CN107733634A - A kind of lightweight chaos authentication encryption method based on displacement coupling - Google Patents
A kind of lightweight chaos authentication encryption method based on displacement coupling Download PDFInfo
- Publication number
- CN107733634A CN107733634A CN201711077892.5A CN201711077892A CN107733634A CN 107733634 A CN107733634 A CN 107733634A CN 201711077892 A CN201711077892 A CN 201711077892A CN 107733634 A CN107733634 A CN 107733634A
- Authority
- CN
- China
- Prior art keywords
- chaos
- coupling
- image lattice
- key generator
- chaotic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of lightweight chaos authentication encryption method based on displacement coupling.Integer chaos coupling image lattice of the construction suitable for integer field first, then local succeesion equation of the static S boxes as integer chaos coupling image lattice is introduced, construct Chaotic Permutation coupling image lattice, image lattice map construction key generator is finally coupled with displacement, realizes a kind of lightweight chaos authentication encryption method based on displacement coupling.The relatively common chaos encrypting method of the present invention has higher encryption performance, suitable for parallel optimization and it is easy to hardware realization, the confidentiality and integrality of data transfer can be ensured simultaneously under scarcity of resources environment, available for meeting the demand such as Security Data Transmission, verification data legitimacy between cloud computing subordinate's Internet of things node.
Description
Technical field
The present invention relates to a kind of integrated authentication encryption algorithm, is based particularly on the integrated light weight level chaos that displacement couples
Authentication encryption method, available under resource constrained environment ensure data confidentiality, guarantee data integrity and appraising datum close
The occasions such as method.
Background technology
With the fast development of information technology, in industrial circle, economic field, Public Service Field and field of administration,
Cloud computing technology provides efficient solution by the characteristics of its facility and flexible expansion.At the same time, due to cloud computing skill
The characteristic of art, a kind of level of security of people's demand all the more surmounts the information security framework of Identity Authentication Mode, unauthorized to avoid
User contacts and manipulated cloud computing system.
In railway signal field, the intelligent comprehensive operation management system based on cloud computing technology has obtained the wide of people
General concern, the system aim to provide a kind of efficient, automation public transportation service.It is intelligent comprehensive
The basis of conjunction operational system is the magnanimity railway signal system by railway dedicated network, Internet of Things and mobile network's real-time collecting
Data, therefore, the efficient Internet of Things that can protect data safety are the important components of the system.Based on Internet of Things cloud computing
Data and automation O&M are closely bound up in the intelligent railway system of technology, wherein, protection data exempt from unauthorized manipulation
Integrality and protection sensitive data from the confidentiality of leakage be also research the most important thing.At present, people are generally applied in combination
AES protects the information security in data transfer with message authentication code (MAC).Two subject matters be present in this method:
First, there is natural defect in part combination, can improve information security hidden danger on the contrary;2nd, using two kinds of algorithms in computing resource
Bigger burden is caused in nervous Internet of Things.Consider construction, O&M cost and the data safety of intelligent railway Internet of Things
Demand, the integrated authentication encryption algorithm of lightweight can meet above-mentioned condition, and under equal conditions have greater security.
Consider for safety and technological reserve, although existing a variety of traditional authentication encryption algorithms at present, government organs
With research field still authentication encryption algorithm of the demand based on new way, to resist the worsening situation of Information Security Risk.
Nearly ten years, scholar has found ergodic, initial value sensitivity, boundedness and the structural complexity of chaos system and the expansion of cryptography
Dissipate, obscure, pseudo-randomness and attack complexity it is corresponding, whereby Chaos Encryption Technology become field of cryptography research heat
One of point.On the other hand, also there is certain limitation in Chaos Encryption Technology:Most chaos cipher systems constantly iterate to calculate generation
Keying sequence, therefore its computational efficiency is low relative to classical symmetric cryptography;Chaos system digitlization causes dynamics to degenerate,
Digita1 chaotic systems system is caused to show periodically, to be unfavorable for diffusivity, the initial value sensitivity of chaos cipher system, show as close
Key reduced space, cipher safety reduce.
At present, the authentication encryption algorithm based on chaos system mainly has following a few classes:
1. based on chaos system generation S boxes, as the core password part in conventional encryption algorithm, there is provided obscure.It is this
Method substantially still falls within conventional cipher system, and its security depends on the performance and cryptographic system structure of S boxes.It is for example, literary
Offer " An efficient approach for the construction of LFT S-boxes using chaotic
logistic map”(IqtadarHussain,Tariq Shah,Muhammad Asif Gondal,Hasan Mahmood,
Nonlinear Dynamics,74(1-2):133-140,
2012) replacement S boxes are synthesized using chaotic Logistic map in linear fraction transformation, by chaos system not
Certainty, randomness is provided for S boxes.
2. using chaotic maps design key generator, chaos stream cipher system is provided on this basis.Chaos stream cipher
Constantly iterative calculation chaotic maps take more computing resources, universal enciphering rate to export key stream, compared to conventional cipher
Slowly.For example, document " Design of fast one-pass authenticated and randomized encryption
scheme using reversible cellular automata”(Kamel Mohamed Faraoun,
Communication in Nonlinear Science and Numerical Simulation,19(9):3136-3148,
2014) the quick chaos authentication encryption algorithm with reversible Cellular Automaton for Simulating Tumor, this method introduce random initial in initialization
Vector, security depend on reversible cellular automaton in itself.
3. combining chaotic maps technology, realizing has targetedly Chaotic Image Encryption Algorithm.According to image single channel or
Triple channel matrix data characteristic, based on chaology, realize be effective against linear and non-thread sexual assault image encryption or
Watermarking algorithm.Such as:Document " A novel chaos-based image encryption using DNA sequence
operation and Secure Hash Algorithm SHA‐2”(R.Guesmi,M.a.B.Farah,A.Kachouri,
M.Samet, Nonlinear Dynamics, 1-14,2015) by one kind combine SHA-2 with being set based on chaos DNA encoding technology
Chaotic Image Encryption Algorithm has been counted, while has improved code efficiency and security.
With the high speed development of modern computer science and technology, safety of the novel cipher analytical technology to conventional cipher system
Property cause great impact, research enthusiasm of the people to Chaos Immune Algorithm grows to even greater heights in recent years, for solve information security threats
Provide new approaches.
The content of the invention
The purpose of the present invention is to overcome the low problem of efficiency of Chaos Encryption Technology generally existing, under resource sleepiness environment
Ensure the confidentiality and integrality of data transfer, there is provided a kind of to realize the high integrated light weight level chaos of encryption efficiency suitable for hardware
Authentication encryption method.
The present invention realizes its goal of the invention, and used technical scheme is:Lightweight chaos certification based on displacement coupling
Encryption method, its step are:
A. Chaotic Permutation coupling image lattice are built
NoteFor local grid state (byte), S () corresponding to the n-th moment coordinate i:G(28)→G(28)
Any S boxes mapping for meeting password rule is represented, it is following as the local evolution equation of integer chaos coupling image lattice, construction
Integer chaos based on the displacement of static S boxes couples image lattice, i.e. Chaotic Permutation coupling image lattice:
Wherein,Represent the XOR of bit base;Represent that the mould in units of byte adds computing;
B. image lattice are coupled as password part using Chaotic Permutation, builds key generator
(B.1) input parameter of note key generator isThe output key stream of key generator isThen Ii∈G(28) and Oi∈G(28) it is respectively that I, O internal coordinate areLocal byte;Remember ISn
∈(G(28))mFor the internal state of the n-th moment key generator, its data length is m bytes;Note For internal state ISnMiddle coordinate is i state byte, the local grid of Chaotic Permutation coupling image lattice in corresponding step AThen it is as follows to exchange flow for the input and output of key generator:
Wherein,The local state of image lattice is coupled for Chaotic Permutation in step A, byHanded over by above-mentioned input and output
Get in return;
(B.2) alternative manner of image lattice is coupled according to step A Chaotic Permutation, it is internal for the renewal of key generator iteration
State, obtain next round internal state ISn+1, i.e.,:WhereinTo use Chaotic Permutation in step A
Couple the wheel number of image lattice iteration renewal;
(B.3) it is the single-wheel workflow of key generator according to step (B.1) and step (B.2), note U, its feature is such as
Under:
(ISn+1,O)←U(ISn,I)
Wherein, different working stages is according to authentication encryption algorithm, O can be exported or abandoned;
C. according to key stream generator in step B, authentication encryption method is realized in a step, is comprised the following steps:
(C.1) initialization key generator, with key K ∈ (G (28))mAs initial internal state, with initial vectorAs the input I of key generator, realize that two-wheeled internal state updates, and give up output O;
(C.2) additional data AD is handled, fills additional dataTo be split as a
Group data block, successively by ADiInternal state, i.e. IS are updated as Ii=U (ISi-1,ADi),i∈[1,a];
(C.3) encrypt, fill clear dataTo be split as b group clear datas
Block, successively by MiAs the I of key generator, the encrypted cipher text block using O as outputI.e.
(ISa+i,Ci)=U (ISa+i-1,Mi);
(C.4) authenticating tag, note are calculatedWith KpreAs I more
New internal state, i.e. ISa+m+1=U (ISa+m,Kpre), obtain label:The T of τ bit lengths makees before interception
For authentication output label, i.e. Tτ∈G(2τ);
(C.5) verification decryption, relative to step (C.3), decrypts M first1, i.e.,Then
Remaining ciphertext blocks are decrypted successively, i.e.,:Complete decryption
Afterwards, verification label T ' (C.4) is recalculated according to step, is verified if T '=T successfully and export all decryption ciphertexts;Otherwise school
Test failure and abandon all decryption ciphertexts.
Compared with prior art, the beneficial effects of the invention are as follows:
1. present invention introduces displacement coupling image lattice to provide diffusion property, static S boxes are introduced as displacement coupling image
The local succeesion equation of lattice is to provide aliasing characteristics, the encryption chip with needing extra FPGA, CPLD, single-chip microcomputer in the prior art
Compare, simple in construction, Project Realization cost is low.
2. the present invention is relative high with other chaos authentication encryption algorithms, encryption efficiency, it is easy to accomplish local parallel calculates, and fits
For computing resource scarcity environment.
Brief description of the drawings
Fig. 1 is the key generator structure chart of authenticated encryption system of the present invention.
Fig. 2 is the authenticated encryption flow chart of authentication encryption method of the present invention.
Embodiment
Below in conjunction with drawings and examples, the present invention is described in further detail, its step is:
Step 1:A S box for meeting password standard is chosen, as shown in table 1, the chaos as displacement coupling image lattice is drilled
It is that S boxes generate state renewal equation, wherein S (0)=245, S (16)=56, S (33)=77 to become equation.According to the S box structures of selection
Build Chaotic Permutation coupling image lattice.
The nonlinear Static S box mapping tables of table 1
Step 2:State renewal equation is generated according to S boxes in step 1, remembers that S boxes are mapped as S () in step 1, according to
Abovementioned steps A, takesWhereinExist for displacement coupling image i-th of grid of lattice
The state inscribed during n.
Step 3:The coupling input and key stream that I, O are internal state, note are remembered respectivelyFor the i-th Byte of n moment position
Internal state,With step 2 iteration IS 'n, it is repeated 17 times, obtains
ISn+1。
Step 4:Key Key and initialization vector IV is randomly generated, is recognized according to displacement coupling image lattice iteration initialization
Demonstrate,prove encryption system internal state IS0.As table 2 shows, Key, initialization IV are generated at random, initial internal state I S is used as using Key-2,
IS is updated using IV as I according to step 3-2Obtain IS-1, IS is updated using IV as I again-1Obtain IS0, so far step 4 knot
Beam.
The authenticated encryption actual result of table 2
Step 5:Handle additional data.If additional data AD be present, filling AD make its data length for 128 × n | n ∈ Z+Bit, and 128 bits are divided into a data block successively.As table 2 shows, according to step 3 using AD as input I renewals IS0
To IS1, AD to send in plain text.
Step 6:Encryption data.It is similar with step 3, filling M make its data length for 128 × n | n ∈ Z+Bit, and
128 bits are divided into a data block successively, encrypt each Plaintext block M respectivelynObtain corresponding ciphertext blocks Cn.As table 2 shows, according to
Step 3 is with M1C is obtained as I1And update IS1Obtain IS2, by that analogy, according to M2Obtain C2And IS3。
Step 7:Calculate authenticating tag.According to the content of the invention (C.4) and table 2, with front half section Key (i.e.:
0x1699F8897D59F065A14F9C9B999DB1CF) as I renewals IS3Obtain IS4, with Key and IS4Coupling, after interception
128 bits, obtain authenticating tag T.
The chaos encrypting method performance comparision of table 3
The present invention is a kind of based on the lightweight chaos authentication encryption method for replacing coupling, relatively common chaos authenticated encryption
Algorithm takes few computing resource, algorithm is applied to resource constrained environment or real time computation system.By encrypting each byte
The computational efficiency of demand cpu cycle number (Cycles per Byte, CPB) this Indexes Comparison chaos authentication encryption method, numerical value
More low then performance is better.As table 3 shows, the inventive method calculates performance far better than common chaos encrypting method, meets that resource is deficient
Ensure the demand of data transfer secret and integrality under weary environment.
Claims (3)
1. a kind of lightweight chaos authentication encryption method based on displacement coupling, it is characterised in that comprise the following steps:
A. Chaotic Permutation coupling image lattice are built
NoteFor local grid state (byte), S corresponding to the n-th moment coordinate i:G(28)→G(28) represent any
Meet the S boxes mapping of password rule, as the local evolution equation of integer chaos coupling image lattice, construct below based on static state
The integer chaos coupling image lattice of S boxes displacement, i.e. Chaotic Permutation coupling image lattice:
Wherein,Represent the XOR of bit base;Represent that the mould in units of byte adds computing;
B. image lattice are coupled as password part using Chaotic Permutation, builds key generator
(B.1) input parameter of note key generator isThe output key stream of key generator isThen Ii∈G(28) and Oi∈G(28) it is respectively that I, O internal coordinate areLocal byte;Remember ISn
∈(G(28))mFor the internal state of the n-th moment key generator, its data length is m bytes;Note
For internal state ISnMiddle coordinate is i state byte, the local grid of Chaotic Permutation coupling image lattice in corresponding step AThen
It is as follows that the input and output of key generator exchange flow:
Wherein,The local state of image lattice is coupled for Chaotic Permutation in step A, byExchanged by above-mentioned input and output
Arrive;
(B.2) alternative manner of image lattice is coupled according to step A Chaotic Permutation, updates internal shape for key generator iteration
State, obtain next round internal state ISn+1, i.e.,:WhereinTo use Chaotic Permutation coupling in step A
Close the wheel number of image lattice iteration renewal;
(B.3) it is the single-wheel workflow of key generator according to step (B.1) and step (B.2), note U, its feature is as follows:
(ISn+1,O)←U(ISn,I)
Wherein, different working stages is according to authentication encryption algorithm, O can be exported or abandoned;
C. according to key stream generator in step B, authentication encryption method is realized in a step, is comprised the following steps:
(C.1) initialization key generator, with key K ∈ (G (28))mAs initial internal state, with initial vectorAs the input I of key generator, realize that two-wheeled internal state updates, and give up output O;
(C.2) additional data AD is handled, fills additional dataTo be split as a group numbers
According to block, successively by ADiInternal state, i.e. IS are updated as Ii=U (ISi-1,Di),∈[1,a];
(C.3) encrypt, fill clear dataTo be split as b group block of plaintext data, according to
It is secondary by MiAs the I of key generator, the encrypted cipher text block using O as outputThat is (ISa+i,
Ci)=U (ISa+i-1,Mi);
(C.4) authenticating tag, note are calculatedWith KpreAs in I renewals
Portion's state, i.e. ISa+m+1=U (ISa+m,Kpre), obtain label:The T of τ bit lengths is as defeated before interception
Go out authenticating tag, i.e. Tτ∈G(2τ);
(C.5) verification decryption, relative to step (C.3), decrypts M first1, i.e.,Then successively
Remaining ciphertext blocks are decrypted, i.e.,:After completing decryption, according to
Verification label T ' (C.4) is recalculated according to step, is verified if T '=T successfully and exports all decryption ciphertexts;Otherwise verification is lost
Lose and abandon all decryption ciphertexts;
So far, the lightweight chaos authentication encryption method based on displacement coupling is realized.
A kind of 2. lightweight chaos authentication encryption method based on displacement coupling according to claim 1, it is characterised in that:
Byte length in the step (B.1) to step (C.5) is that the grid sum of Chaotic Permutation coupling image lattice is m=16 × k,
k∈Z+。
A kind of 3. lightweight chaos authentication encryption method based on displacement coupling according to claim 1, it is characterised in that:
Chaotic Permutation coupling image lattice in the step (A) are based on (G (2 by S boxes as local succeesion equation, construction8))mIn domain
Discrete Chaotic Map.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711077892.5A CN107733634A (en) | 2017-11-06 | 2017-11-06 | A kind of lightweight chaos authentication encryption method based on displacement coupling |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711077892.5A CN107733634A (en) | 2017-11-06 | 2017-11-06 | A kind of lightweight chaos authentication encryption method based on displacement coupling |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107733634A true CN107733634A (en) | 2018-02-23 |
Family
ID=61221943
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711077892.5A Pending CN107733634A (en) | 2017-11-06 | 2017-11-06 | A kind of lightweight chaos authentication encryption method based on displacement coupling |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107733634A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109600620A (en) * | 2018-12-07 | 2019-04-09 | 四川长虹电器股份有限公司 | Video file guard method |
CN114826728A (en) * | 2022-04-21 | 2022-07-29 | 北京中宇万通科技股份有限公司 | Device authentication method, internet of things terminal device, electronic device and storage medium |
CN117278324A (en) * | 2023-11-17 | 2023-12-22 | 北京亚康万玮信息技术股份有限公司 | Message encryption transmission method and system |
-
2017
- 2017-11-06 CN CN201711077892.5A patent/CN107733634A/en active Pending
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109600620A (en) * | 2018-12-07 | 2019-04-09 | 四川长虹电器股份有限公司 | Video file guard method |
CN109600620B (en) * | 2018-12-07 | 2021-03-16 | 四川长虹电器股份有限公司 | Video file protection method |
CN114826728A (en) * | 2022-04-21 | 2022-07-29 | 北京中宇万通科技股份有限公司 | Device authentication method, internet of things terminal device, electronic device and storage medium |
CN114826728B (en) * | 2022-04-21 | 2024-03-15 | 北京中宇万通科技股份有限公司 | Equipment authentication method, internet of things terminal equipment, electronic equipment and storage medium |
CN117278324A (en) * | 2023-11-17 | 2023-12-22 | 北京亚康万玮信息技术股份有限公司 | Message encryption transmission method and system |
CN117278324B (en) * | 2023-11-17 | 2024-01-19 | 北京亚康万玮信息技术股份有限公司 | Message encryption transmission method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102136904B1 (en) | Shared secret key generation device, encryption device, decryption device, shared secret key generation method, encryption method, decryption method, and program | |
CN106656475B (en) | Novel symmetric key encryption method for high-speed encryption | |
CN103329478B (en) | The cipher processing method of cryptographic system and cryptographic system | |
CN104363215B (en) | A kind of encryption method and system based on attribute | |
CN101447870B (en) | Safe storage method of private key based on technology of distributed password | |
CN104320393B (en) | The controllable efficient attribute base proxy re-encryption method of re-encryption | |
CN109660555A (en) | Content safety sharing method and system based on proxy re-encryption | |
CN106663387A (en) | Encryption/decryption function generating method, an encryption/decryption method and related apparatuses | |
CN104333446B (en) | A kind of novel ultra-light magnitude QTL block cipher implementation method | |
CN101262341A (en) | A mixed encryption method in session system | |
CN106411518A (en) | Symmetric white box encryption method with unfixed key and apparatus | |
CN101814985B (en) | Block cipher system using multi-chaotic mapping multi-dynamic S-box | |
CN103532701A (en) | Encryption and decryption method for numeric type data | |
CN105162590B (en) | Parallel homomorphism data ciphering method in a kind of cloud computing environment | |
CN110474761A (en) | One kind 16 takes turns SM4-256 whitepack password implementation method | |
CN107733634A (en) | A kind of lightweight chaos authentication encryption method based on displacement coupling | |
CN109861809A (en) | A kind of random encipher-decipher method of grouping of functionization | |
CN110795762A (en) | Reserved format encryption method based on stream cipher | |
CN104396182A (en) | Method of encrypting data | |
CN106059752A (en) | White-box cryptography encryption-decryption method based on expansion ciphertext | |
CN104753947A (en) | Attribute-based verifiable outsourcing decryption system and method with fixed ciphertext length | |
CN109688143A (en) | A kind of cluster data mining method towards secret protection in cloud environment | |
JP2011512562A (en) | Random encryption and decryption method for access and communication data | |
CN101841415A (en) | Word-oriented key stream generating method and encrypting method | |
CN101826959B (en) | Byte-oriented key stream generation method and encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180223 |
|
WD01 | Invention patent application deemed withdrawn after publication |