CN106788965B - Digital chaotic cipher method based on chaotic number spectrum - Google Patents
Digital chaotic cipher method based on chaotic number spectrum Download PDFInfo
- Publication number
- CN106788965B CN106788965B CN201710101736.1A CN201710101736A CN106788965B CN 106788965 B CN106788965 B CN 106788965B CN 201710101736 A CN201710101736 A CN 201710101736A CN 106788965 B CN106788965 B CN 106788965B
- Authority
- CN
- China
- Prior art keywords
- chaotic
- key
- codes
- mapping
- parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000000739 chaotic effect Effects 0.000 title claims abstract description 154
- 238000000034 method Methods 0.000 title claims abstract description 102
- 238000001228 spectrum Methods 0.000 title claims abstract description 32
- 238000013507 mapping Methods 0.000 claims abstract description 101
- 238000012545 processing Methods 0.000 claims abstract description 15
- 230000010365 information processing Effects 0.000 claims abstract description 13
- 230000006870 function Effects 0.000 claims description 22
- 238000012546 transfer Methods 0.000 claims description 15
- 238000007906 compression Methods 0.000 claims description 14
- 230000006835 compression Effects 0.000 claims description 14
- 230000008569 process Effects 0.000 claims description 12
- 230000004044 response Effects 0.000 claims description 11
- 230000000737 periodic effect Effects 0.000 claims description 7
- 238000004088 simulation Methods 0.000 claims description 7
- 238000000354 decomposition reaction Methods 0.000 claims description 6
- 230000002441 reversible effect Effects 0.000 claims description 5
- 230000000670 limiting effect Effects 0.000 claims description 3
- 230000002195 synergetic effect Effects 0.000 claims description 2
- 230000000712 assembly Effects 0.000 claims 2
- 238000000429 assembly Methods 0.000 claims 2
- 238000004891 communication Methods 0.000 abstract description 11
- 239000013307 optical fiber Substances 0.000 abstract description 3
- 238000013461 design Methods 0.000 description 12
- 239000011159 matrix material Substances 0.000 description 8
- 230000007547 defect Effects 0.000 description 6
- 125000004122 cyclic group Chemical group 0.000 description 4
- 238000013144 data compression Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000002156 mixing Methods 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 238000003756 stirring Methods 0.000 description 3
- 230000007704 transition Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 2
- 238000006731 degradation reaction Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 229910000838 Al alloy Inorganic materials 0.000 description 1
- 238000003723 Smelting Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 239000003814 drug Substances 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 239000000945 filler Substances 0.000 description 1
- FWBUWJHWAKTPHI-UHFFFAOYSA-N icosanal Chemical compound CCCCCCCCCCCCCCCCCCCC=O FWBUWJHWAKTPHI-UHFFFAOYSA-N 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/25—Arrangements specific to fibre transmission
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention relates to a digital chaotic cipher method based on chaotic number spectrum, which comprises the following steps: the method comprises the following steps: transmitting encoded plaintext data and converting the plaintext data into binary array codes; step two: discretizing and mapping the binary array code obtained in the step one into chaotic code; step three: fuzzification mapping is carried out on the chaotic codes obtained in the step two through a key parameter K to form sequence number codes; step four: constructing ciphertext data by the sequence number codes obtained in the third step; step five: and D, transmitting the ciphertext data obtained in the step four to a receiver through an open channel. The cryptographic method has the signal covering function of the spread spectrum code mapping property characteristic and the parallel data processing function of the parallel chaotic mapping, has better security performance and information processing efficiency than the modern cryptographic system, and is more suitable for optical fiber communication.
Description
Technical Field
The invention belongs to the field of information security, particularly relates to the field of secret communication of computer data, and particularly relates to a chaos spectrum-based digital chaotic cryptographic method.
Background
Globalization and publicization of computer networks make information security face a huge threat, forcing cryptographic technology to become a core technology for guaranteeing information security. The cryptographic technology is a subject for guaranteeing the realization of secret communication by hiding plaintext information through character transformation, and the research object is an information storage body. In a cryptographic system, plaintext M refers to an unencrypted message; ciphertext C refers to an encrypted message; the key K refers to a character conversion means between a plaintext and a ciphertext. The process of converting the plaintext into the ciphertext is called encryption or coding E; the process of transforming the ciphertext into plaintext is referred to as decrypting or decoding D. The cipher is divided into symmetrical cipher system and asymmetrical cipher system based on the property of cipher key, the former is one cipher system with shared cipher key for enciphering and deciphering and the latter is one cipher system with public key for enciphering and private key for deciphering.
In the data encryption method in the market at present, for the requirement of confidentiality, data mostly needs a secret channel for transmission, but cannot be transmitted on a public channel. Some encryption methods can be easily cracked through a statistical or exhaustive method, and a key is always unchanged in the process, and the length of the key directly and indirectly influences the encryption and decryption speed, so that the encryption method cannot adapt to a complex computer network environment.
Chinese patent application No. 201410006219.2 discloses a digital and text encryption and decryption method. The encryption method is essentially a connection type coding method for realizing 'number-to-analog conversion' through 5-point coil coding, firstly, a decimal number spectrum is adopted to be suitable for constructing an access control mechanism and is equivalent to a 0-9 numeric keyboard with connection and click-dial functions; and secondly, a binary number spectrum is adopted to be suitable for constructing a security authentication protocol, 5 pairs of 01 codes in the binary number spectrum present self-similarity fraction fractal structural characteristics, and the chaotic coding block cipher scheme meets the cycle 3 condition, namely has a chaotic encryption function. The chaos coding method is difficult to adapt to the computer data encryption field of 'number-to-number conversion' because of the technical defects of the difficulty of coincident code coding of 5-point circle coding, the difficulty of limitation of 10-number key length and the like.
Disclosure of Invention
In order to solve the above problems, the present invention provides a digital chaotic cipher method based on chaotic number spectrum. The cryptographic method has the signal covering function of the spread spectrum code mapping property characteristic and the parallel data processing function of the parallel chaotic mapping, has better security performance and information processing efficiency than the modern cryptographic system, and is more suitable for optical fiber communication.
In order to achieve the purpose, the invention adopts the following technical scheme:
the method comprises the following steps:
a digital chaotic cipher method based on chaotic number spectrum, the cipher method includes the following steps:
the method comprises the following steps: transmitting encoded plaintext data and converting the plaintext data into binary array codes;
step two: discretizing and mapping the binary array code obtained in the step one into chaotic code;
step three: fuzzification mapping is carried out on the chaotic codes obtained in the step two through a key parameter K to form sequence number codes;
step four: constructing ciphertext data by the sequence number codes obtained in the third step;
step five: transmitting the ciphertext data obtained in the step four to a receiver through a public channel;
step six: inversely converting the ciphertext data obtained in the fifth step into serial number codes;
step seven: and C, mapping the serial number codes in the step six into chaotic codes in an inverse mode.
The chaotic code has a single shot property and a diversified information coding property, and is realized according to the self-similarity indistinguishability of periodic elements with the period of 3 times; the serial number code has bijection property and diversified information simulation property, and is realized according to the existence uniqueness of the single-cycle element; the chaotic parameter modulation K of chaotic coding and the random parameter modulation K of serial number coding respectively occupy half group property and torus self-isomorphic property.
Wherein the discretization mapping is a 1-pair multi-forward and stochastic discretization mapping; the fuzzification mapping and the chaotic inverse mapping are 1-to-1 isomorphic mappings. The chaotic mapping of the coupled discretization mapping and the fuzzification mapping has the property of spread spectrum code mapping; the chaotic inverse map has a topology compression mapping property. The chaotic mapping constructed by the chaotic code 0000011111 and the serial number code 0123456789 is the spread spectrum code mapping property of single-value input single-value output, and the chaotic inverse mapping is the topology compression mapping property of single-value input single-value output; chaotic mapping constructed by the chaotic code 0000011111 and the serial number 0000-1001 is the spread spectrum code mapping property of single-value input and multi-value output, and chaotic inverse mapping is the topology compression mapping property of multi-value input and single-value output. The isolated part 0101010101 in the serial number coding is of a single-shot nature due to the fact that the nature of the isolated part belongs to chaotic coding.
The second method comprises the following steps:
a digital chaotic cipher method based on chaotic number spectrum, the cipher method includes the following steps:
the method comprises the following steps: sending a coded plaintext sequence, and converting the plaintext sequence into a binary array code;
step two: discretizing and mapping the binary array code obtained in the step one into chaotic code;
step three: fuzzification mapping is carried out on the chaotic codes obtained in the step two through a key stream parameter K to form sequence number codes;
step four: constructing a cipher text sequence by the sequence number codes obtained in the step three;
step five: transmitting the ciphertext sequence obtained in the step four to a receiver through an open channel;
step six: inversely converting the ciphertext sequence obtained in the fifth step into a serial number code;
step seven: and C, mapping the serial number codes in the step six into chaotic codes in an inverse mode.
The third method comprises the following steps:
a digital chaotic cipher method based on chaotic number spectrum, the cipher method includes the following steps:
the method comprises the following steps: transmitting a coded block plaintext and converting the block plaintext into a binary block code;
step two: discretizing and mapping the binary array code obtained in the step one into chaotic code;
step three: fuzzification mapping is carried out on the chaotic codes obtained in the step two through a round key parameter K to form sequence number codes;
step four: constructing a grouping ciphertext by the sequence number codes obtained in the step three;
step five: transmitting the packet ciphertext obtained in the step four to a receiver through an open channel;
step six: inversely converting the packet ciphertext obtained in the fifth step into a serial number code;
step seven: and C, mapping the serial number codes in the step six into chaotic codes in an inverse mode.
The block cipher text can be subjected to information camouflage of black box simulation properties by adopting a grafting type coding assembly and the like.
The method four comprises the following steps:
a digital chaotic cipher method based on chaotic number spectrum, the cipher method includes the following steps:
the method comprises the following steps: sending a coded plaintext sequence, and converting the plaintext sequence into a binary array code;
step two: mapping the binary array codes obtained in the step one into first-level chaotic codes sequentially through first-level discretization, and then fuzzifying and mapping the binary array codes into first-level serial number codes through the driving variable of the n-run filter;
step three: mapping the serial number codes obtained in the second step into second-level chaotic codes through second-level discretization, and then mapping the serial number codes into second-level serial number codes through fuzzification of the driving variables of the n-run filter; the second-level serial number coding adopts a second subsystem component of a double-structure mapping parameter to generate 0-9 response variables;
step four: constructing a true random number by the second-level serial number code obtained in the step three;
step five: and using the true random number obtained in the step four as a key K modulation parameter.
The method five comprises the following steps:
a digital chaotic cipher method based on chaotic number spectrum, the cipher method includes the following steps:
the method comprises the following steps: transmitting a coded block plaintext and converting the block plaintext into a binary block code;
step two: carrying out chaotic inverse mapping on the binary array code obtained in the step one to obtain chaotic codes;
step three: taking 4 groups of chaotic codes obtained in the step two as units, and performing cyclic iterative inverse mapping on a single key parameter K or a round key parameter K to obtain chaotic codes;
step four: constructing a message abstract by the chaotic code obtained in the step three;
step five: and transmitting the message abstract and the message obtained in the step four to a receiver through a public channel.
The method six:
a digital chaotic cipher method based on chaotic number spectrum, the cipher method includes the following steps:
the method comprises the following steps: transmitting a coded block plaintext and converting the block plaintext into a binary block code;
step two: discretizing and mapping the binary array code obtained in the step one into chaotic code;
step three: fuzzification mapping the chaotic code obtained in the step two into a sequence number code through a key parameter K of open-loop control or closed-loop control;
step four: constructing a grouping ciphertext by the sequence number codes obtained in the step three;
step five: transmitting the packet ciphertext obtained in the step four to a receiver through an open channel;
step six: inversely converting the packet ciphertext obtained in the fifth step into a serial number code;
step seven: and C, mapping the serial number codes in the step six into chaotic codes in an inverse mode.
The key parameter K is a character-by-character key stream parameter drive generation character-by-character block single key parameter characteristic; the key parameter K of the closed-loop control can realize the functions of key transfer compression and key transfer decomposition of lossless data by unrelated transfer sub-keys K1, K2, K3 and … … and performing at least 3 rounds of forward iterative encryption aiming at encryption keys; the transfer sub-keys K1, K2 and K3 are constructed by true random numbers or are obtained by carrying out Hash function operation on an original key K through multiple rounds of reverse iteration; wherein the key transfer compression and key transfer decomposition methods can be used independently. The closed-loop control packet cipher text can adopt a grafting type coding component and the like to realize the information disguising function of black box simulation property.
The invention has the following beneficial effects:
1. the invention solves the problem of recoding coding in the prior art, and has the advantages that the aliasing effect of discrete mapping and folding mapping is realized between the homoclinic tracks of 0 pole and 1 pole of a continuous 01 input signal, and the intrinsic mixing characteristic of an output signal is realized between the heteroclinic tracks of the discrete mapping and the folding mapping. The invention has the intrinsic mixing characteristic of enabling continuous 01 input signals to realize aliasing effect in the chaotic mapping process of the nonlinear circuit technical scheme, and generates decimal output signals in aliasing and mixing interleaving states.
2. The invention solves the problem of limitation of the length of 10 keys in the prior art, and realizes the diversified information coding of chaotic coding in the nonlinear space part of the digital chaotic code and the mapping parameter universality of diversified information simulation of serial number coding in the linear space part. Meanwhile, the encryption and decryption speed of the invention is irrelevant to the key length and the key period of the key system, and the key space can tend to infinity.
3. Compared with the number theory cryptosystem of modern cryptography: the method is characterized in that a mathematical cipher algorithm established in a fixed operation rule is used for realizing that one-time pad encryption completely depends on parameter variables of a key system, and the method is a cipher system for realizing related discrete encryption based on the parameter variables. The discrete half power of self-similarity discretization mapping in the nonlinear space part of the digital chaotic cipher has the one-time pad output characteristic of realizing single-key encryption, and is a cipher system for realizing unrelated discrete encryption based on state variables and parameter variables. Meanwhile, the chaotic logic calculation of the invention has the advantages of overcoming the technical defect of pseudo-random number generation of the linear feedback shift register LFSR in the prior art of mathematical arithmetic calculation; the semi-homomorphic collision compression law technical defects of modern Hash functions MD5 and SHA-1.
4. The digital chaotic cryptosystem has a signal covering function of spread spectrum code mapping property characteristics and a parallel data processing function of parallel chaotic mapping, has better security performance and information processing efficiency than the modern cryptosystem, and is more suitable for optical fiber communication. In a word, the method has the property of internally hiding the random number and perfects the defect that the linear password needs to adopt the random number to realize the externally-disturbed random externally-disturbed hiding.
Drawings
FIG. 1 is a schematic diagram of a model of the present general inventive concept;
FIG. 2 is a schematic view of a first embodiment of the present invention;
FIG. 3 is a schematic view of a second embodiment of the present invention;
FIG. 4 is a schematic view of a third embodiment of the present invention;
FIG. 5 is a schematic view of a fourth embodiment of the present invention;
FIGS. 6, 7a, 7b are schematic views of a fifth embodiment of the present invention;
fig. 8 is a schematic diagram of a method for realizing the grafting type coding by using the block cipher text.
Detailed Description
The present invention is further illustrated in detail below with reference to specific examples:
referring to fig. 1, there is shown a schematic view of a model of the present general inventive concept. The general flow of the cipher method comprises the following steps that plaintext data is converted into chaotic codes through discretization mapping, the chaotic codes are converted into serial number codes through key parameter K fuzzification mapping, and then the serial number codes are constructed into cipher text data; the ciphertext data can be reversely converted into sequence number codes and then converted into chaotic coded plaintext data through corresponding key parameter K chaotic inverse mapping.
The first embodiment is as follows: referring to fig. 2, a digital chaotic cipher method based on chaotic number spectrum includes the following steps and embodiments:
the method comprises the following steps: sending a coded plaintext sequence, and converting the plaintext sequence into binary array codes 0 and 1;
step two: discretizing and mapping the binary array codes 0 and 1 obtained in the step one into chaotic codes 0000000001;
step three: fuzzification mapping is carried out on the chaotic code 0000000001 obtained in the step two through a key stream parameter K to obtain a sequence number code 0123456789;
step four: constructing a ciphertext sequence by encoding the serial number 0123456789 obtained in the step three;
step five: transmitting the ciphertext sequence obtained in the step four to a receiver through an open channel;
step six: inversely converting the ciphertext sequence obtained in the fifth step into serial number codes of 0-9;
step seven: and C, mapping the serial number codes 0-9 in the step six into chaotic codes 0 and 1 in an inverse mode.
The key stream parameter K is modulated by a chaotic parameter modulation standard of an n-run filter, for example, the key stream parameter K is modulated by a 10-run filter for 10 key lengths, the 10-run filter plays a role of limiting 0 and 1 continuous runs within 10 numbers in the key stream parameter K with one-time pad and continuous aperiodic, specifically, the 10 bits 0, 1 and 1 of 0 and 1 continuous runs are subjected to exclusive or such as 0 ⊕ 1=1 and 1 ⊕ 1=0 to change the driving signal property of the key stream parameter K so as to ensure that a mapping channel of a nonlinear track exists at least in a 0-pole and a 1-pole model, b, an information processing mode is adopted, 1bit key character K in the key stream parameter K is switched every time, the mapping channel is used for processing the character sequence of a 1-bit (1-number) message or the decryption character sequence of the 1-bit (1-number) message or the mapping sequence is designed according to the chaotic encryption sequence, the serial data stream and the synchronous stream coding structure is designed according to the chaos of the chaotic encryption sequence code.
Example two: referring to fig. 3, a digital chaotic cipher method based on chaotic number spectrum includes the following steps and embodiments:
the method comprises the following steps: transmitting a coded block plaintext, and converting the block plaintext into binary block codes 0 and 1;
step two: discretizing and mapping the binary array codes 0 and 1 obtained in the step one into chaotic codes 0001111111;
step three: fuzzification mapping is carried out on the chaotic code 0001111111 obtained in the step two through a round key parameter K to obtain a serial number code 0123456789;
step four: constructing a packet ciphertext by encoding the serial number 0123456789 obtained in the step three;
step five: transmitting the packet ciphertext obtained in the step four to a receiver through an open channel;
step six: inversely converting the packet ciphertext obtained in the step five into serial number codes of 0-9;
step seven: and C, mapping the serial number codes 0-9 in the step six into chaotic codes 0 and 1 in an inverse mode.
The specific implementation mode is as follows: as shown in fig. 3, the method of this embodiment is to solve the problem of short period effect of the round key parameter K and the problem of limited precision of the single key parameter K, and is suitable for an asynchronous communication scheme in a static encryption situation, and has a secret communication function and an application field substantially the same as those of a modern block cipher. Wherein, a, parameter modulation mode: the single key parameter k modulation standard meeting the period 3 multi-layer key is adopted, for example, in the embodiment, chaotic parameters of 3 0 and 7 1 keys or 7 0 and 3 1 keys, 4 0 and 6 1 keys or 6 0 and 41 keys, 5 0 keys and 5 1 keys are adopted for 10 key lengths to modulate, so that the 0 pole and the 1 pole of the model both meet the mapping channel of at least 3 nonlinear bifurcation tracks. The round key parameter K is a dynamic parameter of a mixed period 3 multi-layer key, because the round key parameter K is composed of a limited plurality of single key parameters K. The dynamic parameter refers to a period 3 multi-layer key, e.g., 3 randomly arranged combinations of 0 and 7 1; b. an information processing mode: the round key parameter K is connected end to form a periodic cycle driven O-shaped limit ring, and a group of 10-bit (10-number) packet messages are processed by adopting a 10-bit single key parameter K of each switching 1 group, namely, the encrypted or decrypted block-by-block parallel data processing is carried out, for example, in the embodiment K0-K9, the matrix input c 0-c 9 → the matrix output c '0-c' 9 is carried out in a parallel chaotic mapping process; c. and (4) safety design: aiming at the problem of limited precision of a single key parameter k, a key parameter measure in a hidden plaintext and ciphertext pair is realized by adopting a first re-pre-encryption method. Specifically, different key data of the same single key parameter k 0-k 9 are adopted for inputting 0 and 1 block of plaintext, for example, a first repeated parallel exclusive-or operation of matrix input m 0-m 9 → matrix output c 0-c 9 is realized by adopting an agreed key { k9k8k7k1k0k 1k7k8k9} in a model, so as to prevent the selected plaintext attack identified by the key parameter; aiming at the problem of short period effect of the round key parameter K, a key period measure of hiding the round key parameter K in the ciphertext data C is realized by adopting message groups with variable lengths. Specifically, several groups of 0, 1 packets of indefinite length are randomly added to the plaintext, e.g., 6-bit … … 8bit … … 7bit irregular cyclic packets, to prevent the exhaustion attack of regular message packets, and the packet length of the message packet is indicated in the corresponding single-key parameter k, e.g., k01=0001111111 (6), where 6 indicates that the message packet length of the single-key parameter k01 is 6 bits.
Example three: referring to fig. 4, a digital chaotic cipher method based on chaotic number spectrum includes the following steps and embodiments:
the method comprises the following steps: sending a coded plaintext sequence, and converting the plaintext sequence into binary array codes 0 and 1;
step two: mapping the binary array codes 0 and 1 obtained in the step one into first-level chaotic codes 0000000001 through first-level discretization in sequence, and then fuzzifying and mapping the binary array codes into first-level serial number codes 0101010101 through the driving variable of the n (10) run filter;
step three: mapping the serial number code 0101010101 obtained in the step two into a second-level chaotic code 0000000001 through second-level discretization, and then mapping the serial number code into a second-level serial number code 0101010101 through fuzzification of the driving variable of the n (10) run filter; a second subsystem component of which the second-level serial number codes adopt double-structure mapping parameters can generate a 0123456789 response variable;
step four: constructing a true random number by using the second-level serial number code 0101010101 or 0123456789 obtained in the step three;
step five: and using the true random number obtained in the step four as a key K modulation parameter.
The specific implementation mode is as follows: as shown in fig. 4, the method of this embodiment is to solve the problem of periodic chaotic degradation, to realize continuous and stable self-sustaining chaotic power, and has basically the same application field as the linear feedback shift register LFSR, and to solve the technical defect of pseudo random number generation. Wherein, a, the design principle: adopting the parameter modulation mode and the information processing mode of the first embodiment; the feedback control of the state variable is adopted to realize self-holding chaotic power, which means that a response variable generated by a response system is introduced into a driving system to serve as a driving variable, and an input system is introduced to serve as an input variable to realize a synergistic effect principle of the state variable on a parameter variable; b. the design idea is as follows: the dual-system control of state variables is adopted, which means that discrete half power of a nonlinear space part in a digital chaotic system is controlled by the dual systems, and continuous and stable self-sustaining chaotic power is realized. Specifically, a first-stage subsystem and a second-stage subsystem in the model respectively adopt independent pulse disturbance schemes, and drive variables of the two-stage subsystems in state feedback are subjected to exclusive-or operation to synthesize new power serving as input variables of the first-stage subsystem. -design purposes: one double-system control method comprises the steps that any one-level subsystem is kept in a discretization state of continuous non-periodic motion, and finally generated response variables are true random sequences of one-time pad; the bixor operation variable solves the problem of continuous chaotic power when the two-stage subsystem enters a degradation state at the same time. c. Expanding design and application: the response variable generated by the model is 0 and 1 random number, the second-level subsystem of the model adopts a second-level subsystem component with double-structure mapping parameters, and the generated response variable is 0-9 random number. Particularly, double-structure mapping parameters of the component are used, and a binary system mapping parameter 010101 … … of the component is responsible for feedback control of state variables in the second-level subsystem to realize self-holding chaotic power; its icosanal mapping parameter 012345 … … or 012012 … … is responsible for generating true random response variables. When the mapping parameter is greater than or less than 10, the key length of the second-level subsystem and its n-run filter need to be adjusted accordingly. The product or the circuit is suitable for a parameter power system of a sequence password and a chaotic stirrer. In the application field, the decimal mapping parameters of the part are correspondingly replaced by other symbol elements or stirring elements such as stirring entities in the aspects of physics, chemistry, biology, medicine and the like, the stirring elements are fully stirred and finely mixed through digital chaotic power and corresponding equipment, and chaotic real objects with aliasing mixed structures with special practical significance, such as smelting aluminum alloy, can be realized.
Example four: referring to fig. 5, a digital chaotic cipher method based on chaotic number spectrum includes the following steps and embodiments:
the method comprises the following steps: sending a coded block plaintext, and converting the block plaintext into binary block codes 0000-1111;
step two: carrying out chaotic inverse mapping on binary array codes 0000-1111 obtained in the step one to obtain chaotic codes 0 and 1;
step three: taking 4 groups of chaotic codes 0 and 1 obtained in the step two as units, and performing cyclic iterative chaotic inverse mapping on a single key parameter K or a round key parameter K to obtain chaotic codes 0 and 1;
step four: constructing a message digest by the chaotic codes 0 and 1 obtained in the step three;
step five: and transmitting the message abstract and the message obtained in the step four to a receiver through a public channel.
The specific implementation mode is as follows: as shown in fig. 5, the method of this embodiment implements the abstract extraction principle of the message data M, and uses 4: 1 topology compression property, realizes parallel data compression processing of one-way irreversible and 4 times multiple grade decreasing rule by multiple rounds of reverse iteration, has the same lossy data compression function and application field as the modern Hash function, and simultaneously solves the technical defects of the semi-homomorphic collision compression rule problem in MD5 and SHA-1. Wherein, a, parameter modulation mode: the single key parameter K modulation standard and the round key parameter K modulation method of the second embodiment are adopted, and the difference lies in that the model has a key length of 16 numbers, that is, chaotic parameters of 3 0 and 13 1 or 13 0 and 3, … … 8 0 and 8 1 are adopted for modulation; b. an information processing mode: the word block-by-word block parallel data compression processing with 64-bit grouping information as a unit is adopted, for example, the parallel chaotic inverse mapping process of matrix input M00-M15 → matrix output M00-M15 in k 00-k 15 of the embodiment is divided into 2 flow steps. Step 1, an input message M is imported into a message M data frame by taking a 64-bit grouping message as a unit, a filler automatically adds 0 for completion when the data end is less than 64 bits, and a plurality of groups of abstracts M output after one-time continuous compression processing are stored in a temporary memory; step 2, the abstract M in the temporary memory is led into a data frame of the message M by taking 4 groups multiplied by the abstract M, namely 64-bit grouping messages as a unit, continuous and cyclic compression processing is carried out, and the abstract M with single value output is stored back in the temporary memory until the data volume of the abstract M in the memory is compressed to be in accordance with the extraction standard of the message abstract, for example, the fixed value limit range of the 256-bit standard of the message abstract is 16-19 groups of abstract M. Finally extracting a message abstract m; c. application design: the design idea of the chaotic Hash function is basically consistent with that of the modern Hash function, and the chaotic Hash function without a secret key and with the secret key is divided according to the fact that a fixed value of a single secret key parameter K and a dynamic value of a round secret key parameter K are used as secret key data. The information processing mode of the key chaotic Hash function is characterized in that round key parameters K are connected end to form a periodic cycle driven O-shaped limit ring, and 1 group of 64-bit grouping messages are processed by adopting parallel data compression processing of switching 1 group of 16-bit single key parameters K.
Example five: referring to fig. 6-7, a digital chaotic cipher method based on chaotic number spectrum, the cipher method includes the following steps and embodiments:
the method comprises the following steps: transmitting a coding block plaintext, and converting the block plaintext into binary block codes 00, 01, 10 and 11, wherein the high-dimensional system has the key length of 100, namely the block plaintext is 200 bits;
step two: discretizing and mapping the binary array codes 00, 01, 10 and 11 obtained in the step one into chaotic codes 00, 01, 10 and 11;
step three: fuzzifying and mapping the key parameters K of the chaotic codes 00, 01, 10 and 11 obtained in the step two through open-loop control or closed-loop control into sequence number codes 00-99;
step four: constructing a grouped ciphertext by encoding the serial numbers 00-99 obtained in the step three;
step five: transmitting the packet ciphertext obtained in the step four to a receiver through an open channel;
step six: inversely converting the packet ciphertext obtained in the fifth step into serial number codes 00-99;
step seven: and mapping the serial number codes 00-99 in the step six into chaotic codes 00, 01, 10 and 11 in an inverse mode.
The specific implementation mode is as follows: as shown in fig. 6-7, the key parameter K in the method of the present embodiment is divided into model designs for open-loop control and closed-loop control. The open-loop control model design is equal to the chaotic sequence cipher design in the embodiment, is suitable for a synchronous communication scheme in a real-time encryption occasion, and mainly solves the real-time communication problem of realizing parallel data dynamic encryption by a polynomial sequence, such as the multimedia data encryption of digital images and effective video frames; the model design of the second closed-loop control is equal to the second chaotic block cipher design of the embodiment, is suitable for the asynchronous communication scheme of a static encryption occasion, and mainly solves the asynchronous communication problem of realizing parallel data static encryption by a polynomial sequence, such as large data text encryption. A, parameter modulation mode: the embodiment adopts character-by-character key stream parameter driving to generate character-by-character block single key parameters K00-K99, and the key stream parameter K adopts a chaotic parameter modulation standard of a 10-run filter; b. an information processing mode: the method adopts 1bit key character K in each switching key stream parameter K to process the block-by-block parallel data processing of encryption or decryption of a group of 200bit (200 number) packet messages, such as the parallel chaotic mapping process of matrix input m 00-m 99 → matrix output c 00-c 99 in the embodiment K00-K99 in fig. 6, and the same principle as in fig. 7. In the encryption process of 0 and 1 block plaintext of the key stream parameter K of the closed-loop control shown in fig. 7a, the single key parameters K00-K99 driven in a connected manner are used for a first repeated parallel exclusive-or operation, the single key parameters K00-K99 driven in a truncated manner are used for a second repeated parallel chaotic mapping, and the decryption of 0-9 block ciphertexts is also in the same way and only in the reverse order; wherein the key flow parameter K of the closed-loop control shown in fig. 7a can pass through the unassociated transition subkeys K1, K2, K3 and … … shown in fig. 7b and perform at least 3 rounds of forward iterative encryption on the encryption keys, thereby realizing the functions of key transition compression and key transition decomposition of lossless data; the transfer sub-keys K1, K2 and K3 are constructed by true random numbers or are obtained by carrying out Hash function operation on an original key K through multiple rounds of reverse iteration; wherein the key transfer compression and key transfer decomposition methods can be used independently.
The specific implementation mode is that as shown in figure 8, the method of the embodiment is characterized in that a grafted coding component is used as an information carrier, and the symbol grafting function is used for realizing artwork information simulation and disguise of the constructed ciphertext data of figures 3 and 7a and constructing a non-linear authentication code, the method belongs to the same general invention concept with a digital document-loaded patent, the grafted coding component is designed according to the intermittent audio and sound segment rule of Morse code, specifically, ○ and 0 without sound representation and ● and 1 with sound representation, and is designed according to the linear-to-linear geometric theorem of a dot-dash line in long and short tones, the point in the 2-9 component represents 1 line 2, wherein a and the symbol grafting method is that the coding rule refers to the 0 and 1 grafted coding component as an independent code, the 2-9 grafted component as a vertical code and a hidden code or a hidden code, and a hidden code mark is designed according to the three-dimensional coding rule of a hidden mark, and a hidden mark code or a hidden mark is designed according to the three-dimensional coding rule of a hidden mark, a hidden mark code and a hidden mark are applied in the same direction, and a hidden mark code and a hidden mark is designed according to the three-dimensional code information hiding and a hidden mark.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent structural changes made by using the contents of the present specification and the attached drawings, or applied directly or indirectly to other related technical fields, are included in the scope of the present invention.
Claims (7)
1. A digital chaotic cipher method based on chaotic number spectrum is characterized in that: the cryptographic method comprises the following steps:
the method comprises the following steps: transmitting a coded block plaintext and converting the block plaintext into a binary block code;
step two: discretizing and mapping the binary array code obtained in the step one into chaotic code;
step three: fuzzification mapping is carried out on the chaotic codes obtained in the step two through a round key parameter K to form sequence number codes;
step four: constructing a grouping ciphertext by the sequence number codes obtained in the step three;
step five: transmitting the packet ciphertext obtained in the step four to a receiver through an open channel;
step six: inversely converting the packet ciphertext obtained in the fifth step into a serial number code;
step seven: mapping the serial number codes in the sixth step into chaotic codes in an inverse mode;
the block cipher text adopts a grafting type coding component to realize information camouflage of black box simulation properties;
wherein,
a parameter modulation mode: adopting a single key parameter k modulation standard which meets a period 3 multi-layer key;
the information processing mode is that the round key parameter K is composed of a plurality of limited single key parameters K, the round key parameter K is connected end to form an O-shaped limit ring of periodic cycle drive, and each 1 group of 10-bit single key parameter K is switched to process a group of 10-bit grouping messages for encryption or decryption block by block and perform data processing.
2. A digital chaotic cipher method based on chaotic number spectrum is characterized in that: the cryptographic method comprises the following steps:
the method comprises the following steps: sending a coded plaintext sequence, and converting the plaintext sequence into a binary array code;
step two: discretizing and mapping the binary array code obtained in the step one into chaotic code;
step three: fuzzification mapping is carried out on the chaotic codes obtained in the step two through a key stream parameter K to form sequence number codes;
step four: constructing a cipher text sequence by the sequence number codes obtained in the step three;
step five: transmitting the ciphertext sequence obtained in the step four to a receiver through an open channel;
step six: inversely converting the ciphertext sequence obtained in the fifth step into a serial number code;
step seven: mapping the serial number codes in the sixth step into chaotic codes in an inverse mode;
wherein,
the key stream parameter K adopts a chaotic parameter modulation standard of a 10-run filter, the key length of 10 numbers is modulated by the 10-run filter, and the 10-run filter plays a role of limiting 0 and 1 continuous runs within 10 numbers in the key stream parameter K with one-time pad and continuous aperiodic, specifically, the property of a driving signal is changed by XOR of the 10 th bit 0, 1 and 1 of the 0 and 1 continuous runs by 0 ⊕ 1-1 and 1 ⊕ 1-0;
an information processing mode: the method adopts 1bit key character K in each switching key stream parameter K to process the character-by-character serial data processing of encryption or decryption of 1bit message characters.
3. A digital chaotic cipher method based on chaotic number spectrum is characterized in that: the cryptographic method comprises the following steps:
the method comprises the following steps: randomly taking a binary array code;
step two: mapping the binary array codes obtained in the step one into first-level chaotic codes sequentially through first-level discretization, and then fuzzifying and mapping the binary array codes into first-level serial number codes through the driving variable of the n-run filter;
step three: mapping the serial number codes obtained in the second step into second-level chaotic codes through second-level discretization, and then mapping the serial number codes into second-level serial number codes through fuzzification of the driving variables of the n-run filter; the second-level serial number coding adopts a second subsystem component of a double-structure mapping parameter to generate 0-9 response variables;
step four: constructing a true random number by the second-level serial number code obtained in the step three;
step five: using the true random number obtained in the step four as a key parameter K modulation parameter;
wherein,
the key stream parameter K adopts a chaotic parameter modulation standard of a 10-run filter, the key length of 10 numbers is modulated by the 10-run filter, and the 10-run filter plays a role of limiting 0 and 1 continuous runs within 10 numbers in the key stream parameter K with one-time pad and continuous aperiodic, specifically, the property of a driving signal is changed by XOR of the 10 th bit 0, 1 and 1 of the 0 and 1 continuous runs by 0 ⊕ 1-1 and 1 ⊕ 1-0;
an information processing mode: processing the encrypted or decrypted character-by-character serial data processing of the 1-bit message character by adopting the 1-bit key character K in each switching key stream parameter K;
feedback control of state variables is adopted, namely response variables generated by a response system are introduced into a driving system to serve as driving variables, and an input system is introduced to serve as input variables to realize a synergistic effect principle of the state variables on parameter variables;
the method adopts dual-system control of state variables, namely, a first-stage subsystem and a second-stage subsystem in a model respectively adopt independent pulse disturbance schemes, and drive variables of the two-stage subsystems in state feedback are subjected to exclusive-or operation to synthesize new power which serves as input variables of the first-stage subsystem.
4. A digital chaotic cipher method based on chaotic number spectrum is characterized in that: the cryptographic method comprises the following steps:
the method comprises the following steps: transmitting a coded block plaintext and converting the block plaintext into a binary block code;
step two: carrying out chaotic inverse mapping on the binary array code obtained in the step one to obtain chaotic codes;
step three: taking 4 groups of chaotic codes obtained in the step two as units, and performing chaotic inverse mapping in a cycle iteration mode through a round key parameter K to obtain chaotic codes;
step four: constructing a message abstract by the chaotic code obtained in the step three;
step five: transmitting the message abstract and the message obtained in the step four to a receiver through a public channel;
wherein,
a parameter modulation mode: adopting a single key parameter k modulation standard which meets a period 3 multi-layer key, wherein the key length is 16;
the information processing mode is that the round key parameters K are connected end to form a periodic cycle driven O-shaped limit ring, and 1 group of 64-bit grouping messages are processed by adopting a 1-group switching 16-bit single key parameter K.
5. A digital chaotic cipher method based on chaotic number spectrum is characterized in that: the cryptographic method comprises the following steps:
the method comprises the following steps: transmitting a coded block plaintext and converting the block plaintext into a binary block code;
step two: discretizing and mapping the binary array code obtained in the step one into chaotic code;
step three: fuzzifying and mapping the chaotic code obtained in the step two into a sequence number code through a key parameter K subjected to closed-loop control;
step four: constructing a grouping ciphertext by the sequence number codes obtained in the step three;
step five: transmitting the packet ciphertext obtained in the step four to a receiver through an open channel;
step six: inversely converting the packet ciphertext obtained in the fifth step into a serial number code;
step seven: mapping the serial number codes in the sixth step into chaotic codes in an inverse mode;
the key parameter K is a character-by-character key stream parameter drive generation character-by-character block single key parameter characteristic; the key parameter K of the closed-loop control can realize the functions of key transfer compression and key transfer decomposition of lossless data by unrelated transfer sub-keys K1, K2, K3 and … … and performing at least 3 rounds of forward iterative encryption aiming at encryption keys; the transfer sub-keys K1, K2 and K3 are constructed by true random numbers or are obtained by carrying out Hash function operation on an original key K through multiple rounds of reverse iteration; the key transfer compression and key transfer decomposition method can be independently used;
and the block cipher text adopts a grafting type coding component to realize the information camouflage of the black box simulation property.
6. The chaotic digital cipher method based on chaotic number spectrum as claimed in claim 5, wherein: the grafting type coding component adopts intermittent audio and sound segments of Morse code.
7. The chaotic-number-spectrum-based digital chaotic cipher method according to claim 6 is characterized in that intermittent audio and sound segments of Morse code are silence represented by ○ representing 0, and tone represented by ● representing 1, and are designed by a geometric rule that 2 points of a long-short dash line and a short-short dash line are arranged in a line, and 1 line in a grafting type coding assembly represents 2, wherein the symbolic grafting method is that a coding cipher rule means that a coding cipher text rule means that 0 and 1 grafting type coding assemblies are independent codes, 2-9 grafting type coding assemblies are grafting codes, characters are randomly grafted by using the same horizontal/vertical/oblique line, and a coding key rule of the grafting type coding assembly means that a sequence identifier of a coding segment and an arrow identifier rule of a coding direction specifically follow an identification process that a serial number is left at a joint before an arrow is marked and a connection between the arrows is left.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710101736.1A CN106788965B (en) | 2016-12-13 | 2017-02-24 | Digital chaotic cipher method based on chaotic number spectrum |
PCT/CN2018/076611 WO2018153317A1 (en) | 2017-02-24 | 2018-02-13 | Chaotic map-based digital chaotic encryption method |
EP18756820.9A EP3588838A4 (en) | 2017-02-24 | 2018-02-13 | Chaotic map-based digital chaotic encryption method |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611143320.8A CN106385312A (en) | 2016-12-13 | 2016-12-13 | Digital chaotic encryption method based on chaotic number spectrum |
CN2016111433208 | 2016-12-13 | ||
CN201710101736.1A CN106788965B (en) | 2016-12-13 | 2017-02-24 | Digital chaotic cipher method based on chaotic number spectrum |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106788965A CN106788965A (en) | 2017-05-31 |
CN106788965B true CN106788965B (en) | 2020-05-05 |
Family
ID=57960037
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611143320.8A Pending CN106385312A (en) | 2016-12-13 | 2016-12-13 | Digital chaotic encryption method based on chaotic number spectrum |
CN201710101736.1A Active CN106788965B (en) | 2016-12-13 | 2017-02-24 | Digital chaotic cipher method based on chaotic number spectrum |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611143320.8A Pending CN106385312A (en) | 2016-12-13 | 2016-12-13 | Digital chaotic encryption method based on chaotic number spectrum |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN106385312A (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3588838A4 (en) * | 2017-02-24 | 2020-09-02 | Wei Chen | Chaotic map-based digital chaotic encryption method |
CN107017960B (en) * | 2017-03-24 | 2019-04-12 | 北京航空航天大学 | A kind of AWGN-wiretap channel anti-eavesdropping safeguard construction and its implementation based on polar code |
CN110263586A (en) * | 2019-06-19 | 2019-09-20 | 广西师范大学 | A kind of hardware security appraisal procedure of chaos cipher system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101237320A (en) * | 2008-02-04 | 2008-08-06 | 西安理工大学 | Method of Cryptographic Protection Using Infinite Dimensional Hyperchaos to Construct One-way Hash Function |
CN103346875A (en) * | 2013-05-08 | 2013-10-09 | 东南大学 | Method for generating digital chaos code in chaotic secure communication system |
CN103746793A (en) * | 2014-01-07 | 2014-04-23 | 陈伟 | Number form text encryption and decryption methods |
-
2016
- 2016-12-13 CN CN201611143320.8A patent/CN106385312A/en active Pending
-
2017
- 2017-02-24 CN CN201710101736.1A patent/CN106788965B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101237320A (en) * | 2008-02-04 | 2008-08-06 | 西安理工大学 | Method of Cryptographic Protection Using Infinite Dimensional Hyperchaos to Construct One-way Hash Function |
CN103346875A (en) * | 2013-05-08 | 2013-10-09 | 东南大学 | Method for generating digital chaos code in chaotic secure communication system |
CN103746793A (en) * | 2014-01-07 | 2014-04-23 | 陈伟 | Number form text encryption and decryption methods |
Non-Patent Citations (1)
Title |
---|
混沌数谱在保密系统的应用研究;陈伟;《电子科技学院学报》;20160630;第24卷(第2期);第19页第1栏,第21页第1栏-第24页第2栏 * |
Also Published As
Publication number | Publication date |
---|---|
CN106788965A (en) | 2017-05-31 |
CN106385312A (en) | 2017-02-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018153317A1 (en) | Chaotic map-based digital chaotic encryption method | |
CN109951268B (en) | Encryption and decryption method and device based on position exchange and bit transformation | |
CN109861809B (en) | Practical grouping random encryption and decryption method | |
CN108429613A (en) | An Encryption Method of Power Network Information Based on EN-PRESENT Algorithm | |
CN106788965B (en) | Digital chaotic cipher method based on chaotic number spectrum | |
Mahboob et al. | A novel construction of substitution box based on polynomial mapped and finite field with image encryption application | |
Walia et al. | Implementation of new modified MD5-512 bit algorithm for cryptography | |
Noura et al. | Overview of efficient symmetric cryptography: dynamic vs static approaches | |
Joshy et al. | Text to image encryption technique using RGB substitution and AES | |
Al-Arjan et al. | Intelligent security in the era of AI: The key vulnerability of RC4 algorithm | |
Pande et al. | Using chaotic maps for encrypting image and video content | |
Patel et al. | Hybrid security algorithms for data transmission using AES-DES | |
CN109831295B (en) | Encryption method based on electric power emergency communication system | |
Sayed et al. | A novel scrambler design for enhancing secrecy transmission based on polar code | |
Hu et al. | Joint Optimization–Encryption Model Based on Auto Encoder Neural Network, Variable-Length Dynamic S-Box and New Stream Encryption | |
Kabilan et al. | Implementation of SERPENT cryptographic algorithm for secured data transmission | |
CN101262334A (en) | Bluetooth data transmission encryption method | |
CN115484067A (en) | Industrial vehicle-based Bluetooth data transmission encryption algorithm | |
CN114629619A (en) | Video encryption method based on SM4 and dynamic S box | |
Jirjees et al. | Colour image privacy based on cascaded design of symmetric block cipher | |
Katti et al. | On the security of key-based interval splitting arithmetic coding with respect to message indistinguishability | |
Kareem et al. | A New Hybrid (MD5 and RC4) Cryptography Algorithm Using Multi-Logic States | |
Zhao et al. | A hybrid AES encryption for IOT using Adversarial Network | |
Narayanaswamy et al. | HIDE: Hybrid symmetric key algorithm for integrity check, dynamic key generation and encryption | |
Alsuwaiedi et al. | Modifying the aes algorithm by improving the add round key stage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |