CN114157433A - Encryption method and system for chaotic optical communication system with key and plaintext associated - Google Patents

Encryption method and system for chaotic optical communication system with key and plaintext associated Download PDF

Info

Publication number
CN114157433A
CN114157433A CN202111442032.3A CN202111442032A CN114157433A CN 114157433 A CN114157433 A CN 114157433A CN 202111442032 A CN202111442032 A CN 202111442032A CN 114157433 A CN114157433 A CN 114157433A
Authority
CN
China
Prior art keywords
chaotic
key
dna
plaintext
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111442032.3A
Other languages
Chinese (zh)
Other versions
CN114157433B (en
Inventor
张琦
忻向军
王芸
姚海鹏
张尼
高然
田凤
田清华
燕玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
6th Research Institute of China Electronics Corp
Original Assignee
Beijing University of Posts and Telecommunications
6th Research Institute of China Electronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications, 6th Research Institute of China Electronics Corp filed Critical Beijing University of Posts and Telecommunications
Priority to CN202111442032.3A priority Critical patent/CN114157433B/en
Publication of CN114157433A publication Critical patent/CN114157433A/en
Application granted granted Critical
Publication of CN114157433B publication Critical patent/CN114157433B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/50Transmitters
    • H04B10/516Details of coding or modulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Abstract

The invention discloses a method and a system for encrypting a key and plaintext associated chaotic optical communication system, which are different from the traditional encryption algorithm, combine a high-dimensional chaotic system with DNA coding operation, associate a plaintext with an external key by utilizing a hash function to generate an internal key, increase a key space, trigger an n-dimensional hyperchaotic system and logic mapping to generate a random sequence, effectively resist known plaintext attack and selected plaintext attack, better resist exhaustion and statistical attack and differential attack, and improve the security of transmitted data. Meanwhile, dynamic DNA coding encryption is adopted, so that the security of an encryption algorithm is greatly improved, the correlation among keys is reduced, the difficulty of ciphertext cracking is increased, and the security performance of the system is further improved.

Description

Encryption method and system for chaotic optical communication system with key and plaintext associated
Technical Field
The invention relates to an optical transmission technology in the technical field of optical communication, in particular to a method and a system for encrypting a chaotic optical communication system with a secret key and a plaintext associated.
Background
With the rapid development of many application programs such as a 5G network, an internet of things, a wireless sensor network, health monitoring and the like, the data security problem becomes more important, and the data transmission security is severely challenged due to the data explosion-type growth problem, so that the reliability requirement of people on communication is continuously improved.
In a current-stage network system, the 5G network is high in laying cost, a large amount of labor cost and hardware cost are consumed, a 4G network and a 5G network coexist in the current stage and continue for a period of time in the future, and the data transmission problem of the orthogonal frequency division multiplexing technology is still important research work by virtue of the advantages of the orthogonal frequency division multiplexing technology, such as flexible time-frequency resource allocation, high spectrum efficiency and strong tolerance to dispersion. However, due to the downlink broadcast characteristic of the actual passive optical network system, the system is easily subjected to malicious eavesdropping or attack by an illegal optical network access unit, and user data with weak security is potentially threatened due to data theft.
At present, researchers have proposed various schemes for improving the security performance of PON in both the upper layer and the physical layer, such as MAC. The solution at the upper layer is provided on the premise that the physical layer is not attacked, and the physical layer solution can effectively provide comprehensive protection for the system. In the physical layer scheme, the chaos-based encryption method is considered to be a promising scheme due to the unique advantages of randomness, ergodicity and the like, and comprises a chaos encryption method based on a photoelectric device and a digital chaos encryption method. The encryption method based on the photoelectric device generates a secret key by utilizing the nonlinearity of the device, and the device with specific parameter configuration needs to be configured, so that the realization difficulty and the cost are higher for the PON; digital encryption technology is easily combined with DSP technology and thus is receiving wide attention. However, most of the traditional physical layer digital encryption technology is that the plaintext and the external key are split and have no relation; and the selection of the DNA coding mode is relatively fixed, the dynamic encryption of the system is not realized, the difficulty of ciphertext cracking is low, and the safety of data transmission is seriously influenced.
Disclosure of Invention
Aiming at the problems, the invention provides the encryption method and the encryption system of the chaotic optical communication system with the key associated with the plaintext, so that the difficulty of ciphertext cracking is increased, and the safety of data transmission is improved.
In order to achieve the above purpose, the invention provides the following technical scheme:
a chaotic optical communication system encryption method with a key associated with a plaintext comprises the following steps:
s1, the plaintext and the external key are processed by the Hash function to respectively obtain the Hash values of the plaintext and the external key, and the Hash function is processed to obtain the internal key K1、K2、……、Kn、L1、L2、……、Ln
S2, L obtained in step S11、L2、……、LnGenerating a mapping sequence as an initial value of chaotic mapping, and carrying out XOR operation on the mapping sequence and the original text data stream;
s3, K obtained in step S11、K2、……、KnTriggering the n-dimensional hyper-chaotic system as an initial state value to generate a random chaotic sequence X, Y, Z, W for coding DNAAnd encrypting to perform dynamic control;
s4, dynamically selecting a coding mapping rule of the DNA through the chaos sequence X, Y, dynamically selecting an operation rule of DNA base pairing through the chaos sequence Z, and dynamically decoding through the chaos sequence W.
Further, the hash function in step S1 may be any common function such as SHA-512, SHA-256, etc.
Further, step S3 uses the Runge-Kutta algorithm to find the hyper-chaotic sequence.
Further, the encoding of the DNA in step S3 is realized by using the biological characteristics of the DNA, such as A-T complementation, G-C complementation principle, and 0,1 complementation principle in binary number.
Further, the encoding method of the DNA in step S3 is: two-digit binary numbers are expressed by base, and the DNA coding rules meeting the complementary rules are eight types:
rule 1, respectively encoding corresponding binary streams 00, 01, 10 and 11 to be encoded into A, C, G, T;
rule 2, respectively encoding corresponding binary streams 00, 01, 10 and 11 to be encoded into A, G, C, T;
rule 3, respectively encoding corresponding binary streams 00, 01, 10 and 11 to be encoded into C, A, T, G;
rule 4, encode the corresponding binary streams 00, 01, 10, 11 to be encoded into G, A, T, C respectively;
rule 5, respectively encoding the corresponding binary streams 00, 01, 10 and 11 to be encoded into C, T, A, G;
rule 6, encode the corresponding binary streams 00, 01, 10, 11 to be encoded into G, T, A, C, respectively;
rule 7, encode the corresponding binary streams 00, 01, 10, 11 to be encoded into T, C, G, A, respectively;
rule 8, encode T, G, C, A for the corresponding binary streams 00, 01, 10, 11 to be encoded, respectively.
Further, in step S3, the DNA encryption is performed by addition, subtraction, or exclusive or of the bases.
Further, the DNA encryption operation rule of step S3 is:
Figure BDA0003383790930000031
further, the decoding manner in step S4 is to convert the encrypted DNA sequence into a binary stream.
Further, the decoding process in step S4 is the inverse process of encryption, the rules of DNA addition and DNA subtraction are interchanged in the decryption operation, and the rule of exclusive or operation is not changed.
The invention also provides a chaotic optical communication system encryption system with a key associated with a plaintext, which is characterized by comprising a high-dimensional hyper-chaotic system, a Hash encryption function module and a DNA coding encryption module and being used for realizing the method
Compared with the prior art, the invention has the beneficial effects that:
the encryption method and the encryption system of the chaotic optical communication system with the key associated with the plaintext are different from the traditional encryption algorithm, the high-dimensional chaotic system is combined with DNA coding operation, the plaintext is associated with an external key by utilizing a hash function, an internal key is generated, a key space is increased, an n-dimensional hyper-chaotic system and logic mapping are triggered to generate a random sequence, known plaintext and selected plaintext attack are effectively resisted, exhaustion, statistical attack and differential attack can be well resisted, and the security of data transmission is improved. Meanwhile, dynamic DNA coding encryption is adopted, so that the security of an encryption algorithm is greatly improved, the correlation among keys is reduced, the difficulty of ciphertext cracking is increased, and the security performance of the system is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the 4-dimensional hyper-chaotic system, the SHA-512 hash function, and the one-dimensional Logistic chaotic map are taken as examples and the drawings needed to be used in the examples are briefly described below, it is obvious that the drawings in the following description are only some examples described in the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings.
Fig. 1 is a frame diagram of a chaotic optical communication system in which a secret key and a plaintext are associated according to the present invention.
Fig. 2 is a flowchart of an encryption method for a chaotic optical communication system in which a secret key is associated with a plaintext according to the present invention.
Fig. 3 is a flowchart of a chaotic optical communication method for associating a secret key with a plaintext according to an embodiment of the present invention.
Fig. 4 is a bifurcation diagram of Logistic mapping according to an embodiment of the present invention.
Fig. 5 is an attractor phase diagram of the hyper-chaotic system according to the embodiment of the present invention.
Fig. 6 is a flowchart of decryption according to an embodiment of the present invention.
Detailed Description
The chaotic optical communication system with the key associated with the plaintext, provided by the invention, has a system framework as shown in fig. 1, and a system encryption method as shown in fig. 2, and comprises the following steps:
s1, the plaintext and the external key are processed by the Hash function to respectively obtain the Hash values of the plaintext and the external key, and the Hash function is processed to obtain the internal key K1、K2、……、Kn、L1、L2、……、Ln
S2, L obtained in step S11、L2、……、LnGenerating a mapping sequence as an initial value of chaotic mapping, and carrying out XOR operation on the mapping sequence and the original text data stream;
s3, K obtained in step S11、K2、……、KnTriggering the n-dimensional hyper-chaotic system to generate a random chaotic sequence X, Y, Z, W as an initial state value, and dynamically controlling DNA coding and encryption;
s4, dynamically selecting a coding mapping rule of the DNA through the chaos sequence X, Y, dynamically selecting an operation rule of DNA base pairing through the chaos sequence Z, and dynamically decoding through the chaos sequence W.
In order to better understand the technical solution, the method of the present invention will be described in detail below with reference to the accompanying drawings and taking a 4-dimensional hyper-chaotic system (4-dimensional LV system), a SHA-512 hash function, and a one-dimensional Logistic chaotic map as examples.
As shown in fig. 1, a specific method of the chaotic optical communication system in which a secret key and a plaintext are associated according to an embodiment of the present invention is shown in fig. 3, and the chaotic optical communication system includes the following steps:
(1) the original binary bit stream and the external secret key input SHA-512 function respectively obtain 512bit hash values h1、h2So that the external key is associated with the plaintext. H is to be1、h2H combined end to end into 1024 bits3Then inputting the hash value K into an SHA-512 function to obtain a hash value K of 512 bits, averagely dividing the K into 8 parts with the length of 64 bits, and respectively taking the first 32 bits of the 64 bits as K in consideration of the complexity of a system algorithm1、K2、K3、K4、L1The sensitivity of the internal key to the plaintext and the external key is improved. If higher precision and larger key space are desired, K can be made1、K2、K3、K4、L1Has a length of 64 bits.
The hash function can convert information with different lengths into information with a fixed length, and the SHA-512 function used in the method can convert the input of the function into 512 bits. The SHA-512 function is extremely sensitive to initial values, and any slight difference in the input content will cause a huge change in the calculated hash value.
(2) L obtained in step 11Processing to obtain initial value of Logistic chaotic mapping so as to generate mapping sequence XnAnd performing XOR operation on the sequence Data and the original text Data stream to obtain a sequence Data _ xornSo that the external key is again associated with the plaintext.
The Logistic mapping model is classical, is a time-discrete power system in nature, and is mainly used for analyzing and researching complex systems such as the power system, a fractal system and the like. The iterative formula is as follows:
xn+1=μxn(1-xn)
wherein x isnE (0,1), n is 1,2, …, when mu e is 3.569945627,4]When the sequence xnIs in a chaotic state.
The bifurcation diagram of Logistic mapping is shown in fig. 4, and it is found from the bifurcation diagram that the chaotic sequences corresponding to different parameters μ have different mapping values, and when μ is less than 3.7, x isnThe values are less; when μ is less than a certain value, the chaos will disappear. As μ gets closer to 4, the entire image appears to be a pseudo-randomly distributed case, with [0,1 [ ]]The uniform distribution is very much like.
In order to obtain a chaotic sequence with good pseudo-randomness, mu of the embodiment is 3.99. In addition, the initial value x1After processing of L1 x 10 x 9, in order to obtain a chaotic sequence with better randomness, 2000 terms are calculated, and the first 2000 terms are removed when taking the sequence.
To make xnTaking two values of 0 and 1, the chaos sequence x generated in this embodiment is selectednCarry out the remainder and get the new 0,1 sequence X by the rounding calculationnThe formula is as follows:
Xn=floor(mod(xn*104,2))
(3) k obtained in step 11、K2、K3、K4After processing, obtaining an initial state value x0、y0、z0、w0The high-dimensional system is triggered to generate a chaotic sequence X, Y, Z, W, and dynamic control is performed on DNA coding and encryption, so that the randomness of the encryption process is improved. The DNA coding is realized by utilizing the biological characteristics of DNA, namely A-T complementation and G-C complementation, and the DNA encryption is realized by utilizing addition and subtraction and XOR operation on bases.
(i) The hyper-chaotic system is described as follows:
Figure BDA0003383790930000061
wherein x, y, z and w are state variables, a, b and c are parameters of the system, and d is a parameter of the pending control gain.
For the above formula, let the Lyapunov exponent of the system be λi(i ═ 1,2,3,4), and λ1234. When a ═36,b=3,c=20,-0.35<d is less than or equal to 1.30, and the initial state value x0、y0、z0、w0In the ranges of the initial values of x, y, z and w, respectively, and in the ranges of (-25, 25), (-40, 40), (0, 60) and (-200, 300), respectively, lambda12>0,λ3=0,λ4<0, and λ1234<And 0, meeting the two conditions, and being called a hyper-chaotic system.
For K obtained in step 11、K2、K3、K4In order to satisfy the initial value range of the hyper-chaotic system, the embodiment obtains x by the following processing0、y0、z0、w0
x0=floor(mod(K1,24))+1
y0=floor(mod(K2,39))+1
z0=floor(mod(K3,59))+1
w0=floor(mod(K4,299))+1
Wherein x0、y0、z0、w0For the initial value of the hyper-chaotic system, mod (x, y) is the remainder operation, floor (x) is the down-rounding function.
In addition, values of parameters a, b, c and d in this embodiment are 36, 3, 20 and 1.2, respectively, a fourth-order Runge-Kutta algorithm is adopted to carry out discretization processing on the Lv hyper-chaotic system, in order to obtain a chaotic sequence with better randomness, an iteration step h is taken as 0.1, 2000 items are calculated more, the first 2000 items are removed during sequence taking, and MATLAB simulation is carried out to obtain a hyper-chaotic system attractor phase diagram as shown in FIG. 5, wherein FIG. 5(a), FIG. 5(b) and FIG. 5(c) respectively show motion trajectories and state distributions of the system under three conditions of z-y-u (w), y-x-u (w) and x-y-z. As can be seen from the figure, the hyper-chaotic system related by the embodiment has extremely fine phase-space mixing. The system state surrounds a certain region in the phase space, and after a certain number of iterations, the evolution of each state finally enters the region and is performed in the region all the time.
(ii) DNA encoding encryption
The dynamic DNA coding method is characterized in that two-digit binary numbers are represented by bases according to the biological principles of base pairing rules of A-T complementation and G-C complementation and the idea of 0 and 1 complementation in binary numbers, and the DNA coding rules meeting the complementation rules are represented by eight types:
Figure BDA0003383790930000071
Figure BDA0003383790930000081
x, Y sequences generated by the chaotic system are processed as follows to obtain positive integer random sequences with the value range of 1-8, so that X is dynamically selectednAnd Data xornBase coding rules:
X′=floor(mod(X*10^4,8))+1
Y′=floor(mod(Y*10^4,8))+1
if one item of the chaotic sequence X ', Y' is 1, selecting rule 1 during coding, and respectively coding corresponding binary streams 00, 01, 10 and 11 to be coded into A, G, C, T; others may be analogized. XnThe base sequence after the coding was designated as base1, Data xornThe base sequence after coding was designated as base 2.
The DNA sequence operation comprises addition and subtraction and exclusive-or operation, and the specific operation rule is as follows:
Figure BDA0003383790930000082
the Z sequence generated by the chaotic system is processed as follows to obtain a positive integer random sequence with a value range of 1-3, so that the operation rules of base1 and base2 are dynamically selected:
Z′=floor(mod(Z*10^4,3))+1
if one item of the chaotic sequence Z' is 1, the selected operation rule is addition, and the rest is analogized. The sequences after the base1 and base2 sequences are calculated are denoted as dnaEncrypted.
(4) And (3) dynamically selecting a decoding mode by using the sequence W generated in the step (3) to convert the encrypted DNA sequence into a binary stream. Decoding has eight rules as encoding mode, and the process is the inverse process of encoding.
The method comprises the following steps of obtaining a positive integer random sequence with a value range of 1-8 after a W sequence generated by the chaotic system is processed as follows, and dynamically selecting a decoding rule of dnajencrypted:
W′=floor(mod(W*10^4,3))+1
if one item of the chaotic sequence W' is 1, selecting rule 1 during decoding, and respectively decoding corresponding A, G, C, T to be decoded into binary streams 00, 01, 10 and 11; others may be analogized.
(5) And correspondingly modulating the encrypted data and sending the data into a channel for transmission.
(6) And demodulating and decrypting the received signal at the receiving end to finally obtain original data. The decryption is the reverse of the encryption. As shown in fig. 6, at K1、K2、K3、K4Triggering a high-dimensional Lu system to generate a chaotic sequence X, Y, Z, W as an initial state value, wherein the processing of X, Y, Z, W is the same as that in the step 3; l is1Triggering Logistic to generate a chaotic sequence; and carrying out decryption operation under the Lu's hyperchaotic sequence, wherein the DNA addition rule and the DNA subtraction rule are interchanged in the decryption operation, the XOR operation rule is unchanged, and the processing of other steps is the same as that of the encryption operation.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: it is to be understood that modifications may be made to the technical solutions described in the foregoing embodiments, or equivalents may be substituted for some of the technical features thereof, but such modifications or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A chaotic optical communication system encryption method with a key associated with a plaintext is characterized by comprising the following steps:
s1, the plaintext and the external key are processed by the Hash function to respectively obtain the Hash values of the plaintext and the external key, and the Hash function is processed to obtain the internal key K1、K2、……、Kn、L1、L2、……、Ln
S2, L obtained in step S11、L2、……、LnGenerating a mapping sequence as an initial value of chaotic mapping, and carrying out XOR operation on the mapping sequence and the original text data stream;
s3, K obtained in step S11、K2、……、KnTriggering the n-dimensional hyper-chaotic system to generate a random chaotic sequence X, Y, Z, W as an initial state value, and dynamically controlling DNA coding and encryption;
s4, dynamically selecting a coding mapping rule of the DNA through the chaos sequence X, Y, dynamically selecting an operation rule of DNA base pairing through the chaos sequence Z, and dynamically decoding through the chaos sequence W.
2. The encryption method for the chaotic optical communication system in which the secret key is associated with the plaintext according to claim 1, wherein the hash function in step S1 comprises a SHA-512 or SHA-256 function.
3. The encryption method of the chaotic optical communication system with the key associated with the plaintext according to claim 1, wherein the step S3 employs a Runge-Kutta algorithm to obtain the hyper-chaotic sequence.
4. The encryption method of the chaotic optical communication system in which the secret key is associated with the plaintext according to claim 1, wherein the encoding of the DNA in step S3 is implemented by using a-T complementary principle, a G-C complementary principle and a 0,1 complementary principle in binary number of the biological characteristics of the DNA.
5. The encryption method of the chaotic optical communication system with the key correlated with the plaintext according to claim 4, wherein the encoding method of the DNA in the step S3 is as follows: two-digit binary numbers are expressed by base, and the DNA coding rules meeting the complementary rules are eight types:
rule 1, respectively encoding corresponding binary streams 00, 01, 10 and 11 to be encoded into A, C, G, T;
rule 2, respectively encoding corresponding binary streams 00, 01, 10 and 11 to be encoded into A, G, C, T;
rule 3, respectively encoding corresponding binary streams 00, 01, 10 and 11 to be encoded into C, A, T, G;
rule 4, encode the corresponding binary streams 00, 01, 10, 11 to be encoded into G, A, T, C respectively;
rule 5, respectively encoding the corresponding binary streams 00, 01, 10 and 11 to be encoded into C, T, A, G;
rule 6, encode the corresponding binary streams 00, 01, 10, 11 to be encoded into G, T, A, C, respectively;
rule 7, encode the corresponding binary streams 00, 01, 10, 11 to be encoded into T, C, G, A, respectively;
rule 8, encode T, G, C, A for the corresponding binary streams 00, 01, 10, 11 to be encoded, respectively.
6. The encryption method of the chaotic optical communication system with the key correlated with the plaintext according to claim 1, wherein the DNA encryption in step S3 is implemented by performing addition, subtraction and XOR on the bases.
7. The encryption method of the chaotic optical communication system with the key correlated with the plaintext according to claim 6, wherein the DNA encryption operation rule of the step S3 is as follows:
Figure FDA0003383790920000021
8. the encryption method of the chaotic optical communication system in which the secret key is associated with the plaintext according to claim 1, wherein the decoding manner in the step S4 is to convert the encrypted DNA sequence into a binary stream.
9. The encryption method of the chaotic optical communication system with the key correlated with the plaintext according to claim 1, wherein the decoding process in step S4 is an inverse process of the encryption, the DNA addition and DNA subtraction rules are interchanged in the decryption operation, and the xor operation rule is not changed.
10. A chaotic optical communication system encryption system with a key associated with a plaintext, which is characterized by comprising an n-dimensional hyper-chaotic system, a hash encryption function module and a DNA coding encryption module and is used for realizing the method of any one of claims 1 to 9.
CN202111442032.3A 2021-11-30 2021-11-30 Encryption method and system for chaotic optical communication system with secret key and plaintext associated Active CN114157433B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111442032.3A CN114157433B (en) 2021-11-30 2021-11-30 Encryption method and system for chaotic optical communication system with secret key and plaintext associated

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111442032.3A CN114157433B (en) 2021-11-30 2021-11-30 Encryption method and system for chaotic optical communication system with secret key and plaintext associated

Publications (2)

Publication Number Publication Date
CN114157433A true CN114157433A (en) 2022-03-08
CN114157433B CN114157433B (en) 2024-04-02

Family

ID=80784413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111442032.3A Active CN114157433B (en) 2021-11-30 2021-11-30 Encryption method and system for chaotic optical communication system with secret key and plaintext associated

Country Status (1)

Country Link
CN (1) CN114157433B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115941189A (en) * 2023-03-14 2023-04-07 无锡弘鼎软件科技有限公司 Encryption method for document data

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5452358A (en) * 1994-02-08 1995-09-19 Apple Computer, Inc. Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing a data dependent encryption function
EA201600099A1 (en) * 2015-12-22 2017-05-31 Белорусский Государственный Университет (Бгу) METHOD OF ENCRYPTION OF DATA WITH CHAOTIC CHANGES OF THE ROUND KEY BASED ON DYNAMIC CHAOS
CN107610037A (en) * 2017-09-29 2018-01-19 重庆第二师范学院 A kind of image encryption method and device for merging more chaotic maps and DNA encoding
CN108365947A (en) * 2018-03-05 2018-08-03 郑州轻工业学院 A kind of image encryption method based on Feistel networks Yu dynamic DNA encoding
CN108388808A (en) * 2018-03-05 2018-08-10 郑州轻工业学院 Image encryption method based on Xi Er encryption and dynamic DNA encoding
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
CN110879895A (en) * 2019-11-12 2020-03-13 安徽理工大学 Color image block encryption algorithm based on hyperchaotic system and DNA sequence
CN113297607A (en) * 2021-06-25 2021-08-24 燕山大学 Image compression encryption and decryption method based on compressed sensing and DNA coding
CN113644985A (en) * 2021-06-24 2021-11-12 安徽继远软件有限公司 Ultra-long distance transmission method and system based on cellular automaton and DNA coding

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5452358A (en) * 1994-02-08 1995-09-19 Apple Computer, Inc. Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing a data dependent encryption function
EA201600099A1 (en) * 2015-12-22 2017-05-31 Белорусский Государственный Университет (Бгу) METHOD OF ENCRYPTION OF DATA WITH CHAOTIC CHANGES OF THE ROUND KEY BASED ON DYNAMIC CHAOS
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
CN107610037A (en) * 2017-09-29 2018-01-19 重庆第二师范学院 A kind of image encryption method and device for merging more chaotic maps and DNA encoding
CN108365947A (en) * 2018-03-05 2018-08-03 郑州轻工业学院 A kind of image encryption method based on Feistel networks Yu dynamic DNA encoding
CN108388808A (en) * 2018-03-05 2018-08-10 郑州轻工业学院 Image encryption method based on Xi Er encryption and dynamic DNA encoding
CN110879895A (en) * 2019-11-12 2020-03-13 安徽理工大学 Color image block encryption algorithm based on hyperchaotic system and DNA sequence
CN113644985A (en) * 2021-06-24 2021-11-12 安徽继远软件有限公司 Ultra-long distance transmission method and system based on cellular automaton and DNA coding
CN113297607A (en) * 2021-06-25 2021-08-24 燕山大学 Image compression encryption and decryption method based on compressed sensing and DNA coding

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张勋才;刘奕杉;崔光照;: "基于DNA编码和超混沌系统的图像加密算法", 计算机应用研究, no. 04 *
李蓝航: "基于DNA 序列和动态索引扩散的图像加密算法", 《广西师范大学学报(自然科学版)》, vol. 39, no. 3 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115941189A (en) * 2023-03-14 2023-04-07 无锡弘鼎软件科技有限公司 Encryption method for document data
CN115941189B (en) * 2023-03-14 2023-05-05 无锡弘鼎软件科技有限公司 Encryption method for document data

Also Published As

Publication number Publication date
CN114157433B (en) 2024-04-02

Similar Documents

Publication Publication Date Title
Jasra et al. Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system
Liu et al. Color image encryption algorithm based on DNA coding and double chaos system
Niu et al. An image encryption approach based on chaotic maps and genetic operations
Seyedzadeh et al. A novel color image encryption algorithm based on spatial permutation and quantum chaotic map
Chien et al. Design of secure digital communication systems using chaotic modulation, cryptography and chaotic synchronization
Amani et al. A new approach in adaptive encryption algorithm for color images based on DNA sequence operation and hyper-chaotic system
Gnanajeyaraman et al. Audio encryption using higher dimensional chaotic map
Liu et al. An image encryption scheme based on hyper chaotic system and DNA with fixed secret keys
Aslam et al. Fourth order MCA and chaos-based image encryption scheme
Fu-Yan et al. Image encryption using high-dimension chaotic system
Sha et al. An image encryption scheme based on IAVL permutation scheme and DNA operations
Liu et al. A novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and self-adapting permutation
Dagadu et al. An image cryptosystem based on pseudorandomly enhanced chaotic DNA and random permutation
Pavithran et al. A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems
Mohan et al. Security analysis and modification of classical encryption scheme
CN112202511A (en) Physical layer key generation method and system based on channel characteristics
Zhang et al. A novel chaotic image encryption algorithm based on latin square and random shift
Guanghui et al. Chaotic image encryption based on running-key related to plaintext
Al-Arjan et al. Intelligent security in the era of AI: The key vulnerability of RC4 algorithm
CN114157433B (en) Encryption method and system for chaotic optical communication system with secret key and plaintext associated
Nkapkop et al. A fast image encryption algorithm based on chaotic maps and the linear diophantine equation
Chen et al. A novel digital color image encryption algorithm based on a new 4-D hyper-chaotic system and an improved S-box
Babu et al. Higher dimensional chaos for Audio encryption
Hammood et al. Enhancing security and speed of RC4
Kumari et al. Dna encrypting rules with chaotic maps for medical image encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant