CN114157433A - Encryption method and system for chaotic optical communication system with key and plaintext associated - Google Patents
Encryption method and system for chaotic optical communication system with key and plaintext associated Download PDFInfo
- Publication number
- CN114157433A CN114157433A CN202111442032.3A CN202111442032A CN114157433A CN 114157433 A CN114157433 A CN 114157433A CN 202111442032 A CN202111442032 A CN 202111442032A CN 114157433 A CN114157433 A CN 114157433A
- Authority
- CN
- China
- Prior art keywords
- chaotic
- key
- dna
- plaintext
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000000739 chaotic effect Effects 0.000 title claims abstract description 49
- 238000000034 method Methods 0.000 title claims abstract description 39
- 230000003287 optical effect Effects 0.000 title claims abstract description 28
- 238000004891 communication Methods 0.000 title claims abstract description 26
- 238000013507 mapping Methods 0.000 claims abstract description 20
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 8
- 108020004414 DNA Proteins 0.000 claims description 38
- 230000008569 process Effects 0.000 claims description 7
- 230000000295 complement effect Effects 0.000 claims description 5
- 108091028043 Nucleic acid sequence Proteins 0.000 claims description 4
- 230000000875 corresponding effect Effects 0.000 claims 8
- 230000002596 correlated effect Effects 0.000 claims 4
- 230000001276 controlling effect Effects 0.000 claims 1
- 238000005336 cracking Methods 0.000 abstract description 4
- 230000005540 biological transmission Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000010587 phase diagram Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000006185 dispersion Substances 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000009827 uniform distribution Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/50—Transmitters
- H04B10/516—Details of coding or modulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
Abstract
The invention discloses a method and a system for encrypting a key and plaintext associated chaotic optical communication system, which are different from the traditional encryption algorithm, combine a high-dimensional chaotic system with DNA coding operation, associate a plaintext with an external key by utilizing a hash function to generate an internal key, increase a key space, trigger an n-dimensional hyperchaotic system and logic mapping to generate a random sequence, effectively resist known plaintext attack and selected plaintext attack, better resist exhaustion and statistical attack and differential attack, and improve the security of transmitted data. Meanwhile, dynamic DNA coding encryption is adopted, so that the security of an encryption algorithm is greatly improved, the correlation among keys is reduced, the difficulty of ciphertext cracking is increased, and the security performance of the system is further improved.
Description
Technical Field
The invention relates to an optical transmission technology in the technical field of optical communication, in particular to a method and a system for encrypting a chaotic optical communication system with a secret key and a plaintext associated.
Background
With the rapid development of many application programs such as a 5G network, an internet of things, a wireless sensor network, health monitoring and the like, the data security problem becomes more important, and the data transmission security is severely challenged due to the data explosion-type growth problem, so that the reliability requirement of people on communication is continuously improved.
In a current-stage network system, the 5G network is high in laying cost, a large amount of labor cost and hardware cost are consumed, a 4G network and a 5G network coexist in the current stage and continue for a period of time in the future, and the data transmission problem of the orthogonal frequency division multiplexing technology is still important research work by virtue of the advantages of the orthogonal frequency division multiplexing technology, such as flexible time-frequency resource allocation, high spectrum efficiency and strong tolerance to dispersion. However, due to the downlink broadcast characteristic of the actual passive optical network system, the system is easily subjected to malicious eavesdropping or attack by an illegal optical network access unit, and user data with weak security is potentially threatened due to data theft.
At present, researchers have proposed various schemes for improving the security performance of PON in both the upper layer and the physical layer, such as MAC. The solution at the upper layer is provided on the premise that the physical layer is not attacked, and the physical layer solution can effectively provide comprehensive protection for the system. In the physical layer scheme, the chaos-based encryption method is considered to be a promising scheme due to the unique advantages of randomness, ergodicity and the like, and comprises a chaos encryption method based on a photoelectric device and a digital chaos encryption method. The encryption method based on the photoelectric device generates a secret key by utilizing the nonlinearity of the device, and the device with specific parameter configuration needs to be configured, so that the realization difficulty and the cost are higher for the PON; digital encryption technology is easily combined with DSP technology and thus is receiving wide attention. However, most of the traditional physical layer digital encryption technology is that the plaintext and the external key are split and have no relation; and the selection of the DNA coding mode is relatively fixed, the dynamic encryption of the system is not realized, the difficulty of ciphertext cracking is low, and the safety of data transmission is seriously influenced.
