[go: up one dir, main page]

CN110995405A - Chaos-based initial vector generation algorithm and IP core thereof - Google Patents

Chaos-based initial vector generation algorithm and IP core thereof Download PDF

Info

Publication number
CN110995405A
CN110995405A CN201911232173.5A CN201911232173A CN110995405A CN 110995405 A CN110995405 A CN 110995405A CN 201911232173 A CN201911232173 A CN 201911232173A CN 110995405 A CN110995405 A CN 110995405A
Authority
CN
China
Prior art keywords
key
module
initial vector
bit
vector generation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911232173.5A
Other languages
Chinese (zh)
Other versions
CN110995405B (en
Inventor
丁群
冯凯
王传福
李孝友
余龙飞
唐薪玥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heilongjiang University
Original Assignee
Heilongjiang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Heilongjiang University filed Critical Heilongjiang University
Priority to CN201911232173.5A priority Critical patent/CN110995405B/en
Publication of CN110995405A publication Critical patent/CN110995405A/en
Application granted granted Critical
Publication of CN110995405B publication Critical patent/CN110995405B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明提供一种基于混沌初始向量生成算法及其IP核,生成算法基于Logistic混沌的序列发生器中输入32比特的初值x0,将ZUC加密算法的128比特的初始密钥KEY划分为16个32比特key[i];将key[0]赋值给32比特x0,并计算x1=4x0(1‑x0);将key[i]赋值给key[i‑1],再将x1赋值给key[15],对按顺序产生的所有x1序列隔1024比特截取末尾128比特序列作为一个初始向量。生成算法的IP核,包括:该方法生成的初始向量生成模块、ZUC加密算法模块、密钥流FIFO模块、运算模块、UART通信模块和控制器模块。本发明利用混沌伪随机序列良好的随机性,大大提高了初始向量的不可预测性。

Figure 201911232173

The invention provides a chaos-based initial vector generation algorithm and its IP core. The generation algorithm is based on a Logistic chaos-based sequence generator inputting a 32-bit initial value x 0 , and the 128-bit initial key KEY of the ZUC encryption algorithm is divided into 16 a 32-bit key[i]; assign key[0] to 32-bit x 0 , and calculate x 1 =4x 0 (1‑x 0 ); assign key[i] to key[i‑1], and then x 1 is assigned to key[15], and the last 128-bit sequence is truncated at 1024-bit intervals for all the x 1 sequences generated in sequence as an initial vector. The IP core for generating the algorithm includes: an initial vector generation module generated by the method, a ZUC encryption algorithm module, a key stream FIFO module, an operation module, a UART communication module and a controller module. The invention utilizes the good randomness of the chaotic pseudo-random sequence and greatly improves the unpredictability of the initial vector.

Figure 201911232173

Description

Chaos-based initial vector generation algorithm and IP core thereof
The technical field is as follows:
the invention relates to the field of data encryption, in particular to a chaos initial vector generation algorithm and an IP core thereof.
Background art:
ZUC is a synchronous sequence cipher algorithm, the input of which contains two parts, namely an Initial Key (Key) with 128 bits of bit width and an Initial Vector (IV) with 128 bits of bit width. The ZUC sequence cipher algorithm encrypts digital information using an input 128-bit KEY and a 128-bit initial vector generation KEY stream.
The ZUC sequence cipher algorithm is the third set of international encryption algorithms recommended by the international organization for standardization 3GPP (3rd Generation partnership project). According to the ZUC sequence cipher algorithm promulgated by 3GPP, the initial vector is generated in a fixed manner and structure by using the relevant control information in the wireless communication process, and is expressed as: let signal COUNT [0] | COUNT [1] | COUNT [3], COUNT represents a frame counter in a communication process, whose bit width is 32 bits, where COUNT [ i ] (0 ≦ i ≦ 3) is a byte 8 bits long, and an initial vector of 128-bit width is expressed as IV [0] | IV [1] | | IV [2] | |.
IV[0]=COUNT[0],IV[1]=COUNT[1],
IV[2]=COUNT[2],IV[3]=COUNT[3],
IV[4]=BEARER||DIRECTION||002,
IV[5]=IV[6]=IV[7]=000000002,
IV[8]=IV[0],IV[9]=IV[1],
IV[10]=IV[2],IV[11]=IV[3],
IV[12]=IV[4],IV[13]=IV[5],
IV[14]=IV[6],IV[15]=IV[7].
The symbol "|" is a bit connection symbol, the bit width of the signal BEARER is 5 bits, the function is a BEARER layer identifier, the bit width of the signal DIRECTION is 1 bit, and the function is a transmission DIRECTION identifier. Since the initial vector is insecure in the communication and can be transmitted in plaintext, and the signal COUNT is set to 0 after each time the KEY is updated and is changed in an incremental manner, and the signal DIRECTION has only two states, i.e., up and down, only 5 bits of the signal BEARER are completely unpredictable in the whole initial vector. Ideally, the number of bits in the unpredictable part of the IV and the number of bits of the KEY should be the same to improve the resistance to TMDTTO (Time-Memory-Data Trade-Off) attacks. This problem is noted in some literature and it is also noted that a shorter number of unpredictable bits in the initial vector reduces the complexity of the alternative type of TMTO attack, while increasing the number of unpredictable bits in the initial vector is beneficial in ameliorating this problem.
The initial vector plays a very important role in the ssc algorithm. In many cases, the KEY cannot be changed frequently in the specific encryption process, and the updating and using of different initial vectors avoids the situation that the same ciphertext is generated under the same plaintext and the same KEY, and also avoids the situation that the same KEY stream is used for encryption for multiple times. Meanwhile, in wireless communication, information in a channel is easily lost, and an encryption communication system is difficult to apply when the encryption communication system can correctly decrypt only under the condition that the information is completely received.
Disclosure of Invention
Based on the defects, the invention provides the chaos initial vector generation algorithm and the IP core thereof, which greatly improves the unpredictability of the initial vector so as to improve the capability of coping with TMTO attacks.
The technology adopted by the invention is as follows: a chaos-based initial vector generation algorithm comprises the following steps:
firstly, inputting an initial value x of 32 bits into a sequence generator based on Logistic chaos0Dividing 128-bit initial KEY KEY of ZUC encryption algorithm into 16 32-bit KEYs [ i](i is not less than 0 and not more than 15), key [ i ≦ 15 ≦ key](i is more than or equal to 0 and less than or equal to 15) are respectively used as the input of Logistic chaotic iterative mapping,
the Logistic chaotic iterative mapping expression is as follows:
xn+1=4xn(1-xn) (1)
wherein x0Is an initial value, n is the number of iterations, and xnThe device is composed of a 32-bit register;
step two, key [0]]Assigned to 32 bits x0And calculate x1=4x0(1-x0);
Step three, key [ i ]]Assign a key [ i-1 ]]Then x is added1Assign value to key [15]For all x generated in sequence1The sequence intercepts the last 128-bit sequence as an initial vector at 1024-bit intervals, and returns to step two.
The invention also has the following features: an IP core based on a chaos initial vector generation algorithm comprises the following steps: the initial vector generating module, the ZUC encryption algorithm module, the key stream FIFO module, the operation module, the UART communication module and the controller module which are generated by the method,
the initial vector generation module is responsible for generating an initial vector required by the ZUC encryption algorithm module;
the ZUC encryption algorithm module is responsible for generating a KEY sequence for encryption and decryption according to a KEY KEY and an initial vector;
the key stream FIFO module is used for caching the key stream output by the ZUC encryption algorithm module;
the UART communication module realizes the modulation and demodulation work of the communication process of the IP core and the upper computer;
the arithmetic module carries out XOR operation on data taken out from a receiver FIFO unit and a key stream FIFO module of the UART communication module to finish encryption and decryption of the data, and delivers the processed data to a transmitter FIFO unit of the UART communication module;
the controller module is a main control unit of the whole IP core, all modules work under the scheduling of the controller module, and the controller module controls the flow direction of data and the operation received by the data.
The invention has the following advantages and beneficial effects: the invention utilizes the good randomness of the chaotic pseudo-random sequence to greatly improve the unpredictability of the initial vector so as to improve the capability of coping TMTO attack, and combines the initial vector with the ZUC sequence cryptographic algorithm to form an important component of the IP core of the ZUC encryption algorithm. In addition, the sequence cipher algorithm adds the initial vector and designs the frame structure for data communication, so that even if partial data is damaged or lost, the system can continue to complete the decryption of the correctly received data frame. The initial vector may also be used as the number of information frames in case the transmitted information is sequential.
Drawings
FIG. 1 is a schematic diagram of an FPGA-based ZUC encryption algorithm IP core;
FIG. 2 is a top level design diagram of initial vector generation algorithm module hardware implementation based on Logistic chaos;
FIG. 3 is a flow diagram of an initial vector generation module;
FIG. 4 is a diagram of the FPGA top level architecture.
Detailed Description
The invention is further illustrated by way of example in the accompanying drawings of the specification:
example 1
A chaos-based initial vector generation algorithm comprises the following steps:
firstly, inputting an initial value x of 32 bits into a sequence generator based on Logistic chaos0Dividing 128-bit initial KEY KEY of ZUC encryption algorithm into 16 32-bit KEYs [ i](i is not less than 0 and not more than 15), key [ i ≦ 15 ≦ key](i is more than or equal to 0 and less than or equal to 15) are respectively used as the input of Logistic chaotic iterative mapping,
the Logistic chaotic iterative mapping expression is as follows:
xn+1=4xn(1-xn) (1)
wherein x0Is an initial value, n is the number of iterations, and xnThe device is composed of a 32-bit register;
step two, key [0]]Assigned to 32 bits x0And calculate x1=4x0(1-x0);
Step three, key [ i ]]Assign a key [ i-1 ]]Then x is added1Assign value to key [15]For all x generated in sequence1Sequence space 1024The last 128-bit sequence is truncated as an initial vector and transferred back to step two.
The IP core based on the chaos initial vector generation algorithm comprises the following steps: the device comprises an initial vector generation module, a ZUC encryption algorithm module, a key stream FIFO module, an operation module, a UART communication module and a controller module, wherein the initial vector generation module is responsible for generating an initial vector required by the work of the ZUC encryption algorithm module;
the ZUC encryption algorithm module is responsible for generating a KEY sequence for encryption and decryption according to a KEY KEY and an initial vector;
the key stream FIFO module is used for caching the key stream output by the ZUC encryption algorithm module;
the UART communication module realizes the modulation and demodulation work of the communication process of the IP core and the upper computer;
the arithmetic module carries out XOR operation on data taken out from a receiver FIFO unit and a key stream FIFO module of the UART communication module to finish encryption and decryption of the data, and delivers the processed data to a transmitter FIFO unit of the UART communication module;
the controller module is a main control unit of the whole IP core, all modules work under the scheduling of the controller module, and the controller module controls the flow direction of data and the operation received by the data.
Example 2
IP core FPGA based on chaos initial vector generation algorithm
As shown in fig. 2, the initial vector generation module has 6 input-output signals, the definitions of which are listed in table 1.
TABLE 1 Top level Module Signal List
Figure RE-GDA0002387800230000041
Figure RE-GDA0002387800230000051
The initial vector generation module has a control signal "start" in addition to the clock signal and the reset signal, and the main workflow of the initial vector generation module is described here: when the initial vector generation module is powered on, firstly, reset operation is carried out, then the initial vector generation module enters a standby state, when a start signal is valid for the first time, the initial vector generation module downloads a secret key and runs for 1024 clock cycles, then an initial vector is output, meanwhile, an initial vector valid flag signal IV is output to be valid, the signal on the output signal IV is shown to be valid at the moment, then the module enters the standby state, if the signal start is valid again, the module runs for 1024 clock cycles again in the immediately previous state and generates a new initial vector, and so on, and an algorithm flow chart is used for expressing a main working flow, as shown in FIG. 3.
FIG. 4 is a top level architecture design in which a module with multi-beat latency has its latency (latency) labeled in the figure. The global calculation precision of the initial vector generation module is 32 bits, and the system variable x can be known by the formula (1)nE (0,1), all operations of IVMKAKER are 32-bit unsigned pure decimals, e.g., a 32-bit binary number in the system is represented as Mb=m31m30m29…m1m0Wherein m isiE {0,1} and i ═ 0,1,2, …,31, the decimal number it represents can be represented by equation (2):
Figure RE-GDA0002387800230000052
the control module is a control unit that performs the function of generating the initial value in equation (1) and controls the functions of enabling each sub-module and selecting signals of the selector module. The delay module delays the input by two clock cycles to output; the functional expression of the position negation module is as follows:
bn[31:0]=~sel[31:0](3)
the adder module performs the addition 1 calculation on the input value, and the expression is as follows:
add[31:0]=bn[31:0]+1 (4)
bit-wise negation module and additionThe cascade connection of the device modules jointly completes (1-x) in the formula (1)n) Part of the calculation, whose principle is similar to complement, is illustrated here as: for example, there are unsigned binary numbers a 10000 and B1010, and it is clear that the value of a-B can be obtained by B + 1. This is done because all numbers in the system are 32 unsigned decimal numbers, and 33 bit wide is needed to represent decimal 1, and the method in the design avoids adding one bit wide separately for representing decimal 1 and using subtraction in the digital circuit, and furthermore, the negation operation is very simple to implement for the digital circuit; the multiplier module completes xn(1-xn) When two data with a bit width of 32 bits are multiplied, a product with a bit width of 64 bits is generated inside the multiplier.
The resource and speed conditions occupied by the realized initial vector generation module are counted, and compared with a circuit which uses a conventional Logistic chaotic sequence generation algorithm to realize the same function, the result is shown in table 2, and the highest operation frequency of the circuit is increased by 2.4 times under the condition that the logic resource Slice consumption of the realized initial vector generation module on an FPGA chip is increased by 16.3%, and good resource consumption and speed level are obtained on the basis that the generated initial vector obtains better unpredictability.
TABLE 2 resource vs. speed
Figure RE-GDA0002387800230000061

Claims (2)

1.一种基于混沌初始向量生成算法,其特征在于,初始向量生成方法如下:1. an initial vector generation algorithm based on chaos, is characterized in that, initial vector generation method is as follows: 步骤一、首先要向基于Logistic混沌的序列发生器中输入32比特的初值x0,将ZUC加密算法的128比特的初始密钥KEY划分为16个32比特key[i](0≤i≤15),使key[i](0≤i≤15)分别作为Logistic混沌迭代映射的输入,Step 1. First, input a 32-bit initial value x 0 into the sequence generator based on Logistic chaos, and divide the 128-bit initial key KEY of the ZUC encryption algorithm into 16 32-bit key[i] (0≤i≤ 15), make key[i] (0≤i≤15) as the input of Logistic chaotic iterative map respectively, 其中,Logistic混沌迭代映射的表达式如下:Among them, the expression of Logistic chaotic iterative mapping is as follows: xn+1=4xn(1-xn) (1)x n+1 = 4x n (1-x n ) (1) 其中x0是初始值,n是迭代次数,且xn由32比特寄存器构成;where x 0 is the initial value, n is the number of iterations, and x n consists of a 32-bit register; 步骤二、将key[0]赋值给32比特x0,并计算x1=4x0(1-x0);Step 2, assign key[0] to 32 bits x 0 , and calculate x 1 =4x 0 (1-x 0 ); 步骤三、将key[i]赋值给key[i-1],再将x1赋值给key[15],对按顺序产生的所有x1序列隔1024比特截取末尾128比特序列作为一个初始向量,并转回至步骤二。Step 3: Assign key[i] to key[i-1], then assign x 1 to key[15], and truncate the last 128-bit sequence of all x 1 sequences generated in sequence at intervals of 1024 bits as an initial vector, and go back to step two. 2.一种基于混沌初始向量生成算法的IP核,其特征在于,包括:如权利要求1所述的方法生成的初始向量生成模块、ZUC加密算法模块、密钥流FIFO模块、运算模块、UART通信模块和控制器模块,2. an IP core based on chaos initial vector generation algorithm, is characterized in that, comprises: the initial vector generation module, ZUC encryption algorithm module, key stream FIFO module, arithmetic module, UART that the method as claimed in claim 1 generates communication modules and controller modules, 所述的初始向量生成模块负责生成ZUC加密算法模块工作所需的初始向量;The described initial vector generation module is responsible for generating the initial vector required for the work of the ZUC encryption algorithm module; 所述的ZUC加密算法模块负责根据密钥KEY和初始向量生成用于加解密的密钥序列;Described ZUC encryption algorithm module is responsible for generating the key sequence for encryption and decryption according to key KEY and initial vector; 所述的密钥流FIFO模块用于缓存ZUC加密算法模块输出的密钥流;Described key stream FIFO module is used for buffering the key stream output by ZUC encryption algorithm module; 所述的UART通信模块实现了IP核与上位机通信过程的调制与解调工作;The UART communication module realizes the modulation and demodulation of the communication process between the IP core and the host computer; 所述的运算模块将从UART通信模块的接收器FIFO单元和密钥流FIFO模块中取出的数据进行异或运算,完成数据的加解密,并将处理完成的数据交给UART通信模块的发送器FIFO单元;The operation module performs XOR operation on the data taken out from the receiver FIFO unit of the UART communication module and the key stream FIFO module, completes the encryption and decryption of the data, and delivers the processed data to the transmitter of the UART communication module. FIFO unit; 所述的控制器模块为整个IP核的主控单元,所有的模块在其调度下工作,它控制着数据的流向以及数据所接受的运算。The controller module is the main control unit of the entire IP core, all modules work under its scheduling, and it controls the flow of data and the operations accepted by the data.
CN201911232173.5A 2019-12-05 2019-12-05 Chaos-based Initial Vector Generation Algorithm and Its IP Core Active CN110995405B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911232173.5A CN110995405B (en) 2019-12-05 2019-12-05 Chaos-based Initial Vector Generation Algorithm and Its IP Core

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911232173.5A CN110995405B (en) 2019-12-05 2019-12-05 Chaos-based Initial Vector Generation Algorithm and Its IP Core

Publications (2)

Publication Number Publication Date
CN110995405A true CN110995405A (en) 2020-04-10
CN110995405B CN110995405B (en) 2022-04-22

Family

ID=70090134

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911232173.5A Active CN110995405B (en) 2019-12-05 2019-12-05 Chaos-based Initial Vector Generation Algorithm and Its IP Core

Country Status (1)

Country Link
CN (1) CN110995405B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112367155A (en) * 2020-10-13 2021-02-12 黑龙江大学 FPGA-based ZUC encryption system IP core construction method
CN115277977A (en) * 2022-07-25 2022-11-01 重庆邮电大学 Hybrid chaotic image encryption method capable of configuring floating point precision based on FPGA

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070019811A1 (en) * 2001-11-16 2007-01-25 Yazaki Corporation Cryptographic key, encryption device, encryption/decryption device, cryptographic key management device, and decryption device
CN103731822A (en) * 2012-10-15 2014-04-16 中国科学院微电子研究所 System and method for implementing Zuichong algorithm
CN105808207A (en) * 2016-03-22 2016-07-27 中国科学院半导体研究所 Chaotic pseudo random number generator, and circuit and system on chip thereby
US20160234009A1 (en) * 2015-02-08 2016-08-11 Wenhua Li Chaotic Baseband Modulation Hopping Based Post-Quantum Physical-Layer Encryption
CN105916141A (en) * 2016-07-12 2016-08-31 黑龙江大学 Self-synchronizing realization system and self-synchronizing realization method for Zu Chongzhi encryption and decryption algorithm
CN106209358A (en) * 2016-07-12 2016-12-07 黑龙江大学 A kind of SM4 key schedule based on long key realize system and method
CN108377180A (en) * 2018-03-29 2018-08-07 哈尔滨理工大学 A wireless security communication system based on STM32
CN109508175A (en) * 2018-11-14 2019-03-22 重庆邮电大学 The FPGA design of pseudorandom number generator based on fractional order chaos and Zu Chongzhi's algorithm

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070019811A1 (en) * 2001-11-16 2007-01-25 Yazaki Corporation Cryptographic key, encryption device, encryption/decryption device, cryptographic key management device, and decryption device
CN103731822A (en) * 2012-10-15 2014-04-16 中国科学院微电子研究所 System and method for implementing Zuichong algorithm
US20160234009A1 (en) * 2015-02-08 2016-08-11 Wenhua Li Chaotic Baseband Modulation Hopping Based Post-Quantum Physical-Layer Encryption
CN105808207A (en) * 2016-03-22 2016-07-27 中国科学院半导体研究所 Chaotic pseudo random number generator, and circuit and system on chip thereby
CN105916141A (en) * 2016-07-12 2016-08-31 黑龙江大学 Self-synchronizing realization system and self-synchronizing realization method for Zu Chongzhi encryption and decryption algorithm
CN106209358A (en) * 2016-07-12 2016-12-07 黑龙江大学 A kind of SM4 key schedule based on long key realize system and method
CN108377180A (en) * 2018-03-29 2018-08-07 哈尔滨理工大学 A wireless security communication system based on STM32
CN109508175A (en) * 2018-11-14 2019-03-22 重庆邮电大学 The FPGA design of pseudorandom number generator based on fractional order chaos and Zu Chongzhi's algorithm

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
HAI CHENG ECT.: "An Efficient Image Encryption Scheme Based on ZUC Stream Cipher and Chaotic Logistic Map", 《INTELLIGENT DATA ANALYSIS AND ITS APPLICATIONS》 *
KAI FENG AND QUN DING: "Design and Implementation of Pseudo-Random Sequence Generator Based on Logistic Chaotic System and m-Sequence Using FPGA", 《INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING》 *
任高峰等: "祖冲之算法在数字图像加密中的应用与实现", 《科学技术与工程》 *
何远等: "基于混沌S盒的无线传感器网络分组加密算法", 《计算机应用》 *
尹燕等: "基于置乱、混淆与掩蔽规则融合3D混沌映射的图像加密算法研究", 《科学技术与工程》 *
易鸿: "基于FPGA的图像硬件加密算法设计", 《河南科学》 *
黄迎久等: "基于DNA编码和超混沌系统的图像加密算法", 《内蒙古科技大学学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112367155A (en) * 2020-10-13 2021-02-12 黑龙江大学 FPGA-based ZUC encryption system IP core construction method
CN115277977A (en) * 2022-07-25 2022-11-01 重庆邮电大学 Hybrid chaotic image encryption method capable of configuring floating point precision based on FPGA
CN115277977B (en) * 2022-07-25 2023-11-10 重庆邮电大学 Hybrid chaotic image encryption method based on FPGA (field programmable Gate array) configurable floating point precision

Also Published As

Publication number Publication date
CN110995405B (en) 2022-04-22

Similar Documents

Publication Publication Date Title
JP6244429B2 (en) Stream cipher encryption apparatus, stream cipher decryption apparatus, stream cipher encryption method, stream cipher decryption method, and program
Kowsalya et al. Low area PRESENT cryptography in FPGA using TRNGPRNG key generation
Kitsos et al. FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0
Samir et al. ASIC and FPGA comparative study for IoT lightweight hardware security algorithms
US20210021405A1 (en) Key sequence generation for cryptographic operations
CN106921487A (en) Reconfigurable S-box circuit structure
Rouvroy et al. Efficient uses of FPGAs for implementations of DES and its experimental linear cryptanalysis
Karthigaikumar et al. Simulation of image encryption using AES algorithm
JP2005215688A (en) Hardware encryption / decryption device using S-BOX operation and method thereof
Singh et al. An efficient hardware design and implementation of advanced encryption standard (AES) algorithm
Chawla et al. FPGA implementation of an optimized 8-bit AES architecture: A masked S-Box and pipelined approach
CN110995405B (en) Chaos-based Initial Vector Generation Algorithm and Its IP Core
Jing et al. Reconfigurable system for high-speed and diversified AES using FPGA
Gaded et al. Composite field arithematic based s-box for aes algorithm
EP1416664A2 (en) Data encryption method
Abdul-Karim et al. High throughput and fully pipelined FPGA implementation of AES-192 algorithm
Tamilselvi et al. A novel based mix-column architecture for AES-128 bit algorithm
Rashidi et al. FPGA based a new low power and self-timed AES 128-bit encryption algorithm for encryption audio signal
US20020172355A1 (en) High-performance booth-encoded montgomery module
Negi et al. Implementation of AES employing systolic array and pipelining approach
Nedjah et al. A parallel yet pipelined architecture for efficient implementation of the advanced encryption standard algorithm on reconfigurable hardware
Trivedi et al. Development of platform using nios ii soft core processor for image encryption and decryption using aes algorithm
Pyrgas et al. An 8-bit compact architecture of lesamnta-LW Hash function for constrained devices
JP2015114434A (en) Stream cipher encryption apparatus, stream cipher decryption apparatus, stream cipher encryption method, stream cipher decryption method, and program
Mohamed et al. Generation of the chaotic keys on the fly for AES encryption system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant