CN104751065A - Encryption method for geographic information product file - Google Patents

Encryption method for geographic information product file Download PDF

Info

Publication number
CN104751065A
CN104751065A CN201510102509.1A CN201510102509A CN104751065A CN 104751065 A CN104751065 A CN 104751065A CN 201510102509 A CN201510102509 A CN 201510102509A CN 104751065 A CN104751065 A CN 104751065A
Authority
CN
China
Prior art keywords
aes
256bit
encryption
chaos
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510102509.1A
Other languages
Chinese (zh)
Inventor
门朝光
田泽宇
魏宇峰
王一超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Engineering University
Original Assignee
Harbin Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Engineering University filed Critical Harbin Engineering University
Priority to CN201510102509.1A priority Critical patent/CN104751065A/en
Publication of CN104751065A publication Critical patent/CN104751065A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an encryption method for a geographic information product file. The method includes the following steps that the geographic information product file to be encrypted is selected; an initial value is input, and a chaotic system is started; one-dimensional Logistic mapping is conducted to generate a 256-bit chaotic sequence A , and one-dimensional Chebyshev mapping is conducted to generate a 256-bit chaotic sequence B; counterpoint XOR operation is conducted on the 256-bit chaotic sequence A and the 256-bit chaotic sequence B, and a generated 256-bit chaotic sequence serves as an AES initial secret key; the AES initial secret key and a 256-bit plain text are added into the AES for encryption, and then a 256-bit ciphertext is obtained; partial information of the 256-bit ciphertext is extracted to serve as an initial value to generate the next group of AES initial secret key, and then the next group of ciphertex is obtained, similarly, the process is conducted in an iteration mode until all plain texts are encrypted. The method has the advantages of being high in encryption efficiency and high in safety.

Description

A kind of encryption method based on geo-information product file
Technical field
The invention belongs to information security field, particularly relate to be applied to digital vector map encryption, a kind of encryption method based on geo-information product file.
Background technology c
Along with the progressively realization of " Digital CHINA ", spatial information application face is more and more extensive, digital vector map have precision high, support high-quality convergent-divergent, accurate positioning, easy to operate, upgrade the multiple advantages such as convenient, become the Support Resource that the aspects such as Geographic Information System, intelligent transport system and digitalized city are required, which overcoming the shortcomings such as paper map inquiry velocity is slow, storage is inconvenient, draughting accuracy is low, is the foundation stone of whole system.But; digital vector map be faced with all the time be copied illegally, the artificial safety problem such as leakage; once there are the possessory legitimate interests of leaking data meeting grievous injury map, therefore, it is problem in the urgent need to address that the safety of protection digital vector map makes it not be stolen.On the one hand, the cost making a width digital vector map is extremely expensive, each country can spend a large amount of manpower and financial resources to make the map vector in certain area of this country, on the other hand, country wishes again the use value farthest excavating map vector, so wish to carry out safe and secret process to digital vector map, ensure the security of map vector.
By contrasting both at home and abroad about the solution of geo-information product encryption, abundant analysis conventional encipherment scheme, find that legacy encryption scheme has following shortcoming: first, use unalterable key information to long plain text encryption, the randomness of key stream is good not, reduces the security of encipherment scheme; The second, expressly only use a group key information to a large amount of, result in single key information and produce long key stream, if code breaker obtains a large amount of corresponding cleartext-ciphertext pair, just can increase encipherment scheme and to be cracked risk.For above shortcoming, this encipherment scheme improves chaos system, aes algorithm, for geo-information product data, proposes the encryption method based on geo-information product file, ensure that the safety of geo-information product data.
Summary of the invention
The object of this invention is to provide a kind of can promote encryption efficiency and security, based on the encryption method of geo-information product file.
The present invention is achieved by the following technical solutions:
Based on an encryption method for geo-information product file, comprise following step,
Step one: select the geo-information product data file that will encrypt, obtain file size;
Step 2: input initial value, starts chaos system, chaos system is that one dimension Logsitic maps and one dimension Chebyshev maps;
Step 3: one dimension Logsitic maps and generates 256bit chaos sequence A, one dimension Chebyshev maps and generates 256bit chaos sequence B;
Step 4: 256bit chaos sequence A and 256bit chaos sequence B is carried out contraposition XOR, the 256bit chaos sequence of generation is as the initial key of AES;
Step 5: the plaintext of AES initial key and 256bit is joined in AES and is encrypted, obtain the ciphertext of 256bit;
Step 6: the initial value of partial information as step 2 getting 256bit ciphertext, returns step 2, until all plaintexts complete encryption.
Beneficial effect:
The present invention proposes a kind of encryption method based on geo-information product file, for geo-information product data characteristics, adopts the chaos system of improvement and aes algorithm to be encrypted geo-information product data.Contrast existing map vector encryption method, the present invention has the following advantages:
The first, the present invention, in security, has following advantage:
Determine primarily of file encryption algorithm based on the cipher round results of geo-information product file encryption scheme and security, comprise and improve chaotic mapping system and AES encryption algorithm, so for the safety analysis of file encryption scheme, mainly discuss from these two aspects.
1. the basis that chaotic mapping system is file encryption scheme is improved.It has following 3 principal characters:
1) improve chaos system compared with traditional chaos system, there is the characteristics such as grey iterative generation chaos sequence, higher to initial value sensitivity, sequence randomness is better, ensure that the security of file encryption algorithm.
2) utilize two chaotic maps to combine and generate AES initial key, add the randomness of AES initial key, increase the decoding difficulty of file encryption algorithm further.
3) partial information of often organizing ciphertext is got as the initial value improving chaos system, for generation of next group ciphertext, the initial value like this often organizing ciphertext is all different, interrelated between ciphertext, even if obtain first initial value, also be difficult to crack ciphertext, considerably increase the security of file encryption algorithm.
2. AES encryption algorithm is the core of file encryption algorithm.It has following characteristics:
With the encryption function of aes algorithm as algorithm, computing is carried out to the chaos sequence improving chaos system generation, further enhancing the security of file encryption algorithm, ensure that the overall security of file encryption scheme.Aes algorithm is the key link that whole file encryption scheme cracks, and 256bit aes algorithm can not crack under existing resource condition, and the time complexity that Brute Force calculates is O (2 256).
Can be drawn by above safety analysis, reliable based on geo-information product file encryption Scheme Security, ensure that the safety of geo-information product data, the safety of file transfer and use after ensure that encryption.
The second, will consider the size of file in the process of encryption based on geo-information product file encryption scheme, this just requires that encipherment scheme must consider efficiency.Encryption efficiency is a very important measurement index, although the more traditional aes algorithm complexity of aes algorithm improved increases to some extent, be through code optimization, efficiency is improved.
Three part-time expenses are mainly contained, file read-write time overhead, AES initial key rise time expense and AES encryption process time expense in whole file encryption scheme.File read-write is the normal system overhead time, is not counted in efficiency analysis.
The time complexity of AES initial key generating function CreateSecretKey is O (1); Although have loop nesting in AES encryption function encrypt, because Nr=8, Nb=8 are fixed values, so the time complexity of encrypt is O (1); In sum, owing to there is while circulation in principal function, so the time complexity based on geo-information product file encryption scheme is O (n).
Pass through By consulting literatures, find that an application number is that CN201410459210, the invention being called " a kind of encryption method based on geo-information product feature " and one section of paper being called " the AES chaos encryption algorithm based on two-dimentional Logistic and Chebyshev maps " are related to the present invention, introduce this two sections of articles and difference of the present invention below respectively.
Invention and the difference of the present invention of " a kind of encryption method based on geo-information product feature " are:
1) the present invention is encrypted based on geo-information product file, and " a kind of encryption method based on geo-information product feature " is encrypted based on geo-information product feature.
2) the two encryption method adopted is different, what the present invention adopted is the algorithm that improvement chaos system combines with AES, what wherein improve chaos system employing is that one dimension Logsitic maps and one dimension Chebyshev maps, and " a kind of encryption method based on geo-information product feature " adopts is improve the algorithm that chaos system combines with RC4, what wherein improve chaos system employing is that one dimension Logsitic maps.
Paper and the difference of the present invention of " the AES chaos encryption algorithm based on two-dimentional Logistic and Chebyshev maps " are:
1) " the AES chaos encryption algorithm based on two-dimentional Logistic and Chebyshev maps " what adopt is that Logistic Map and two-dimentional Chebyshev map, what the present invention adopted is that 1 dimensional Logistic Map and one dimension Chebyshev map, and 1 dimensional Logistic Map and one dimension Chebyshev map and have fireballing advantage relative to the mapping of two dimension.
2) production method of the AES initial key of the two is different.In " the AES chaos encryption algorithm based on two-dimentional Logistic and Chebyshev maps ", input improves the initial value of chaos system, once namely generate the AES initial key of Len req, get 256bitAES initial key and 256bit plaintext, put in AES and be encrypted, generate 256bit ciphertext, continue to get 256bitAES initial key, generate next group 256bit ciphertext, carry out with this iteration, until encrypted.And in the present invention, input improves the initial value of chaos system, generate 256bitAES initial key, get 256bit expressly, the two is put in AES and is encrypted, generate 256bit ciphertext, get cipher text part information as the initial value improving chaos system, generate next group AES initial key, complete next group encryption expressly, carry out with this iteration, until encrypted.Therefore the present invention has the higher advantage of security.
Accompanying drawing explanation
Fig. 1 is based on geo-information product file encryption solution principle schematic diagram;
Fig. 2 AES encryption and decryption process flow diagram;
Fig. 3 file encryption protocol procedures figure;
Fig. 4 file decryption protocol procedures figure.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further details.
Geographic information data has that data volume is large, batch processing and confidentiality high, so have stricter requirement to the security of cryptographic algorithm with speed.For the requirement of high response speed, this encryption method adopts the higher aes algorithm of efficiency to be encrypted.For the requirement of high security, this encryption method is improved chaology, improves the randomness of AES initial key, strengthens the security of encryption.Main flow based on geo-information product file encryption scheme is as follows:
The first, select the geo-information product data file that will encrypt.
The second, input initial value, starts the chaos system (chaos system that this programme adopts is that one dimension Logsitic mapping maps with one dimension Chebyshev) improved;
3rd, one dimension Logsitic mapping maps each self-generating 256bit chaos sequence A and 256bit chaos sequence B with one dimension Chebyshev;
4th, 256bit chaos sequence A and 256bit chaos sequence B is carried out contraposition XOR, and the 256bit chaos sequence of generation is as the initial key of AES;
5th, the plaintext of AES initial key and 256bit is joined in AES and is encrypted, obtain the ciphertext of 256bit, now complete one group of encryption expressly.
6th, the partial information of getting the 256bit ciphertext that the 5th step generates, as the initial value improving chaos system, produces next group AES initial key, then generates next group ciphertext, carry out, until all plaintexts complete encryption with this iteration.The simplified diagram of above-mentioned steps, as shown in Figure 1.
The present invention can be divided into three parts, and 1, encryption flow; 2, file encryption scheme; 3, file decryption scheme.
Below in conjunction with accompanying drawing and protocol step, the various piece to technical solution of the present invention is further described:
1, encryption flow
One, select the geo-information product file that will encrypt, and obtain the size of file.
Two, two cover chaos systems (chaos system that this programme adopts is that Logsitic maps and Chebyshev maps) are started;
(1) Logsitic maps
It is study the chaos system the most deep, utilization factor is the highest now that Logsitic maps, and its model is simple and practical.The mapping relations formula that Logistic maps is:
X n+1=uX n(1-X n),u∈(3.5,4),X n∈[0,1]
Wherein, X nrepresent the previous value of iteration.
Select Logsitic to be mapped as the chaotic maps of this encipherment scheme, mainly consider that it has following characteristic to meet the specific demand of this programme.
Initial value sensitivity is high: initial value X 0the subtle change occurred, all can cause the greatest differences of sequence behavior at a specified future date.
Ergodicity: sequence can within the specific limits, by all states of the unduplicated traversal of himself rule.
Regular: although sequence presents randomness, after starting condition is determined, sequence can be determined (being convenient to deciphering, as long as know starting condition).
Above characteristic ensure that the randomness of chaos sequence is sought well, irregular, the cycle is long, can not predict, thus enhance encipherment scheme crack difficulty.
(2) Chebyshev maps
It is typical One Dimensional Chaotic Maps that Chebyshev maps, and its discrete form is defined as follows:
Y n+1=cos(k*arccos(Y n)),-1<Y 0≤1
Sequence (the y produced by this mapping n) in interval [-1,1] upper traversal, there is autocorrelation and the null value cross correlation of δ function.Along with the increase of iterations, prima facies adjoint point will with exponent separation, and its chaos locus is by Homogeneous phase mixing.These chaotic characteristics make Chebyshev mapping be suitable for being controlled to generate chaos sequence by initial value, are used for the pairing selection of geo-information product and the design of shift count as AES initial key.
Three, when two cover chaos systems reach chaos state (chaos state refers to that the chaos sequence randomness produced is good) respectively, each chaos sequence number generating a 256bit; ,
Four, the 256bit chaos sequence of each for chaos system self-generating is carried out contraposition XOR, the 256bit chaos sequence of generation is as the initial key of AES.
This encipherment scheme, in order to strengthen security, adopts chaotic maps (one dimension Logsitic map, one dimension Chebyshev maps) the generation chaos sequence improved, and the chaos sequence of generation is as the initial key of aes algorithm.
AES encryption algorithm is a kind of block encryption algorithm, and a point group leader is respectively: 128bit, 192bit and 256bit, its initial key length is also respectively 128bit, 192bit and 256bit.This algorithm can resist existing, oneself attack method of knowing, and have good Algebraic Structure, its ciphering process can represent with succinct algebraic equation.This algorithm has very strong dirigibility, and to the computing environment strong adaptability of software and hardware, be easy to realize, this algorithm performance is stablized, even if (as smart card) also possesses good performance under constrained environment.Aes algorithm in general refers to Rijndael algorithm.
What aes algorithm adopted in one-piece construction is the circle function that substitution permutation network is formed, and carries out multi-turn iteration.Each circle forms by 3 layers:
(1) non-linear layer: carry out S box conversion ByteSub, formed by 16 S box juxtapositions, play the effect obscured.
(2) linear mix layer: carry out shiftrows ShiftRow and row and obscure conversion MixColumn, to guarantee the high diffusion on multi-turn.
(3) key adds layer: carry out InvAddRoundKey conversion AddRoundKey, by round key XOR in intermediateness.
The clear packets of aes algorithm and the intermediate result grouping of each conversion are called state, and can be expressed as two-dimentional byte arrays and state matrix, it has four lines, Nb to arrange, and Nb equals plaintext block length divided by 32, Nb=8 in this programme.Initial key also can be expressed as two-dimentional byte arrays similarly, and it has four lines, Nk to arrange, and Nk equals initial key block length divided by 32, Nk=8 in this programme.The wheel number Nr that algorithm carries out is determined jointly by Nb and Nk, Nr=14 in this programme.The basic procedure (deciphering flow process is similar with encryption flow) of aes algorithm encryption is illustrated in fig. 2 shown below.
This encipherment scheme adopts the AES encryption algorithm of 256bit as encryption function.Concrete grammar is the initial key first producing 256bit with the chaotic mapping system improved, then get the plaintext of 256bit equally, initial key and the input expressly as aes algorithm are encrypted, complete 256bit encryption expressly, carry out with this iteration, until encryption all completes.
Five, 256bitAES initial key and 256bit are expressly put in AES be encrypted, complete 256bit encryption expressly, obtain the ciphertext of 256bit.
Six, get part cipher-text information as the initial value improving chaos system, produce next group AES initial key, then generate next group ciphertext, carry out with this iteration, until all plaintexts complete encryption.
2, file encryption scheme
File encryption scheme, for geo-information product data, adopts the chaos system and aes algorithm that improve.General frame maps with Chebyshev for realizing Logsitic mapping, generates random series simultaneously, then adopts aes algorithm as encryption function (random series and the input expressly as AES), is encrypted geo-information product data.Introduce encrypting step below:
(1) pre-read geo-information product data file, obtain the size of file to be encrypted.
(2) start Logistic mapping, Chebyshev mapping, each self-generating 256bit sequence carries out step-by-step XOR, obtains the initial key of a 256bit, meanwhile starts aes algorithm.The plaintext of the initial key and 256bit of getting 256bit is put in AES and is encrypted, and obtains the ciphertext of 256bit.
(3) get part cipher-text information as the initial value improving chaos system, produce next group AES initial key, then generate next group ciphertext, carry out with this iteration, until complete the encryption of current file.
The process flow diagram of encryption as shown in Figure 3.
3, file decryption scheme
Deciphering with encryption similar, based on geo-information product file encryption scheme adopt is AES divide into groups symmetric encipherment algorithm, therefore its decrypting process and ciphering process basically identical, concrete steps are as follows:
(1) pre-read the geo-information product data file of having encrypted, obtain the size of encrypt file.
(2) according to the improvement chaos system initial value preserved, start Logistic respectively and map and Chebyshev mapping, each self-generating 256bit sequence carries out step-by-step XOR, obtains the initial key of a 256bit, meanwhile starts aes algorithm.The ciphertext of the initial key and 256bit of getting 256bit is put in AES and is decrypted, and obtains the plaintext of 256bit.
(3) get part cleartext information as the initial value improving chaos system, produce next group AES initial key, then generate next group expressly, carry out with this iteration, until complete the deciphering of current file.The process flow diagram of deciphering as shown in Figure 4.

Claims (1)

1. based on an encryption method for geo-information product file, it is characterized in that: comprise following step,
Step one: select the geo-information product data file that will encrypt, obtain file size;
Step 2: input initial value, starts chaos system, chaos system is that one dimension Logsitic maps and one dimension Chebyshev maps; Step 3: one dimension Logsitic maps and generates 256bit chaos sequence A, one dimension Chebyshev maps and generates 256bit chaos sequence B;
Step 4: 256bit chaos sequence A and 256bit chaos sequence B is carried out contraposition XOR, the 256bit chaos sequence of generation is as the initial key of AES;
Step 5: the plaintext of AES initial key and 256bit is joined in AES and is encrypted, obtain the ciphertext of 256bit;
Step 6: the initial value of partial information as step 2 getting 256bit ciphertext, returns step 2, until all plaintexts complete encryption.
CN201510102509.1A 2015-03-09 2015-03-09 Encryption method for geographic information product file Pending CN104751065A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510102509.1A CN104751065A (en) 2015-03-09 2015-03-09 Encryption method for geographic information product file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510102509.1A CN104751065A (en) 2015-03-09 2015-03-09 Encryption method for geographic information product file

Publications (1)

Publication Number Publication Date
CN104751065A true CN104751065A (en) 2015-07-01

Family

ID=53590735

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510102509.1A Pending CN104751065A (en) 2015-03-09 2015-03-09 Encryption method for geographic information product file

Country Status (1)

Country Link
CN (1) CN104751065A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105263119A (en) * 2015-11-18 2016-01-20 罗平 Geographical position information-based mobile intelligent terminal communication encryption method
CN107425963A (en) * 2017-05-09 2017-12-01 上海众人网络安全技术有限公司 A kind of construction method and system of password wall
CN108183785A (en) * 2018-01-10 2018-06-19 广东工业大学 A kind of method, system, device and readable storage medium storing program for executing for preventing from hitting library or dragging library
CN111447053A (en) * 2020-03-24 2020-07-24 重庆邮电大学 Data secure transmission method and system based on chaotic logic mapping and RC4 stream cipher
CN111464564A (en) * 2020-05-08 2020-07-28 郑州信大捷安信息技术股份有限公司 Data high-speed encryption and decryption method and device based on symmetric cryptographic algorithm
CN113795023A (en) * 2021-09-26 2021-12-14 深圳市芯中芯科技有限公司 Bluetooth data transmission encryption method based on chaotic sequence and block encryption
CN114491650A (en) * 2022-04-13 2022-05-13 武汉光谷信息技术股份有限公司 Geographical space information desensitization encryption method and system
CN115622795A (en) * 2022-11-15 2023-01-17 青岛以萨数据技术有限公司 File encryption method based on chaotic encryption algorithm, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007105709A1 (en) * 2006-03-14 2007-09-20 Nec Corporation Information processing system, information processing method, and information processing program
CN101093574A (en) * 2007-07-23 2007-12-26 中国人民解放军信息工程大学 Watermark method of vectorial geographical spatial data based on integral wavelet transforms
CN103065278A (en) * 2012-12-24 2013-04-24 南京师范大学 Multi-stage certification method aimed at shaft horse power (shp) line face image layer integrality
CN103310407A (en) * 2013-06-25 2013-09-18 兰州交通大学 Vector geographic space data totally blind watermarking method based on QR code
CN103473733A (en) * 2013-09-12 2013-12-25 东北林业大学 Image encryption algorithm based on DNA encoding and chaotic mapping
CN103634100A (en) * 2013-11-26 2014-03-12 中国广核集团有限公司 Encryption method and device
CN104202147A (en) * 2014-09-05 2014-12-10 哈尔滨工程大学 Encryption method based on geographic information product features
CN104376267A (en) * 2014-11-20 2015-02-25 内江师范学院 Image shuffling encrypting method based on fractional order chaotic mapping

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007105709A1 (en) * 2006-03-14 2007-09-20 Nec Corporation Information processing system, information processing method, and information processing program
CN101093574A (en) * 2007-07-23 2007-12-26 中国人民解放军信息工程大学 Watermark method of vectorial geographical spatial data based on integral wavelet transforms
CN103065278A (en) * 2012-12-24 2013-04-24 南京师范大学 Multi-stage certification method aimed at shaft horse power (shp) line face image layer integrality
CN103310407A (en) * 2013-06-25 2013-09-18 兰州交通大学 Vector geographic space data totally blind watermarking method based on QR code
CN103473733A (en) * 2013-09-12 2013-12-25 东北林业大学 Image encryption algorithm based on DNA encoding and chaotic mapping
CN103634100A (en) * 2013-11-26 2014-03-12 中国广核集团有限公司 Encryption method and device
CN104202147A (en) * 2014-09-05 2014-12-10 哈尔滨工程大学 Encryption method based on geographic information product features
CN104376267A (en) * 2014-11-20 2015-02-25 内江师范学院 Image shuffling encrypting method based on fractional order chaotic mapping

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵芮: "基于二维Logistic与Chebyshev映射的AES混沌加密算法", 《信息科技辑》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105263119A (en) * 2015-11-18 2016-01-20 罗平 Geographical position information-based mobile intelligent terminal communication encryption method
CN107425963A (en) * 2017-05-09 2017-12-01 上海众人网络安全技术有限公司 A kind of construction method and system of password wall
CN108183785A (en) * 2018-01-10 2018-06-19 广东工业大学 A kind of method, system, device and readable storage medium storing program for executing for preventing from hitting library or dragging library
CN111447053B (en) * 2020-03-24 2022-09-23 重庆邮电大学 Data secure transmission method and system
CN111447053A (en) * 2020-03-24 2020-07-24 重庆邮电大学 Data secure transmission method and system based on chaotic logic mapping and RC4 stream cipher
CN111464564B (en) * 2020-05-08 2022-12-23 郑州信大捷安信息技术股份有限公司 Data high-speed encryption and decryption method and device based on symmetric cryptographic algorithm
CN111464564A (en) * 2020-05-08 2020-07-28 郑州信大捷安信息技术股份有限公司 Data high-speed encryption and decryption method and device based on symmetric cryptographic algorithm
CN113795023A (en) * 2021-09-26 2021-12-14 深圳市芯中芯科技有限公司 Bluetooth data transmission encryption method based on chaotic sequence and block encryption
CN113795023B (en) * 2021-09-26 2024-03-19 深圳市芯中芯科技有限公司 Bluetooth data transmission encryption method based on chaotic sequence and packet encryption
CN114491650A (en) * 2022-04-13 2022-05-13 武汉光谷信息技术股份有限公司 Geographical space information desensitization encryption method and system
CN114491650B (en) * 2022-04-13 2022-07-01 武汉光谷信息技术股份有限公司 Method and system for desensitizing encryption of geographic spatial information
CN115622795A (en) * 2022-11-15 2023-01-17 青岛以萨数据技术有限公司 File encryption method based on chaotic encryption algorithm, electronic equipment and storage medium
CN115622795B (en) * 2022-11-15 2023-02-28 青岛以萨数据技术有限公司 File encryption method based on chaotic encryption algorithm, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104751065A (en) Encryption method for geographic information product file
Shen et al. Secure SVM training over vertically-partitioned datasets using consortium blockchain for vehicular social networks
CN110011784B (en) KNN classification service system and method supporting privacy protection
Hussain et al. Image encryption algorithm based on PGL (2, GF (2 8)) S-boxes and TD-ERCS chaotic sequence
CN103414549B (en) A kind of QR two-dimensional code binary image partition becomes key chaos encrypting method
CN101447870B (en) Safe storage method of private key based on technology of distributed password
CN104333446B (en) A kind of novel ultra-light magnitude QTL block cipher implementation method
CN102201914B (en) Secret communication method based on multi-dimensional single/multi-parameter four-weighted fractional Fourier transform
CN101739695A (en) Three-dimensional Arnold mapping-based image grouping encryption method
CN102523365B (en) Method for encrypting and decrypting image based on cellular automata
CN103595539A (en) Method for encrypting format-preserved numeric type personally identifiable information
CN103825723A (en) Encryption method and device
CN101814985B (en) Block cipher system using multi-chaotic mapping multi-dynamic S-box
Gafsi et al. High securing cryptography system for digital image transmission
CN109361830A (en) A kind of image encryption method based on plaintext
CN103812658B (en) A kind of secure communication protocols based on stream cipher
CN104240177B (en) A kind of color image encrypting method based on chaos system and fraction Fourier conversion
CN104202147B (en) A kind of encryption method based on geo-information product feature
CN101582170B (en) Remote sensing image encryption method based on elliptic curve cryptosystem
CN111835766B (en) Re-random public key encryption and decryption method
CN109918922A (en) A kind of associated fractional order New chaotic image encryption method of plaintext
CN104125059A (en) Compound time varying password and time varying type data encryption method
CN103220130A (en) Encryption and decryption method of digital chaotic secure communication
Zhang Security analysis of a chaos triggered image encryption scheme
CN104579693A (en) Embedded encryption method based on high-order second-order logistic mapping and embedded encryption device based on high-order second-order logistic mapping

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150701

WD01 Invention patent application deemed withdrawn after publication