Disclosure of Invention
Aiming at the problems, the invention provides the encryption method and the encryption system of the chaotic optical communication system with the key associated with the plaintext, so that the difficulty of ciphertext cracking is increased, and the safety of data transmission is improved.
In order to achieve the above purpose, the invention provides the following technical scheme:
a chaotic optical communication system encryption method with a key associated with a plaintext comprises the following steps:
s1, the plaintext and the external key are processed by the Hash function to respectively obtain the Hash values of the plaintext and the external key, and the Hash function is processed to obtain the internal key K1、K2、……、Kn、L1、L2、……、Ln;
S2, L obtained in step S11、L2、……、LnGenerating a mapping sequence as an initial value of chaotic mapping, and carrying out XOR operation on the mapping sequence and the original text data stream;
s3, K obtained in step S11、K2、……、KnTriggering the n-dimensional hyper-chaotic system as an initial state value to generate a random chaotic sequence X, Y, Z, W for coding DNAAnd encrypting to perform dynamic control;
s4, dynamically selecting a coding mapping rule of the DNA through the chaos sequence X, Y, dynamically selecting an operation rule of DNA base pairing through the chaos sequence Z, and dynamically decoding through the chaos sequence W.
Further, the hash function in step S1 may be any common function such as SHA-512, SHA-256, etc.
Further, step S3 uses the Runge-Kutta algorithm to find the hyper-chaotic sequence.
Further, the encoding of the DNA in step S3 is realized by using the biological characteristics of the DNA, such as A-T complementation, G-C complementation principle, and 0,1 complementation principle in binary number.
Further, the encoding method of the DNA in step S3 is: two-digit binary numbers are expressed by base, and the DNA coding rules meeting the complementary rules are eight types:
rule 3, respectively encoding corresponding binary streams 00, 01, 10 and 11 to be encoded into C, A, T, G;
rule 4, encode the corresponding binary streams 00, 01, 10, 11 to be encoded into G, A, T, C respectively;
rule 5, respectively encoding the corresponding binary streams 00, 01, 10 and 11 to be encoded into C, T, A, G;
rule 6, encode the corresponding binary streams 00, 01, 10, 11 to be encoded into G, T, A, C, respectively;
rule 7, encode the corresponding binary streams 00, 01, 10, 11 to be encoded into T, C, G, A, respectively;
rule 8, encode T, G, C, A for the corresponding binary streams 00, 01, 10, 11 to be encoded, respectively.
Further, in step S3, the DNA encryption is performed by addition, subtraction, or exclusive or of the bases.
Further, the DNA encryption operation rule of step S3 is:
further, the decoding manner in step S4 is to convert the encrypted DNA sequence into a binary stream.
Further, the decoding process in step S4 is the inverse process of encryption, the rules of DNA addition and DNA subtraction are interchanged in the decryption operation, and the rule of exclusive or operation is not changed.
The invention also provides a chaotic optical communication system encryption system with a key associated with a plaintext, which is characterized by comprising a high-dimensional hyper-chaotic system, a Hash encryption function module and a DNA coding encryption module and being used for realizing the method
Compared with the prior art, the invention has the beneficial effects that:
the encryption method and the encryption system of the chaotic optical communication system with the key associated with the plaintext are different from the traditional encryption algorithm, the high-dimensional chaotic system is combined with DNA coding operation, the plaintext is associated with an external key by utilizing a hash function, an internal key is generated, a key space is increased, an n-dimensional hyper-chaotic system and logic mapping are triggered to generate a random sequence, known plaintext and selected plaintext attack are effectively resisted, exhaustion, statistical attack and differential attack can be well resisted, and the security of data transmission is improved. Meanwhile, dynamic DNA coding encryption is adopted, so that the security of an encryption algorithm is greatly improved, the correlation among keys is reduced, the difficulty of ciphertext cracking is increased, and the security performance of the system is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the 4-dimensional hyper-chaotic system, the SHA-512 hash function, and the one-dimensional Logistic chaotic map are taken as examples and the drawings needed to be used in the examples are briefly described below, it is obvious that the drawings in the following description are only some examples described in the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings.
