CN107733634A - A kind of lightweight chaos authentication encryption method based on displacement coupling - Google Patents

A kind of lightweight chaos authentication encryption method based on displacement coupling Download PDF

Info

Publication number
CN107733634A
CN107733634A CN201711077892.5A CN201711077892A CN107733634A CN 107733634 A CN107733634 A CN 107733634A CN 201711077892 A CN201711077892 A CN 201711077892A CN 107733634 A CN107733634 A CN 107733634A
Authority
CN
China
Prior art keywords
chaos
coupling
image lattice
key generator
chaotic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711077892.5A
Other languages
Chinese (zh)
Inventor
王小敏
郑启明
张文芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southwest Jiaotong University
Original Assignee
Southwest Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southwest Jiaotong University filed Critical Southwest Jiaotong University
Priority to CN201711077892.5A priority Critical patent/CN107733634A/en
Publication of CN107733634A publication Critical patent/CN107733634A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of lightweight chaos authentication encryption method based on displacement coupling.Integer chaos coupling image lattice of the construction suitable for integer field first, then local succeesion equation of the static S boxes as integer chaos coupling image lattice is introduced, construct Chaotic Permutation coupling image lattice, image lattice map construction key generator is finally coupled with displacement, realizes a kind of lightweight chaos authentication encryption method based on displacement coupling.The relatively common chaos encrypting method of the present invention has higher encryption performance, suitable for parallel optimization and it is easy to hardware realization, the confidentiality and integrality of data transfer can be ensured simultaneously under scarcity of resources environment, available for meeting the demand such as Security Data Transmission, verification data legitimacy between cloud computing subordinate's Internet of things node.

Description

A kind of lightweight chaos authentication encryption method based on displacement coupling
Technical field
The present invention relates to a kind of integrated authentication encryption algorithm, is based particularly on the integrated light weight level chaos that displacement couples Authentication encryption method, available under resource constrained environment ensure data confidentiality, guarantee data integrity and appraising datum close The occasions such as method.
Background technology
With the fast development of information technology, in industrial circle, economic field, Public Service Field and field of administration, Cloud computing technology provides efficient solution by the characteristics of its facility and flexible expansion.At the same time, due to cloud computing skill The characteristic of art, a kind of level of security of people's demand all the more surmounts the information security framework of Identity Authentication Mode, unauthorized to avoid User contacts and manipulated cloud computing system.
In railway signal field, the intelligent comprehensive operation management system based on cloud computing technology has obtained the wide of people General concern, the system aim to provide a kind of efficient, automation public transportation service.It is intelligent comprehensive The basis of conjunction operational system is the magnanimity railway signal system by railway dedicated network, Internet of Things and mobile network's real-time collecting Data, therefore, the efficient Internet of Things that can protect data safety are the important components of the system.Based on Internet of Things cloud computing Data and automation O&M are closely bound up in the intelligent railway system of technology, wherein, protection data exempt from unauthorized manipulation Integrality and protection sensitive data from the confidentiality of leakage be also research the most important thing.At present, people are generally applied in combination AES protects the information security in data transfer with message authentication code (MAC).Two subject matters be present in this method: First, there is natural defect in part combination, can improve information security hidden danger on the contrary;2nd, using two kinds of algorithms in computing resource Bigger burden is caused in nervous Internet of Things.Consider construction, O&M cost and the data safety of intelligent railway Internet of Things Demand, the integrated authentication encryption algorithm of lightweight can meet above-mentioned condition, and under equal conditions have greater security.
Consider for safety and technological reserve, although existing a variety of traditional authentication encryption algorithms at present, government organs With research field still authentication encryption algorithm of the demand based on new way, to resist the worsening situation of Information Security Risk. Nearly ten years, scholar has found ergodic, initial value sensitivity, boundedness and the structural complexity of chaos system and the expansion of cryptography Dissipate, obscure, pseudo-randomness and attack complexity it is corresponding, whereby Chaos Encryption Technology become field of cryptography research heat One of point.On the other hand, also there is certain limitation in Chaos Encryption Technology:Most chaos cipher systems constantly iterate to calculate generation Keying sequence, therefore its computational efficiency is low relative to classical symmetric cryptography;Chaos system digitlization causes dynamics to degenerate, Digita1 chaotic systems system is caused to show periodically, to be unfavorable for diffusivity, the initial value sensitivity of chaos cipher system, show as close Key reduced space, cipher safety reduce.
At present, the authentication encryption algorithm based on chaos system mainly has following a few classes:
1. based on chaos system generation S boxes, as the core password part in conventional encryption algorithm, there is provided obscure.It is this Method substantially still falls within conventional cipher system, and its security depends on the performance and cryptographic system structure of S boxes.It is for example, literary Offer " An efficient approach for the construction of LFT S-boxes using chaotic logistic map”(IqtadarHussain,Tariq Shah,Muhammad Asif Gondal,Hasan Mahmood, Nonlinear Dynamics,74(1-2):133-140,
2012) replacement S boxes are synthesized using chaotic Logistic map in linear fraction transformation, by chaos system not Certainty, randomness is provided for S boxes.
2. using chaotic maps design key generator, chaos stream cipher system is provided on this basis.Chaos stream cipher Constantly iterative calculation chaotic maps take more computing resources, universal enciphering rate to export key stream, compared to conventional cipher Slowly.For example, document " Design of fast one-pass authenticated and randomized encryption scheme using reversible cellular automata”(Kamel Mohamed Faraoun, Communication in Nonlinear Science and Numerical Simulation,19(9):3136-3148, 2014) the quick chaos authentication encryption algorithm with reversible Cellular Automaton for Simulating Tumor, this method introduce random initial in initialization Vector, security depend on reversible cellular automaton in itself.
3. combining chaotic maps technology, realizing has targetedly Chaotic Image Encryption Algorithm.According to image single channel or Triple channel matrix data characteristic, based on chaology, realize be effective against linear and non-thread sexual assault image encryption or Watermarking algorithm.Such as:Document " A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA‐2”(R.Guesmi,M.a.B.Farah,A.Kachouri, M.Samet, Nonlinear Dynamics, 1-14,2015) by one kind combine SHA-2 with being set based on chaos DNA encoding technology Chaotic Image Encryption Algorithm has been counted, while has improved code efficiency and security.
With the high speed development of modern computer science and technology, safety of the novel cipher analytical technology to conventional cipher system Property cause great impact, research enthusiasm of the people to Chaos Immune Algorithm grows to even greater heights in recent years, for solve information security threats Provide new approaches.
The content of the invention
The purpose of the present invention is to overcome the low problem of efficiency of Chaos Encryption Technology generally existing, under resource sleepiness environment Ensure the confidentiality and integrality of data transfer, there is provided a kind of to realize the high integrated light weight level chaos of encryption efficiency suitable for hardware Authentication encryption method.
The present invention realizes its goal of the invention, and used technical scheme is:Lightweight chaos certification based on displacement coupling Encryption method, its step are:
A. Chaotic Permutation coupling image lattice are built
NoteFor local grid state (byte), S () corresponding to the n-th moment coordinate i:G(28)→G(28) Any S boxes mapping for meeting password rule is represented, it is following as the local evolution equation of integer chaos coupling image lattice, construction Integer chaos based on the displacement of static S boxes couples image lattice, i.e. Chaotic Permutation coupling image lattice:
Wherein,Represent the XOR of bit base;Represent that the mould in units of byte adds computing;
B. image lattice are coupled as password part using Chaotic Permutation, builds key generator
(B.1) input parameter of note key generator isThe output key stream of key generator isThen Ii∈G(28) and Oi∈G(28) it is respectively that I, O internal coordinate areLocal byte;Remember ISn ∈(G(28))mFor the internal state of the n-th moment key generator, its data length is m bytes;Note For internal state ISnMiddle coordinate is i state byte, the local grid of Chaotic Permutation coupling image lattice in corresponding step AThen it is as follows to exchange flow for the input and output of key generator:
Wherein,The local state of image lattice is coupled for Chaotic Permutation in step A, byHanded over by above-mentioned input and output Get in return;
(B.2) alternative manner of image lattice is coupled according to step A Chaotic Permutation, it is internal for the renewal of key generator iteration State, obtain next round internal state ISn+1, i.e.,:WhereinTo use Chaotic Permutation in step A Couple the wheel number of image lattice iteration renewal;
(B.3) it is the single-wheel workflow of key generator according to step (B.1) and step (B.2), note U, its feature is such as Under:
(ISn+1,O)←U(ISn,I)
Wherein, different working stages is according to authentication encryption algorithm, O can be exported or abandoned;
C. according to key stream generator in step B, authentication encryption method is realized in a step, is comprised the following steps:
(C.1) initialization key generator, with key K ∈ (G (28))mAs initial internal state, with initial vectorAs the input I of key generator, realize that two-wheeled internal state updates, and give up output O;
(C.2) additional data AD is handled, fills additional dataTo be split as a Group data block, successively by ADiInternal state, i.e. IS are updated as Ii=U (ISi-1,ADi),i∈[1,a];
(C.3) encrypt, fill clear dataTo be split as b group clear datas Block, successively by MiAs the I of key generator, the encrypted cipher text block using O as outputI.e. (ISa+i,Ci)=U (ISa+i-1,Mi);
(C.4) authenticating tag, note are calculatedWith KpreAs I more New internal state, i.e. ISa+m+1=U (ISa+m,Kpre), obtain label:The T of τ bit lengths makees before interception For authentication output label, i.e. Tτ∈G(2τ);
(C.5) verification decryption, relative to step (C.3), decrypts M first1, i.e.,Then Remaining ciphertext blocks are decrypted successively, i.e.,:Complete decryption Afterwards, verification label T ' (C.4) is recalculated according to step, is verified if T '=T successfully and export all decryption ciphertexts;Otherwise school Test failure and abandon all decryption ciphertexts.
Compared with prior art, the beneficial effects of the invention are as follows:
1. present invention introduces displacement coupling image lattice to provide diffusion property, static S boxes are introduced as displacement coupling image The local succeesion equation of lattice is to provide aliasing characteristics, the encryption chip with needing extra FPGA, CPLD, single-chip microcomputer in the prior art Compare, simple in construction, Project Realization cost is low.
2. the present invention is relative high with other chaos authentication encryption algorithms, encryption efficiency, it is easy to accomplish local parallel calculates, and fits For computing resource scarcity environment.
Brief description of the drawings
Fig. 1 is the key generator structure chart of authenticated encryption system of the present invention.
Fig. 2 is the authenticated encryption flow chart of authentication encryption method of the present invention.
Embodiment
Below in conjunction with drawings and examples, the present invention is described in further detail, its step is:
Step 1:A S box for meeting password standard is chosen, as shown in table 1, the chaos as displacement coupling image lattice is drilled It is that S boxes generate state renewal equation, wherein S (0)=245, S (16)=56, S (33)=77 to become equation.According to the S box structures of selection Build Chaotic Permutation coupling image lattice.
The nonlinear Static S box mapping tables of table 1
Step 2:State renewal equation is generated according to S boxes in step 1, remembers that S boxes are mapped as S () in step 1, according to Abovementioned steps A, takesWhereinExist for displacement coupling image i-th of grid of lattice The state inscribed during n.
Step 3:The coupling input and key stream that I, O are internal state, note are remembered respectivelyFor the i-th Byte of n moment position Internal state,With step 2 iteration IS 'n, it is repeated 17 times, obtains ISn+1
Step 4:Key Key and initialization vector IV is randomly generated, is recognized according to displacement coupling image lattice iteration initialization Demonstrate,prove encryption system internal state IS0.As table 2 shows, Key, initialization IV are generated at random, initial internal state I S is used as using Key-2, IS is updated using IV as I according to step 3-2Obtain IS-1, IS is updated using IV as I again-1Obtain IS0, so far step 4 knot Beam.
The authenticated encryption actual result of table 2
Step 5:Handle additional data.If additional data AD be present, filling AD make its data length for 128 × n | n ∈ Z+Bit, and 128 bits are divided into a data block successively.As table 2 shows, according to step 3 using AD as input I renewals IS0 To IS1, AD to send in plain text.
Step 6:Encryption data.It is similar with step 3, filling M make its data length for 128 × n | n ∈ Z+Bit, and 128 bits are divided into a data block successively, encrypt each Plaintext block M respectivelynObtain corresponding ciphertext blocks Cn.As table 2 shows, according to Step 3 is with M1C is obtained as I1And update IS1Obtain IS2, by that analogy, according to M2Obtain C2And IS3
Step 7:Calculate authenticating tag.According to the content of the invention (C.4) and table 2, with front half section Key (i.e.: 0x1699F8897D59F065A14F9C9B999DB1CF) as I renewals IS3Obtain IS4, with Key and IS4Coupling, after interception 128 bits, obtain authenticating tag T.
The chaos encrypting method performance comparision of table 3
The present invention is a kind of based on the lightweight chaos authentication encryption method for replacing coupling, relatively common chaos authenticated encryption Algorithm takes few computing resource, algorithm is applied to resource constrained environment or real time computation system.By encrypting each byte The computational efficiency of demand cpu cycle number (Cycles per Byte, CPB) this Indexes Comparison chaos authentication encryption method, numerical value More low then performance is better.As table 3 shows, the inventive method calculates performance far better than common chaos encrypting method, meets that resource is deficient Ensure the demand of data transfer secret and integrality under weary environment.

Claims (3)

1. a kind of lightweight chaos authentication encryption method based on displacement coupling, it is characterised in that comprise the following steps:
A. Chaotic Permutation coupling image lattice are built
NoteFor local grid state (byte), S corresponding to the n-th moment coordinate i:G(28)→G(28) represent any Meet the S boxes mapping of password rule, as the local evolution equation of integer chaos coupling image lattice, construct below based on static state The integer chaos coupling image lattice of S boxes displacement, i.e. Chaotic Permutation coupling image lattice:
Wherein,Represent the XOR of bit base;Represent that the mould in units of byte adds computing;
B. image lattice are coupled as password part using Chaotic Permutation, builds key generator
(B.1) input parameter of note key generator isThe output key stream of key generator isThen Ii∈G(28) and Oi∈G(28) it is respectively that I, O internal coordinate areLocal byte;Remember ISn ∈(G(28))mFor the internal state of the n-th moment key generator, its data length is m bytes;Note For internal state ISnMiddle coordinate is i state byte, the local grid of Chaotic Permutation coupling image lattice in corresponding step AThen It is as follows that the input and output of key generator exchange flow:
Wherein,The local state of image lattice is coupled for Chaotic Permutation in step A, byExchanged by above-mentioned input and output Arrive;
(B.2) alternative manner of image lattice is coupled according to step A Chaotic Permutation, updates internal shape for key generator iteration State, obtain next round internal state ISn+1, i.e.,:WhereinTo use Chaotic Permutation coupling in step A Close the wheel number of image lattice iteration renewal;
(B.3) it is the single-wheel workflow of key generator according to step (B.1) and step (B.2), note U, its feature is as follows:
(ISn+1,O)←U(ISn,I)
Wherein, different working stages is according to authentication encryption algorithm, O can be exported or abandoned;
C. according to key stream generator in step B, authentication encryption method is realized in a step, is comprised the following steps:
(C.1) initialization key generator, with key K ∈ (G (28))mAs initial internal state, with initial vectorAs the input I of key generator, realize that two-wheeled internal state updates, and give up output O;
(C.2) additional data AD is handled, fills additional dataTo be split as a group numbers According to block, successively by ADiInternal state, i.e. IS are updated as Ii=U (ISi-1,Di),∈[1,a];
(C.3) encrypt, fill clear dataTo be split as b group block of plaintext data, according to It is secondary by MiAs the I of key generator, the encrypted cipher text block using O as outputThat is (ISa+i, Ci)=U (ISa+i-1,Mi);
(C.4) authenticating tag, note are calculatedWith KpreAs in I renewals Portion's state, i.e. ISa+m+1=U (ISa+m,Kpre), obtain label:The T of τ bit lengths is as defeated before interception Go out authenticating tag, i.e. Tτ∈G(2τ);
(C.5) verification decryption, relative to step (C.3), decrypts M first1, i.e.,Then successively Remaining ciphertext blocks are decrypted, i.e.,:After completing decryption, according to Verification label T ' (C.4) is recalculated according to step, is verified if T '=T successfully and exports all decryption ciphertexts;Otherwise verification is lost Lose and abandon all decryption ciphertexts;
So far, the lightweight chaos authentication encryption method based on displacement coupling is realized.
A kind of 2. lightweight chaos authentication encryption method based on displacement coupling according to claim 1, it is characterised in that: Byte length in the step (B.1) to step (C.5) is that the grid sum of Chaotic Permutation coupling image lattice is m=16 × k, k∈Z+
A kind of 3. lightweight chaos authentication encryption method based on displacement coupling according to claim 1, it is characterised in that: Chaotic Permutation coupling image lattice in the step (A) are based on (G (2 by S boxes as local succeesion equation, construction8))mIn domain Discrete Chaotic Map.
CN201711077892.5A 2017-11-06 2017-11-06 A kind of lightweight chaos authentication encryption method based on displacement coupling Pending CN107733634A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711077892.5A CN107733634A (en) 2017-11-06 2017-11-06 A kind of lightweight chaos authentication encryption method based on displacement coupling

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711077892.5A CN107733634A (en) 2017-11-06 2017-11-06 A kind of lightweight chaos authentication encryption method based on displacement coupling

Publications (1)

Publication Number Publication Date
CN107733634A true CN107733634A (en) 2018-02-23

Family

ID=61221943

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711077892.5A Pending CN107733634A (en) 2017-11-06 2017-11-06 A kind of lightweight chaos authentication encryption method based on displacement coupling

Country Status (1)

Country Link
CN (1) CN107733634A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109600620A (en) * 2018-12-07 2019-04-09 四川长虹电器股份有限公司 Video file guard method
CN114826728A (en) * 2022-04-21 2022-07-29 北京中宇万通科技股份有限公司 Device authentication method, internet of things terminal device, electronic device and storage medium
CN117278324A (en) * 2023-11-17 2023-12-22 北京亚康万玮信息技术股份有限公司 Message encryption transmission method and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109600620A (en) * 2018-12-07 2019-04-09 四川长虹电器股份有限公司 Video file guard method
CN109600620B (en) * 2018-12-07 2021-03-16 四川长虹电器股份有限公司 Video file protection method
CN114826728A (en) * 2022-04-21 2022-07-29 北京中宇万通科技股份有限公司 Device authentication method, internet of things terminal device, electronic device and storage medium
CN114826728B (en) * 2022-04-21 2024-03-15 北京中宇万通科技股份有限公司 Equipment authentication method, internet of things terminal equipment, electronic equipment and storage medium
CN117278324A (en) * 2023-11-17 2023-12-22 北京亚康万玮信息技术股份有限公司 Message encryption transmission method and system
CN117278324B (en) * 2023-11-17 2024-01-19 北京亚康万玮信息技术股份有限公司 Message encryption transmission method and system

Similar Documents

Publication Publication Date Title
KR102136904B1 (en) Shared secret key generation device, encryption device, decryption device, shared secret key generation method, encryption method, decryption method, and program
CN106656475B (en) Novel symmetric key encryption method for high-speed encryption
CN103329478B (en) The cipher processing method of cryptographic system and cryptographic system
CN104363215B (en) A kind of encryption method and system based on attribute
CN101447870B (en) Safe storage method of private key based on technology of distributed password
CN104320393B (en) The controllable efficient attribute base proxy re-encryption method of re-encryption
CN109660555A (en) Content safety sharing method and system based on proxy re-encryption
CN106663387A (en) Encryption/decryption function generating method, an encryption/decryption method and related apparatuses
CN104333446B (en) A kind of novel ultra-light magnitude QTL block cipher implementation method
CN101262341A (en) A mixed encryption method in session system
CN106411518A (en) Symmetric white box encryption method with unfixed key and apparatus
CN101814985B (en) Block cipher system using multi-chaotic mapping multi-dynamic S-box
CN103532701A (en) Encryption and decryption method for numeric type data
CN105162590B (en) Parallel homomorphism data ciphering method in a kind of cloud computing environment
CN110474761A (en) One kind 16 takes turns SM4-256 whitepack password implementation method
CN107733634A (en) A kind of lightweight chaos authentication encryption method based on displacement coupling
CN109861809A (en) A kind of random encipher-decipher method of grouping of functionization
CN110795762A (en) Reserved format encryption method based on stream cipher
CN104396182A (en) Method of encrypting data
CN106059752A (en) White-box cryptography encryption-decryption method based on expansion ciphertext
CN104753947A (en) Attribute-based verifiable outsourcing decryption system and method with fixed ciphertext length
CN109688143A (en) A kind of cluster data mining method towards secret protection in cloud environment
JP2011512562A (en) Random encryption and decryption method for access and communication data
CN101841415A (en) Word-oriented key stream generating method and encrypting method
CN101826959B (en) Byte-oriented key stream generation method and encryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180223

WD01 Invention patent application deemed withdrawn after publication