method, the structure of the MD5 algorithm is not changed too much, so that the properties of irreversibility, initial value sensitivity and the like of the original MD5 algorithm still exist, the complexity of the improved algorithm is not obviously improved, and the operation time is relatively short.

Description

technical field [0001] The invention belongs to the field of keys, and in particular relates to a key generation method based on location uniqueness information. Background technique [0002] Communication security is related to many aspects such as military defense, national economic lifeline, society and personal privacy, and is particularly important in today's information society. The existing mature security mechanism is cryptography based on computing systems. However, with the development of science and technology and the increase of communication equipment, some disadvantages of traditional cryptography are gradually emerging. For example, the cost of decrypting keys is getting lower and lower. Access devices make key distribution and management particularly difficult. However, research in fields such as quantum security and physical layer security is still in its infancy and immature. For the future air-space-ground communication network, the communication securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0816H04L9/0643H04L9/001
Inventor 孟维晓闫富朝韩帅罗晓萌
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products