Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Public key cipher encrypting and decrypting method based on nerval network chaotic attractor

A chaotic attractor and public key cryptography technology, which is applied in the field of public key cryptography encryption and decryption based on neural network chaotic attractors, can solve the problems of large amount of calculation, increased difficulty and difficulty in key management, and achieve high security, Conducive to the control of confidential information, the effect of fast encryption speed

Inactive Publication Date: 2006-12-20
JIMEI UNIV
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the RSA public-key cryptographic algorithm has two insurmountable shortcomings. One is that the security of the algorithm depends on the difficulty of factorization. With the development of computer technology and number theory, the decomposable factors are getting larger and larger. Therefore, the Algorithms can only improve computing security by increasing the length of the key. The increase in the length of the key will bring many new problems, such as increasing the difficulty of key management, sharply reducing the key space, and further reducing the speed of encryption and decryption, etc. ; The second main disadvantage is that the speed of encryption and decryption is relatively slow. Because there are many large exponent operations and modulo operations in the algorithm, the calculation amount is relatively large, so the speed of data encryption and decryption is relatively slow. At present, the fastest is only 45.8 kbps, such an encryption speed is difficult to meet the real-time requirements in the secure communication of the next generation Internet
Compared with RSA, the elliptic curve public key cryptography algorithm that has been studied more recently, although it can use a shorter key to achieve the security effect of a longer RSA key, but it still has a large amount of calculation, data encryption speed and decryption. The speed is relatively slow, and the problem of how to effectively encode the information data that needs to be encrypted into points on the elliptic curve has not been solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key cipher encrypting and decrypting method based on nerval network chaotic attractor
  • Public key cipher encrypting and decrypting method based on nerval network chaotic attractor
  • Public key cipher encrypting and decrypting method based on nerval network chaotic attractor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] One, encryption and decryption method of the present invention:

[0020] The present invention is a kind of public key cryptographic encryption and decryption method based on neural network chaotic attractor, comprising the following steps:

[0021] Step 1: Key Generation and Distribution

[0022] A group of users who need to communicate securely share a carefully selected synaptic connection matrix T 0 , the users in the group should jointly determine an ideal plaintext encoding and decoding method, that is, the encoding matrix M. Each user randomly selects a different transformation matrix in the nth-order square matrix exchange family, for example, the H selected by user i i , calculate T i =H i T 0 h i ′ and its corresponding chaotic attractor set (according to formula 1), the H i secrecy, while the T i public. Then each user saves his own public key and its corresponding chaotic attractive subset, together with other information such as user name and addre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a public key code encrypt method, based on neural net chaotic attractor, which comprises: inputting key, coding attractor, coding clear text and generating ciphertext. Since the safety of said invention is based on the decomposition hardness of high-order singular matrix, but not based on the decomposition hardness of single large number factor as RSA method, it has high safety, high encrypt speed, and the applications in modern group encrypted communication and business encrypted communication.

Description

technical field [0001] The invention relates to the technical field of information encryption, in particular to a public key encryption and decryption method based on a neural network chaotic attractor. Background technique [0002] The Internet (Internet) has developed vigorously in the past 30 years and has become the main way for people to exchange information. Many sensitive information, including business secrets, military secrets and personal confidential information, need to be transmitted quickly and conveniently through the Internet, which puts forward higher requirements for the security of network communication. [0003] The security of modern network communication is mainly based on cryptography. Among them, compared with the symmetric cryptosystem, the public key cryptosystem has the main advantages of convenient password management and fewer keys. Since Diffie W and Hellman M proposed the idea of ​​public key cryptosystem in 1976, many public key cryptographi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/28H04L9/30H04L9/08G06F17/00
Inventor 刘年生郭东辉
Owner JIMEI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products