Fig. 1 is a frame diagram of a chaotic optical communication system in which a secret key and a plaintext are associated according to the present invention.
Fig. 2 is a flowchart of an encryption method for a chaotic optical communication system in which a secret key is associated with a plaintext according to the present invention.
Fig. 3 is a flowchart of a chaotic optical communication method for associating a secret key with a plaintext according to an embodiment of the present invention.
Fig. 4 is a bifurcation diagram of Logistic mapping according to an embodiment of the present invention.
Fig. 5 is an attractor phase diagram of the hyper-chaotic system according to the embodiment of the present invention.
Fig. 6 is a flowchart of decryption according to an embodiment of the present invention.
Detailed Description
The chaotic optical communication system with the key associated with the plaintext, provided by the invention, has a system framework as shown in fig. 1, and a system encryption method as shown in fig. 2, and comprises the following steps:
s1, the plaintext and the external key are processed by the Hash function to respectively obtain the Hash values of the plaintext and the external key, and the Hash function is processed to obtain the internal key K1、K2、……、Kn、L1、L2、……、Ln;
S2, L obtained in step S11、L2、……、LnGenerating a mapping sequence as an initial value of chaotic mapping, and carrying out XOR operation on the mapping sequence and the original text data stream;
s3, K obtained in step S11、K2、……、KnTriggering the n-dimensional hyper-chaotic system to generate a random chaotic sequence X, Y, Z, W as an initial state value, and dynamically controlling DNA coding and encryption;
s4, dynamically selecting a coding mapping rule of the DNA through the chaos sequence X, Y, dynamically selecting an operation rule of DNA base pairing through the chaos sequence Z, and dynamically decoding through the chaos sequence W.
In order to better understand the technical solution, the method of the present invention will be described in detail below with reference to the accompanying drawings and taking a 4-dimensional hyper-chaotic system (4-dimensional LV system), a SHA-512 hash function, and a one-dimensional Logistic chaotic map as examples.
As shown in fig. 1, a specific method of the chaotic optical communication system in which a secret key and a plaintext are associated according to an embodiment of the present invention is shown in fig. 3, and the chaotic optical communication system includes the following steps:
(1) the original binary bit stream and the external secret key input SHA-512 function respectively obtain 512bit hash values h1、h2So that the external key is associated with the plaintext. H is to be1、h2H combined end to end into 1024 bits3Then inputting the hash value K into an SHA-512 function to obtain a hash value K of 512 bits, averagely dividing the K into 8 parts with the length of 64 bits, and respectively taking the first 32 bits of the 64 bits as K in consideration of the complexity of a system algorithm1、K2、K3、K4、L1The sensitivity of the internal key to the plaintext and the external key is improved. If higher precision and larger key space are desired, K can be made1、K2、K3、K4、L1Has a length of 64 bits.
The hash function can convert information with different lengths into information with a fixed length, and the SHA-512 function used in the method can convert the input of the function into 512 bits. The SHA-512 function is extremely sensitive to initial values, and any slight difference in the input content will cause a huge change in the calculated hash value.
(2) L obtained in step 11Processing to obtain initial value of Logistic chaotic mapping so as to generate mapping sequence XnAnd performing XOR operation on the sequence Data and the original text Data stream to obtain a sequence Data _ xornSo that the external key is again associated with the plaintext.
The Logistic mapping model is classical, is a time-discrete power system in nature, and is mainly used for analyzing and researching complex systems such as the power system, a fractal system and the like. The iterative formula is as follows:
xn+1=μxn(1-xn)
wherein x isnE (0,1), n is 1,2, …, when mu e is 3.569945627,4]When the sequence xnIs in a chaotic state.
The bifurcation diagram of Logistic mapping is shown in fig. 4, and it is found from the bifurcation diagram that the chaotic sequences corresponding to different parameters μ have different mapping values, and when μ is less than 3.7, x isnThe values are less; when μ is less than a certain value, the chaos will disappear. As μ gets closer to 4, the entire image appears to be a pseudo-randomly distributed case, with [0,1 [ ]]The uniform distribution is very much like.
In order to obtain a chaotic sequence with good pseudo-randomness, mu of the embodiment is 3.99. In addition, the initial value x1After processing of L1 x 10 x 9, in order to obtain a chaotic sequence with better randomness, 2000 terms are calculated, and the first 2000 terms are removed when taking the sequence.
To make xnTaking two values of 0 and 1, the chaos sequence x generated in this embodiment is selectednCarry out the remainder and get the new 0,1 sequence X by the rounding calculationnThe formula is as follows:
Xn=floor(mod(xn*104,2))
(3) k obtained in step 11、K2、K3、K4After processing, obtaining an initial state value x0、y0、z0、w0The high-dimensional system is triggered to generate a chaotic sequence X, Y, Z, W, and dynamic control is performed on DNA coding and encryption, so that the randomness of the encryption process is improved. The DNA coding is realized by utilizing the biological characteristics of DNA, namely A-T complementation and G-C complementation, and the DNA encryption is realized by utilizing addition and subtraction and XOR operation on bases.
(i) The hyper-chaotic system is described as follows:
wherein x, y, z and w are state variables, a, b and c are parameters of the system, and d is a parameter of the pending control gain.
For the above formula, let the Lyapunov exponent of the system be λi(i ═ 1,2,3,4), and λ1>λ2>λ3>λ4. When a ═36,b=3,c=20,-0.35<d is less than or equal to 1.30, and the initial state value x0、y0、z0、w0In the ranges of the initial values of x, y, z and w, respectively, and in the ranges of (-25, 25), (-40, 40), (0, 60) and (-200, 300), respectively, lambda1>λ2>0,λ3=0,λ4<0, and λ1+λ2+λ3+λ4<And 0, meeting the two conditions, and being called a hyper-chaotic system.
For K obtained in step 11、K2、K3、K4In order to satisfy the initial value range of the hyper-chaotic system, the embodiment obtains x by the following processing0、y0、z0、w0:
x0=floor(mod(K1,24))+1
y0=floor(mod(K2,39))+1
z0=floor(mod(K3,59))+1
w0=floor(mod(K4,299))+1
Wherein x0、y0、z0、w0For the initial value of the hyper-chaotic system, mod (x, y) is the remainder operation, floor (x) is the down-rounding function.
In addition, values of parameters a, b, c and d in this embodiment are 36, 3, 20 and 1.2, respectively, a fourth-order Runge-Kutta algorithm is adopted to carry out discretization processing on the Lv hyper-chaotic system, in order to obtain a chaotic sequence with better randomness, an iteration step h is taken as 0.1, 2000 items are calculated more, the first 2000 items are removed during sequence taking, and MATLAB simulation is carried out to obtain a hyper-chaotic system attractor phase diagram as shown in FIG. 5, wherein FIG. 5(a), FIG. 5(b) and FIG. 5(c) respectively show motion trajectories and state distributions of the system under three conditions of z-y-u (w), y-x-u (w) and x-y-z. As can be seen from the figure, the hyper-chaotic system related by the embodiment has extremely fine phase-space mixing. The system state surrounds a certain region in the phase space, and after a certain number of iterations, the evolution of each state finally enters the region and is performed in the region all the time.
(ii) DNA encoding encryption
The dynamic DNA coding method is characterized in that two-digit binary numbers are represented by bases according to the biological principles of base pairing rules of A-T complementation and G-C complementation and the idea of 0 and 1 complementation in binary numbers, and the DNA coding rules meeting the complementation rules are represented by eight types:
x, Y sequences generated by the chaotic system are processed as follows to obtain positive integer random sequences with the value range of 1-8, so that X is dynamically selectednAnd Data xornBase coding rules:
X′=floor(mod(X*10^4,8))+1
Y′=floor(mod(Y*10^4,8))+1
if one item of the chaotic sequence X ', Y' is 1, selecting rule 1 during coding, and respectively coding corresponding binary streams 00, 01, 10 and 11 to be coded into A, G, C, T; others may be analogized. XnThe base sequence after the coding was designated as base1, Data xornThe base sequence after coding was designated as base 2.
The DNA sequence operation comprises addition and subtraction and exclusive-or operation, and the specific operation rule is as follows:
the Z sequence generated by the chaotic system is processed as follows to obtain a positive integer random sequence with a value range of 1-3, so that the operation rules of base1 and base2 are dynamically selected:
Z′=floor(mod(Z*10^4,3))+1
if one item of the chaotic sequence Z' is 1, the selected operation rule is addition, and the rest is analogized. The sequences after the base1 and base2 sequences are calculated are denoted as dnaEncrypted.
(4) And (3) dynamically selecting a decoding mode by using the sequence W generated in the step (3) to convert the encrypted DNA sequence into a binary stream. Decoding has eight rules as encoding mode, and the process is the inverse process of encoding.
The method comprises the following steps of obtaining a positive integer random sequence with a value range of 1-8 after a W sequence generated by the chaotic system is processed as follows, and dynamically selecting a decoding rule of dnajencrypted:
W′=floor(mod(W*10^4,3))+1
if one item of the chaotic sequence W' is 1, selecting rule 1 during decoding, and respectively decoding corresponding A, G, C, T to be decoded into binary streams 00, 01, 10 and 11; others may be analogized.
(5) And correspondingly modulating the encrypted data and sending the data into a channel for transmission.
(6) And demodulating and decrypting the received signal at the receiving end to finally obtain original data. The decryption is the reverse of the encryption. As shown in fig. 6, at K1、K2、K3、K4Triggering a high-dimensional Lu system to generate a chaotic sequence X, Y, Z, W as an initial state value, wherein the processing of X, Y, Z, W is the same as that in the step 3; l is1Triggering Logistic to generate a chaotic sequence; and carrying out decryption operation under the Lu's hyperchaotic sequence, wherein the DNA addition rule and the DNA subtraction rule are interchanged in the decryption operation, the XOR operation rule is unchanged, and the processing of other steps is the same as that of the encryption operation.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: it is to be understood that modifications may be made to the technical solutions described in the foregoing embodiments, or equivalents may be substituted for some of the technical features thereof, but such modifications or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.
Claims (10)
1. A chaotic optical communication system encryption method with a key associated with a plaintext is characterized by comprising the following steps:
s1, the plaintext and the external key are processed by the Hash function to respectively obtain the Hash values of the plaintext and the external key, and the Hash function is processed to obtain the internal key K1、K2、……、Kn、L1、L2、……、Ln;
S2, L obtained in step S11、L2、……、LnGenerating a mapping sequence as an initial value of chaotic mapping, and carrying out XOR operation on the mapping sequence and the original text data stream;
s3, K obtained in step S11、K2、……、KnTriggering the n-dimensional hyper-chaotic system to generate a random chaotic sequence X, Y, Z, W as an initial state value, and dynamically controlling DNA coding and encryption;
s4, dynamically selecting a coding mapping rule of the DNA through the chaos sequence X, Y, dynamically selecting an operation rule of DNA base pairing through the chaos sequence Z, and dynamically decoding through the chaos sequence W.
2. The encryption method for the chaotic optical communication system in which the secret key is associated with the plaintext according to claim 1, wherein the hash function in step S1 comprises a SHA-512 or SHA-256 function.
3. The encryption method of the chaotic optical communication system with the key associated with the plaintext according to claim 1, wherein the step S3 employs a Runge-Kutta algorithm to obtain the hyper-chaotic sequence.
4. The encryption method of the chaotic optical communication system in which the secret key is associated with the plaintext according to claim 1, wherein the encoding of the DNA in step S3 is implemented by using a-T complementary principle, a G-C complementary principle and a 0,1 complementary principle in binary number of the biological characteristics of the DNA.
5. The encryption method of the chaotic optical communication system with the key correlated with the plaintext according to claim 4, wherein the encoding method of the DNA in the step S3 is as follows: two-digit binary numbers are expressed by base, and the DNA coding rules meeting the complementary rules are eight types:
rule 1, respectively encoding corresponding binary streams 00, 01, 10 and 11 to be encoded into A, C, G, T;
rule 2, respectively encoding corresponding binary streams 00, 01, 10 and 11 to be encoded into A, G, C, T;
rule 3, respectively encoding corresponding binary streams 00, 01, 10 and 11 to be encoded into C, A, T, G;
rule 4, encode the corresponding binary streams 00, 01, 10, 11 to be encoded into G, A, T, C respectively;
rule 5, respectively encoding the corresponding binary streams 00, 01, 10 and 11 to be encoded into C, T, A, G;
rule 6, encode the corresponding binary streams 00, 01, 10, 11 to be encoded into G, T, A, C, respectively;
rule 7, encode the corresponding binary streams 00, 01, 10, 11 to be encoded into T, C, G, A, respectively;
rule 8, encode T, G, C, A for the corresponding binary streams 00, 01, 10, 11 to be encoded, respectively.
6. The encryption method of the chaotic optical communication system with the key correlated with the plaintext according to claim 1, wherein the DNA encryption in step S3 is implemented by performing addition, subtraction and XOR on the bases.
8. the encryption method of the chaotic optical communication system in which the secret key is associated with the plaintext according to claim 1, wherein the decoding manner in the step S4 is to convert the encrypted DNA sequence into a binary stream.
9. The encryption method of the chaotic optical communication system with the key correlated with the plaintext according to claim 1, wherein the decoding process in step S4 is an inverse process of the encryption, the DNA addition and DNA subtraction rules are interchanged in the decryption operation, and the xor operation rule is not changed.
10. A chaotic optical communication system encryption system with a key associated with a plaintext, which is characterized by comprising an n-dimensional hyper-chaotic system, a hash encryption function module and a DNA coding encryption module and is used for realizing the method of any one of claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111442032.3A CN114157433B (en) | 2021-11-30 | 2021-11-30 | Encryption method and system for chaotic optical communication system with secret key and plaintext associated |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111442032.3A CN114157433B (en) | 2021-11-30 | 2021-11-30 | Encryption method and system for chaotic optical communication system with secret key and plaintext associated |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114157433A true CN114157433A (en) | 2022-03-08 |
CN114157433B CN114157433B (en) | 2024-04-02 |
Family
ID=80784413
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111442032.3A Active CN114157433B (en) | 2021-11-30 | 2021-11-30 | Encryption method and system for chaotic optical communication system with secret key and plaintext associated |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114157433B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115941189A (en) * | 2023-03-14 | 2023-04-07 | 无锡弘鼎软件科技有限公司 | Encryption method for document data |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5452358A (en) * | 1994-02-08 | 1995-09-19 | Apple Computer, Inc. | Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing a data dependent encryption function |
EA201600099A1 (en) * | 2015-12-22 | 2017-05-31 | Белорусский Государственный Университет (Бгу) | METHOD OF ENCRYPTION OF DATA WITH CHAOTIC CHANGES OF THE ROUND KEY BASED ON DYNAMIC CHAOS |
CN107610037A (en) * | 2017-09-29 | 2018-01-19 | 重庆第二师范学院 | A kind of image encryption method and device for merging more chaotic maps and DNA encoding |
CN108365947A (en) * | 2018-03-05 | 2018-08-03 | 郑州轻工业学院 | A kind of image encryption method based on Feistel networks Yu dynamic DNA encoding |
CN108388808A (en) * | 2018-03-05 | 2018-08-10 | 郑州轻工业学院 | Image encryption method based on Xi Er encryption and dynamic DNA encoding |
WO2018153317A1 (en) * | 2017-02-24 | 2018-08-30 | 陈伟 | Chaotic map-based digital chaotic encryption method |
CN110879895A (en) * | 2019-11-12 | 2020-03-13 | 安徽理工大学 | Color image block encryption algorithm based on hyperchaotic system and DNA sequence |
CN113297607A (en) * | 2021-06-25 | 2021-08-24 | 燕山大学 | Image compression encryption and decryption method based on compressed sensing and DNA coding |
CN113644985A (en) * | 2021-06-24 | 2021-11-12 | 安徽继远软件有限公司 | Ultra-long distance transmission method and system based on cellular automaton and DNA coding |
-
2021
- 2021-11-30 CN CN202111442032.3A patent/CN114157433B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5452358A (en) * | 1994-02-08 | 1995-09-19 | Apple Computer, Inc. | Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing a data dependent encryption function |
EA201600099A1 (en) * | 2015-12-22 | 2017-05-31 | Белорусский Государственный Университет (Бгу) | METHOD OF ENCRYPTION OF DATA WITH CHAOTIC CHANGES OF THE ROUND KEY BASED ON DYNAMIC CHAOS |
WO2018153317A1 (en) * | 2017-02-24 | 2018-08-30 | 陈伟 | Chaotic map-based digital chaotic encryption method |
CN107610037A (en) * | 2017-09-29 | 2018-01-19 | 重庆第二师范学院 | A kind of image encryption method and device for merging more chaotic maps and DNA encoding |
CN108365947A (en) * | 2018-03-05 | 2018-08-03 | 郑州轻工业学院 | A kind of image encryption method based on Feistel networks Yu dynamic DNA encoding |
CN108388808A (en) * | 2018-03-05 | 2018-08-10 | 郑州轻工业学院 | Image encryption method based on Xi Er encryption and dynamic DNA encoding |
CN110879895A (en) * | 2019-11-12 | 2020-03-13 | 安徽理工大学 | Color image block encryption algorithm based on hyperchaotic system and DNA sequence |
CN113644985A (en) * | 2021-06-24 | 2021-11-12 | 安徽继远软件有限公司 | Ultra-long distance transmission method and system based on cellular automaton and DNA coding |
CN113297607A (en) * | 2021-06-25 | 2021-08-24 | 燕山大学 | Image compression encryption and decryption method based on compressed sensing and DNA coding |
Non-Patent Citations (2)
Title |
---|
张勋才;刘奕杉;崔光照;: "基于DNA编码和超混沌系统的图像加密算法", 计算机应用研究, no. 04 * |
李蓝航: "基于DNA 序列和动态索引扩散的图像加密算法", 《广西师范大学学报(自然科学版)》, vol. 39, no. 3 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115941189A (en) * | 2023-03-14 | 2023-04-07 | 无锡弘鼎软件科技有限公司 | Encryption method for document data |
CN115941189B (en) * | 2023-03-14 | 2023-05-05 | 无锡弘鼎软件科技有限公司 | Encryption method for document data |
Also Published As
Publication number | Publication date |
---|---|
CN114157433B (en) | 2024-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jasra et al. | Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system | |
Liu et al. | Color image encryption algorithm based on DNA coding and double chaos system | |
Niu et al. | An image encryption approach based on chaotic maps and genetic operations | |
Seyedzadeh et al. | A novel color image encryption algorithm based on spatial permutation and quantum chaotic map | |
Chien et al. | Design of secure digital communication systems using chaotic modulation, cryptography and chaotic synchronization | |
Amani et al. | A new approach in adaptive encryption algorithm for color images based on DNA sequence operation and hyper-chaotic system | |
Gnanajeyaraman et al. | Audio encryption using higher dimensional chaotic map | |
Liu et al. | An image encryption scheme based on hyper chaotic system and DNA with fixed secret keys | |
Aslam et al. | Fourth order MCA and chaos-based image encryption scheme | |
Fu-Yan et al. | Image encryption using high-dimension chaotic system | |
Sha et al. | An image encryption scheme based on IAVL permutation scheme and DNA operations | |
Liu et al. | A novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and self-adapting permutation | |
Dagadu et al. | An image cryptosystem based on pseudorandomly enhanced chaotic DNA and random permutation | |
Pavithran et al. | A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems | |
Mohan et al. | Security analysis and modification of classical encryption scheme | |
CN112202511A (en) | Physical layer key generation method and system based on channel characteristics | |
Zhang et al. | A novel chaotic image encryption algorithm based on latin square and random shift | |
Guanghui et al. | Chaotic image encryption based on running-key related to plaintext | |
Al-Arjan et al. | Intelligent security in the era of AI: The key vulnerability of RC4 algorithm | |
CN114157433B (en) | Encryption method and system for chaotic optical communication system with secret key and plaintext associated | |
Nkapkop et al. | A fast image encryption algorithm based on chaotic maps and the linear diophantine equation | |
Chen et al. | A novel digital color image encryption algorithm based on a new 4-D hyper-chaotic system and an improved S-box | |
Babu et al. | Higher dimensional chaos for Audio encryption | |
Hammood et al. | Enhancing security and speed of RC4 | |
Kumari et al. | Dna encrypting rules with chaotic maps for medical image encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |