Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Chaotic cipher production method under limited precision

A technology of chaotic ciphers and generation methods, applied in secure communication, digital transmission systems, secure communication devices, etc., can solve problems such as characteristic degradation, achieve the effect of reducing correlation, reducing the degree of cross-correlation, and increasing linear complexity

Inactive Publication Date: 2004-12-22
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to overcome the above disadvantages and provide a digital chaotic cryptographic system, which effectively solves the above-mentioned characteristic degradation problem without increasing the calculation accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaotic cipher production method under limited precision

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0020] The chaotic map in this method is a simple one-dimensional logistic iterative

[0021] x i + 1 = 1 - 2 x i 2 ; x i ⋐ ( - 1,1 ) - - - ( 1 )

[0022] calculating x i + 1 = 1 - 2 x i 2 , because the input value for the next iteration is still 64 bits, but x i 2 is 128 bits, so x must be i 2 For rounding, this method adopts the tail removal method. (Explanation of the rounding method).

[0023]...

example 2

[0047] The following method can also be used to increase the period and linear complexity of the digital chaotic sequence: use the method of cyclic shift to exchange the iterative values ​​of different bases, and then perform iterative calculation. Its algorithm is described as follows:

[0048] (1) Randomly generate the initial value m of the output control rule 0 and the initial value of the chaotic system

[0049] x l [0], (1=1, 2, ... 8), select 8 bases 12, 13, 14, 15, 28, 29, 30 and 31;

[0050] (2)x j [i]=x l [i], j=l+1, (l=1,2,...7), when l=8, j=1;

[0051] (3) by x j [i] According to the chaotic map x i + 1 = 1 - 2 x i 2 Use different base calculations to generate chaotic map output x j [i+1](j=1, 2, ... 8);

[0052] (4) Put x in different bases j [i+1] converted to...

example 3

[0059] Since the existing microprocessors and hardware arithmetic units are based on binary calculations, FPGA technology must be used to implement M-ary arithmetic operations when implementing M-ary digital chaotic mapping in Example 1. The design of the multiplier requires Lots of hardware resources. However, the existing binary-based hardware multipliers are quite mature in design method and quite optimized in algorithm. If the existing binary-based hardware multiplier and M-ary operation can be combined, then hardware resources can be reduced while reducing design difficulty.

[0060] Therefore, binary calculations can be used in the calculation of the chaotic map, and then the obtained result x k+1 Convert to M-ary number x' k+1 , and then the M-ary number x′ k+1 convert to binary x" k+1 .

[0061] Because the carry rule of the N-ary system is different from that of binary, the rounding precision and binary are also different when performing rounding processing, so u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a generating method for chaotic cipher in limited precise. The steps are: (1) initialization: generates in random or sets the initial value x1[i] (i=0; l=1, 2... n,) of the chaotic system, and sets with K kinds of variable carrying rules, k is equal or less than n; (2) the chaotic system output x j[i] (j=1, 2... n) correspondent to the carrying rule can be acquired with the K kinds of variable carrying rules according to the input xl [i]; (3) the outputs of different carrying rule x j [i] are converted into value with the same carrying rule x' j [i]; (4) the x' j[i] is coded according to the set coding rule and acquires x'' j[i]; (5) the n chaotic coding series x'' j [i] are arranged into M xi= M xi (I, j)=x'' j[i], xi=1, 2, ...; (6) xl [i+1]=x j[i] according to the set rule; (7) I=i+1, returns to the step (2), till the task is completed. The invention can reduce the correlation of series, increases the linear complexity, thus the chaotic series may has excellent performance.

Description

technical field [0001] The present invention belongs to the cipher generation technology in information security, specifically a chaotic cipher generation method under limited precision, which utilizes electronic computer technology, information coding technology and chaotic system to adopt multi-ary systems under the condition of limited precision. Computational techniques produce chaotic cipher sequences with excellent properties. Background technique [0002] With the continuous improvement of computer computing speed and the development of distributed processing technology, some original encryption algorithms have been cracked. At present, most of the encryption algorithms used in China are low-strength encryption algorithms that will be eliminated abroad. The resulting insecurity has become an important issue that hinders economic development and threatens national security. [0003] In recent years, chaos has begun to be applied in the field of encrypted communicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04K1/00H04L9/00
Inventor 胡汉平吴晓刚王祖喜曾江卫刘双红许娅
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products