CN114157433B - Encryption method and system for chaotic optical communication system with secret key and plaintext associated - Google Patents

Encryption method and system for chaotic optical communication system with secret key and plaintext associated Download PDF

Info

Publication number
CN114157433B
CN114157433B CN202111442032.3A CN202111442032A CN114157433B CN 114157433 B CN114157433 B CN 114157433B CN 202111442032 A CN202111442032 A CN 202111442032A CN 114157433 B CN114157433 B CN 114157433B
Authority
CN
China
Prior art keywords
chaotic
plaintext
dna
encryption
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111442032.3A
Other languages
Chinese (zh)
Other versions
CN114157433A (en
Inventor
张琦
忻向军
王芸
姚海鹏
张尼
高然
田凤
田清华
燕玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
6th Research Institute of China Electronics Corp
Original Assignee
Beijing University of Posts and Telecommunications
6th Research Institute of China Electronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications, 6th Research Institute of China Electronics Corp filed Critical Beijing University of Posts and Telecommunications
Priority to CN202111442032.3A priority Critical patent/CN114157433B/en
Publication of CN114157433A publication Critical patent/CN114157433A/en
Application granted granted Critical
Publication of CN114157433B publication Critical patent/CN114157433B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/50Transmitters
    • H04B10/516Details of coding or modulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Abstract

The invention discloses a method and a system for encrypting a chaotic optical communication system with a secret key associated with a plaintext, which are different from the traditional encryption algorithm, and the method and the system are characterized in that a high-dimensional chaotic system and DNA coding operation are combined, the plaintext is associated with an external secret key by utilizing a hash function, an internal secret key is generated, the secret key space is increased, an n-dimensional hyper-chaotic system and logic mapping are triggered to generate a random sequence, known plaintext and selective plaintext attacks are effectively resisted, exhaustion, statistical attacks and differential attacks can be better resisted, and the safety of transmitted data is improved. Meanwhile, dynamic DNA coding encryption is adopted, so that the security of an encryption algorithm is greatly improved, the correlation between secret keys is reduced, the difficulty of ciphertext cracking is increased, and the security performance of a system is further improved.

Description

Encryption method and system for chaotic optical communication system with secret key and plaintext associated
Technical Field
The invention relates to an optical transmission technology in the technical field of optical communication, in particular to a method and a system for encrypting a chaotic optical communication system with a secret key and a plaintext.
Background
With the rapid development of many application programs such as 5G networks, internet of things, wireless sensor networks, health monitoring, etc., the problem of data security is becoming more important, and the problem of explosive growth of data is causing data transmission security to be severely challenged, and the demands of people on the reliability of communication are continuously increasing.
The 5G network is paved in the current stage network system with high cost, a great deal of labor cost and hardware cost are consumed, the coexistence of the 4G network and the 5G network can be continued in the current stage and in the future for a period of time, and the orthogonal frequency division multiplexing technology has the advantages of flexible time-frequency resource allocation, high frequency spectrum efficiency and strong tolerance to chromatic dispersion, and the data transmission problem is still an important research work. However, due to the downlink broadcasting characteristic of the actual passive optical network system, the system is easy to receive malicious interception or attack of an illegal optical network access unit, and the data is stolen, so that the user data with fragile security is potentially threatened.
Currently, researchers propose various schemes to improve the security performance of PON at both the upper layer and the physical layer, such as MAC. The solutions of the upper layers are all proposed on the premise that the physical layer is not attacked, and the physical layer solutions can effectively provide comprehensive protection for the system. In the physical layer scheme, the chaos-based encryption method is considered as a relatively promising scheme due to the unique advantages of randomness, ergodic property and the like, and has a chaos encryption method and a digital chaos encryption method based on an optoelectronic device. The encryption method based on the photoelectric device utilizes the nonlinearity of the device to generate the secret key, the device with specific parameter configuration is required to be equipped, and the realization difficulty and the cost are large for the PON; while digital encryption technology is easily combined with DSP technology and is therefore of great interest. However, in the conventional physical layer digital encryption technology, the plaintext and the external key are mostly split, and the conventional physical layer digital encryption technology is not associated with the external key; and the selection of the DNA coding modes is relatively fixed, the dynamic encryption is not realized on the system, the difficulty of ciphertext cracking is low, and the safety of data transmission is seriously influenced.
Disclosure of Invention
Aiming at the problems, the invention provides a method and a system for encrypting the chaotic optical communication system with the secret key and the plaintext, which increase the difficulty of ciphertext cracking and improve the safety of data transmission.
In order to achieve the above object, the present invention provides the following technical solutions:
a chaotic optical communication system encryption method with a secret key associated with a plaintext comprises the following steps:
s1, the plaintext and the external key are processed by a hash function to obtain hash values of the plaintext and the external key respectively, and the hash values are processed by the hash function to obtain an internal key K 1 、K 2 、……、K n 、L 1 、L 2 、……、L n
S2, L obtained in step S1 1 、L 2 、……、L n Generating a mapping sequence as an initial value of the chaotic mapping, and performing exclusive OR operation on the mapping sequence and an original text data stream;
s3, K obtained in the step S1 1 、K 2 、……、K n As an initial state value, triggering the n-dimensional hyper-chaotic system to generate a random chaotic sequence X, Y, Z, W, and dynamically controlling DNA coding and encryption;
s4, dynamically selecting a coding mapping rule of DNA through a chaotic sequence X, Y, dynamically selecting an operation rule of DNA base pairing through a chaotic sequence Z, and dynamically decoding through a chaotic sequence W.
Further, the hash function in step S1 may be any common function such as SHA-512, SHA-256, etc.
Further, in the step S3, a Runge-Kutta algorithm is adopted to calculate the hyper-chaos sequence.
Further, the encoding of the DNA in the step S3 is realized by utilizing the principles of A-T complementation and G-C complementation of the biological characteristics of the DNA and the principles of 0 and 1 complementation in binary numbers.
Further, the encoding method of the DNA in step S3 is as follows: the binary numbers are expressed by bases, and the following eight DNA coding rules meet the complementary rule:
rule 1, encoding the corresponding binary streams 00, 01, 10, 11 to be encoded into A, C, G, T respectively;
rule 2, encoding the corresponding binary streams 00, 01, 10, 11 to be encoded into A, G, C, T respectively;
rule 3, encoding corresponding binary streams 00, 01, 10, 11 to be encoded into C, A, T, G respectively;
rule 4, encoding corresponding binary streams 00, 01, 10, 11 to be encoded into G, A, T, C respectively;
rule 5, encoding corresponding binary streams 00, 01, 10, 11 to be encoded into C, T, A, G respectively;
rule 6, encoding corresponding binary streams 00, 01, 10, 11 to be encoded into G, T, A, C respectively;
rule 7, encoding corresponding binary streams 00, 01, 10, 11 to be encoded into T, C, G, A respectively;
rule 8 encodes the corresponding binary streams 00, 01, 10, 11 to be encoded into T, G, C, A, respectively.
Further, in step S3, the DNA encryption is performed by adding, subtracting, or performing an exclusive-or operation on the base.
Further, the DNA encryption algorithm in step S3 is:
further, the decoding method in step S4 is to convert the encrypted DNA sequence into a binary stream.
Further, the decoding process in step S4 is an inverse process of encryption, and the rules of DNA addition and DNA subtraction are interchanged in the decryption operation, and the rules of exclusive or operation are unchanged.
The invention also provides a chaotic optical communication system encryption system with the secret key associated with the plaintext, which is characterized by comprising a Gao Weichao chaotic system, a hash encryption function module and a DNA coding encryption module, and is used for realizing the method
Compared with the prior art, the invention has the beneficial effects that:
the encryption method and the encryption system for the chaotic optical communication system with the secret key and the plaintext are different from the traditional encryption algorithm, the high-dimensional chaotic system and the DNA coding operation are combined, the plaintext is associated with the external secret key by utilizing the hash function, the internal secret key is generated, the secret key space is increased, the n-dimensional hyper-chaotic system and the logic mapping are triggered to generate the random sequence, the known plaintext and the selected plaintext attack are effectively resisted, the exhaustion, the statistical attack and the differential attack can be better resisted, and the safety of data transmission is improved. Meanwhile, dynamic DNA coding encryption is adopted, so that the security of an encryption algorithm is greatly improved, the correlation between secret keys is reduced, the difficulty of ciphertext cracking is increased, and the security performance of a system is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the following description will use a 4-dimensional hyper-chaotic system, a SHA-512 hash function, and a one-dimensional Logistic chaotic map as embodiments, and simply describe the drawings that need to be used in the embodiments, and it is obvious that the drawings in the following description are only some embodiments described in the present invention, and other drawings may be obtained according to these drawings by those of ordinary skill in the art.
Fig. 1 is a block diagram of a chaotic optical communication system in which a secret key is associated with a plaintext.
Fig. 2 is a flowchart of a method for encrypting a chaotic light communication system with a secret key associated with a plaintext.
Fig. 3 is a flowchart of a chaotic optical communication method for associating a key with a plaintext according to an embodiment of the present invention.
Fig. 4 is a bifurcation diagram of the Logistic mapping according to an embodiment of the present invention.
Fig. 5 is a phase diagram of an hyperchaotic system attractor provided by an embodiment of the invention.
Fig. 6 is a decryption flowchart provided in an embodiment of the present invention.
Detailed Description
The chaotic light communication system with the secret key and the plaintext, provided by the invention, has a system frame shown in fig. 1, and a system encryption method shown in fig. 2, and comprises the following steps:
s1, the plaintext and the external key are processed by a hash function to obtain hash values of the plaintext and the external key respectively, and the hash values are processed by the hash function to obtain an internal key K 1 、K 2 、……、K n 、L 1 、L 2 、……、L n
S2, L obtained in step S1 1 、L 2 、……、L n Generating a mapping sequence as an initial value of the chaotic mapping, and performing exclusive OR operation on the mapping sequence and an original text data stream;
s3, K obtained in the step S1 1 、K 2 、……、K n As an initial state value, triggering the n-dimensional hyper-chaotic system to generate a random chaotic sequence X, Y, Z, W, and dynamically controlling DNA coding and encryption;
s4, dynamically selecting a coding mapping rule of DNA through a chaotic sequence X, Y, dynamically selecting an operation rule of DNA base pairing through a chaotic sequence Z, and dynamically decoding through a chaotic sequence W.
For better understanding of the technical scheme, a 4-dimensional hyper-chaotic system (4-dimensional LV system), an SHA-512 hash function and a one-dimensional Logistic chaotic map are taken as examples, and the method of the invention is described in detail with reference to the accompanying drawings.
The chaotic light communication system with the key and the plaintext as shown in fig. 1, provided by the embodiment of the invention, has the specific method as shown in fig. 3, and comprises the following steps:
(1) The original text binary bit stream and the external key input SHA-512 function respectively obtain 512bit hash value h 1 、h 2 The external key is associated with the plaintext. Will h 1 、h 2 H combined head and tail into 1024 bits 3 Then inputting the hash value into SHA-512 function to obtain 512bit hash value K, dividing K into 8 parts, length of 64bit, taking the first 32bit of 64bit as K respectively in consideration of system algorithm complexity 1 、K 2 、K 3 、K 4 、L 1 The sensitivity of the internal key to plaintext and external keys is improved. If higher precision and larger key space are desired, K can be made 1 、K 2 、K 3 、K 4 、L 1 Is 64 bits long.
The hash function can convert information with different lengths into information with fixed length, and the SHA-512 function used in the method can convert the input of the function into 512 bits. The SHA-512 function is extremely sensitive to initial values, and the calculated hash value will vary greatly with any subtle differences in the input content.
(2) L obtained in step 1 1 Obtaining initial value of Logistic chaotic mapping after processing to generate mapping sequence X n And exclusive-or's the Data with the original text Data stream to obtain the sequence Data-xor n So that the external key is again associated with the plaintext.
The Logistic mapping model is classical, is essentially a power system discrete in time, and is mainly used for analyzing and researching complex systems such as a power system, a fractal system and the like. The iterative formula is as follows:
x n+1 =μx n (1-x n )
wherein x is n E (0, 1), n=1, 2, …, when μ e [3.569945627,4 ]]Sequence x n In a chaotic state.
As shown in FIG. 4, the bifurcation diagram of the Logistic map shows that the chaotic sequences corresponding to different parameters μ have different mapping values, and x is smaller than 3.7 when μ is smaller than 3.7 n A few values are expected; when μ is smaller than a specific value, chaos will disappear. When μ is closer to 4, the whole image exhibits a pseudo-random distribution, and [0,1]The uniform distribution is much like.
To make the obtained chaotic sequence have good pseudo-randomMechanically, mu in this example is 3.99. In addition, the initial value x 1 After the process of =l1×10ζ9, between intervals (0, 1), 2000 more chaotic sequences are calculated to obtain better randomness, and the first 2000 are removed when the sequences are taken.
To make x n Taking two values of 0 and 1, in this embodiment, the generated chaotic sequence x is calculated n Taking the remainder and rounding down to obtain a new 0,1 sequence X n The formula is:
X n =floor(mod(x n *10 4 ,2))
(3) K obtained in step 1 1 、K 2 、K 3 、K 4 After processing, an initial state value x is obtained 0 、y 0 、z 0 、w 0 The high-dimensional system is triggered to generate a chaotic sequence X, Y, Z, W, and DNA coding and encryption are dynamically controlled, so that the randomness of the encryption process is improved. The DNA coding is realized by utilizing the biological characteristics of DNA, namely A-T complementation and G-C complementation, and the DNA encryption is realized by adding and subtracting the bases and performing exclusive-OR operation.
(i) The hyper-chaotic system is described as follows:
where x, y, z, w is the state variable, a, b, c are parameters of the system, and d is the pending control gain parameter.
For the above formula, let Lyapunov index of the system be λ i (i=1, 2,3, 4), and λ 1234 . When a=36, b=3, c=20, -0.35<d is less than or equal to 1.30, and the initial state value x 0 、y 0 、z 0 、w 0 Ranges for x, y, z and w are initial values of (-25, 25), (-40, 40), (0, 60) and (-200, 300), respectively, lambda 12 >0,λ 3 =0,λ 4 <0, and lambda 1234 <0 satisfying the above two conditions, it can be said to be a hyperchaotic system.
For K obtained in step 1 1 、K 2 、K 3 、K 4 In order to make it satisfy the initial value range of the hyper-chaotic system, the present embodiment obtains x by subjecting it to the following processing 0 、y 0 、z 0 、w 0
x 0 =floor(mod(K1,24))+1
y 0 =floor(mod(K2,39))+1
z 0 =floor(mod(K3,59))+1
w 0 =floor(mod(K4,299))+1
Wherein x is 0 、y 0 、z 0 、w 0 For the initial value of the hyper-chaotic system, mod (x, y) is the remainder operation, and floor (x) is a downward rounding function.
In addition, the values of the parameters a, b, c, d in the embodiment are 36, 3, 20 and 1.2 respectively, the four-order range-Kutta algorithm is adopted to carry out discretization processing on the Lv hyperchaotic system, in order to obtain a chaotic sequence with better randomness, the iteration step h is 0.1, 2000 items are calculated more, the first 2000 items are removed during the sequence taking, MATLAB simulation is carried out to obtain an attractor phase diagram of the hyperchaotic system, as shown in fig. 5, wherein fig. 5 (a), 5 (b) and 5 (c) respectively show the motion track and the state distribution of the system under three conditions of z-y-u (w), y-x-u (w) and x-y-z. As can be seen from the figure, the hyperchaotic system according to this example has extremely fine phase-space miscibility. The system state surrounds a certain area in the phase space, and after a certain number of iterations, the evolution of each state finally completely enters the area and is always carried out in the area.
(ii) DNA encoding encryption
The dynamic DNA coding method is based on the biological principle of complementary base pairing rules A-T and G-C, and the concept of complementary 0 and 1 in binary numbers, wherein two binary numbers are represented by bases, and the DNA coding rules meeting the complementary rules are represented by eight types:
the X, Y sequence generated by the chaotic system is processed as follows to obtain a positive integer random sequence with the value range of 1-8, thereby dynamically selecting X n And data_xor n Rules of base coding:
X′=floor(mod(X*10^4,8))+1
Y′=floor(mod(Y*10^4,8))+1
if one of the chaos sequences X ', Y' is 1, selecting rule 1 during encoding, and encoding corresponding binary streams 00, 01, 10 and 11 to be encoded into A, G, C, T respectively; and so on. X is X n The encoded base sequence is marked as base1, data_xor n The base sequence after coding was designated as base2.
The DNA sequence operation comprises addition, subtraction and exclusive OR operation, and the specific operation rules are as follows:
the Z sequence generated by the chaotic system is processed as follows to obtain a positive integer random sequence with a value range of 1-3, so that the operation rules of base1 and base2 are dynamically selected:
Z′=floor(mod(Z*10^4,3))+1
if a certain term of the chaotic sequence Z' is 1, the selected operation rule is addition, and the other terms are the same. The sequences after the base1 and base2 sequence operations are denoted as dnajencrypteds.
(4) And (3) dynamically selecting a decoding mode by utilizing the sequence W generated in the step (3) to convert the encrypted DNA sequence into a binary stream. Decoding has eight rules as in the encoding mode, and the process is the inverse of encoding.
The W sequence generated by the chaotic system is subjected to the following processing to obtain a positive integer random sequence with a value range of 1-8, so that a decoding rule of dna_encrypted is dynamically selected:
W′=floor(mod(W*10^4,3))+1
if one of the chaos sequences W' is 1, selecting rule 1 during decoding, and respectively decoding corresponding A, G, C, T to be decoded into binary streams 00, 01, 10 and 11; and so on.
(5) The encrypted data is modulated correspondingly and then sent to a channel for transmission.
(6) Demodulating and decrypting the received signal at the receiving end to finally obtain the original data. The decryption is the inverse of encryption. As shown in FIG. 6, at K 1 、K 2 、K 3 、K 4 Triggering Gao Weilv the system to generate a chaotic sequence X, Y, Z, W as an initial state value, and processing X, Y, Z, W is the same as that of the step 3; l (L) 1 Triggering Logistic to generate a chaotic sequence; and (3) performing decryption operation under the Lv's hyper-chaos sequence, wherein DNA addition and DNA subtraction rules are exchanged in the decryption operation, the exclusive OR operation rule is unchanged, and the other steps are the same as those of encryption operation.
The above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may be modified or some technical features may be replaced with others, which may not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (9)

1. The encryption method of the chaotic light communication system with the secret key associated with the plaintext is characterized by comprising the following steps of:
s1, the plaintext and the external key are processed by a hash function to obtain hash values of the plaintext and the external key respectively, and the hash values are processed by the hash function to obtain an internal key K 1 、K 2 、……、K n 、L 1 、L 2 、……、L n
S2, L obtained in step S1 1 、L 2 、……、L n Generating a map as an initial value of a chaotic mapPerforming an exclusive OR operation on the shot sequence and the original text data stream;
s3, K obtained in the step S1 1 、K 2 、……、K n As an initial state value, triggering the n-dimensional hyper-chaotic system to generate a random chaotic sequence X, Y, Z, W, and dynamically controlling DNA coding and encryption;
s4, dynamically selecting a coding mapping rule of DNA through a chaotic sequence X, Y, dynamically selecting an operation rule of DNA base pairing through a chaotic sequence Z, and dynamically decoding through a chaotic sequence W.
2. The method of claim 1, wherein the hash function in step S1 comprises a SHA-512 or SHA-256 function.
3. The encryption method of the chaotic light communication system with the secret key associated with the plaintext according to claim 1, wherein the step S3 adopts a Runge-Kutta algorithm to calculate the hyper-chaotic sequence.
4. The encryption method of a chaotic light communication system according to claim 1, wherein the encoding of the DNA in the step S3 is implemented using a-T complementation, G-C complementation principle of biological characteristics of the DNA and 0,1 complementation principle in binary numbers.
5. The encryption method of a chaotic light communication system with a secret key associated with plaintext according to claim 4, wherein the encoding method of DNA in step S3 is as follows: the binary numbers are expressed by bases, and the following eight DNA coding rules meet the complementary rule:
rule 1, encoding the corresponding binary streams 00, 01, 10, 11 to be encoded into A, C, G, T respectively;
rule 2, encoding the corresponding binary streams 00, 01, 10, 11 to be encoded into A, G, C, T respectively;
rule 3, encoding corresponding binary streams 00, 01, 10, 11 to be encoded into C, A, T, G respectively;
rule 4, encoding corresponding binary streams 00, 01, 10, 11 to be encoded into G, A, T, C respectively;
rule 5, encoding corresponding binary streams 00, 01, 10, 11 to be encoded into C, T, A, G respectively;
rule 6, encoding corresponding binary streams 00, 01, 10, 11 to be encoded into G, T, A, C respectively;
rule 7, encoding corresponding binary streams 00, 01, 10, 11 to be encoded into T, C, G, A respectively;
rule 8 encodes the corresponding binary streams 00, 01, 10, 11 to be encoded into T, G, C, A, respectively.
6. The encryption method of the chaotic light communication system with the secret key associated with the plaintext according to claim 1, wherein the encryption of the DNA in the step S3 is implemented by adding, subtracting, exclusive-or operation on bases.
7. The encryption method of the chaotic light communication system with the secret key associated with the plaintext as claimed in claim 1, wherein the decoding mode in the step S4 is to convert the encrypted DNA sequence into a binary stream.
8. The encryption method of the chaotic light communication system with the secret key associated with the plaintext according to claim 1, wherein the decoding process in the step S4 is an inverse process of encryption, and the rules of DNA addition and DNA subtraction are interchanged in the decryption operation, and the rules of exclusive or operation are unchanged.
9. A chaotic light communication system encryption system with a secret key associated with a plaintext, which is characterized by comprising an n-dimensional hyper-chaotic system, a hash encryption function module and a DNA coding encryption module, and is used for realizing the method of any one of claims 1 to 8.
CN202111442032.3A 2021-11-30 2021-11-30 Encryption method and system for chaotic optical communication system with secret key and plaintext associated Active CN114157433B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111442032.3A CN114157433B (en) 2021-11-30 2021-11-30 Encryption method and system for chaotic optical communication system with secret key and plaintext associated

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111442032.3A CN114157433B (en) 2021-11-30 2021-11-30 Encryption method and system for chaotic optical communication system with secret key and plaintext associated

Publications (2)

Publication Number Publication Date
CN114157433A CN114157433A (en) 2022-03-08
CN114157433B true CN114157433B (en) 2024-04-02

Family

ID=80784413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111442032.3A Active CN114157433B (en) 2021-11-30 2021-11-30 Encryption method and system for chaotic optical communication system with secret key and plaintext associated

Country Status (1)

Country Link
CN (1) CN114157433B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115941189B (en) * 2023-03-14 2023-05-05 无锡弘鼎软件科技有限公司 Encryption method for document data

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5452358A (en) * 1994-02-08 1995-09-19 Apple Computer, Inc. Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing a data dependent encryption function
EA201600099A1 (en) * 2015-12-22 2017-05-31 Белорусский Государственный Университет (Бгу) METHOD OF ENCRYPTION OF DATA WITH CHAOTIC CHANGES OF THE ROUND KEY BASED ON DYNAMIC CHAOS
CN107610037A (en) * 2017-09-29 2018-01-19 重庆第二师范学院 A kind of image encryption method and device for merging more chaotic maps and DNA encoding
CN108365947A (en) * 2018-03-05 2018-08-03 郑州轻工业学院 A kind of image encryption method based on Feistel networks Yu dynamic DNA encoding
CN108388808A (en) * 2018-03-05 2018-08-10 郑州轻工业学院 Image encryption method based on Xi Er encryption and dynamic DNA encoding
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
CN110879895A (en) * 2019-11-12 2020-03-13 安徽理工大学 Color image block encryption algorithm based on hyperchaotic system and DNA sequence
CN113297607A (en) * 2021-06-25 2021-08-24 燕山大学 Image compression encryption and decryption method based on compressed sensing and DNA coding
CN113644985A (en) * 2021-06-24 2021-11-12 安徽继远软件有限公司 Ultra-long distance transmission method and system based on cellular automaton and DNA coding

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5452358A (en) * 1994-02-08 1995-09-19 Apple Computer, Inc. Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing a data dependent encryption function
EA201600099A1 (en) * 2015-12-22 2017-05-31 Белорусский Государственный Университет (Бгу) METHOD OF ENCRYPTION OF DATA WITH CHAOTIC CHANGES OF THE ROUND KEY BASED ON DYNAMIC CHAOS
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
CN107610037A (en) * 2017-09-29 2018-01-19 重庆第二师范学院 A kind of image encryption method and device for merging more chaotic maps and DNA encoding
CN108365947A (en) * 2018-03-05 2018-08-03 郑州轻工业学院 A kind of image encryption method based on Feistel networks Yu dynamic DNA encoding
CN108388808A (en) * 2018-03-05 2018-08-10 郑州轻工业学院 Image encryption method based on Xi Er encryption and dynamic DNA encoding
CN110879895A (en) * 2019-11-12 2020-03-13 安徽理工大学 Color image block encryption algorithm based on hyperchaotic system and DNA sequence
CN113644985A (en) * 2021-06-24 2021-11-12 安徽继远软件有限公司 Ultra-long distance transmission method and system based on cellular automaton and DNA coding
CN113297607A (en) * 2021-06-25 2021-08-24 燕山大学 Image compression encryption and decryption method based on compressed sensing and DNA coding

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于DNA 序列和动态索引扩散的图像加密算法;李蓝航;《广西师范大学学报(自然科学版)》;第39卷(第3期);全文 *
基于DNA编码和超混沌系统的图像加密算法;张勋才;刘奕杉;崔光照;;计算机应用研究(04);全文 *

Also Published As

Publication number Publication date
CN114157433A (en) 2022-03-08

Similar Documents

Publication Publication Date Title
Ponuma et al. Compressive sensing based image compression-encryption using novel 1D-chaotic map
Chien et al. Design of secure digital communication systems using chaotic modulation, cryptography and chaotic synchronization
Niu et al. An image encryption approach based on chaotic maps and genetic operations
Sreelaja et al. Stream cipher for binary image encryption using ant colony optimization based key generation
CN109672517B (en) Encryption and decryption method of OFDM-PON system based on cellular neural network
Noura et al. A new efficient lightweight and secure image cipher scheme
CN112019321B (en) Five-dimensional optical probability shaping encryption method based on high-dimensional chaotic system
Elkandoz et al. Logistic tan map based audio steganography
CN112202511A (en) Physical layer key generation method and system based on channel characteristics
CN112448807A (en) Conservative digital chaos-based OFDM-PON physical layer encryption method for three-dimensional Arnold transformation
CN114157433B (en) Encryption method and system for chaotic optical communication system with secret key and plaintext associated
CN109743155B (en) Physical layer secure transmission method based on antenna selection differential chaos keying
CN113271201B (en) Dynamic AES physical layer data encryption method
Khan et al. Elliptic curve cryptography for the security of insecure Internet of Things
Nkapkop et al. A fast image encryption algorithm based on chaotic maps and the linear diophantine equation
Al-Mashhadi et al. Secure and time efficient hash-based message authentication algorithm for wireless sensor networks
CN114710264A (en) Physical layer encryption and decryption method and system based on Spinal code
Wu et al. A compound chaos-based encryption algorithm for vector geographic data under network circumstance
CN113644985A (en) Ultra-long distance transmission method and system based on cellular automaton and DNA coding
Zhou et al. Wireless Sensor Network Security Based on Improved Identity Encryption
Jasra et al. Mapping images over elliptic curve for encryption
CN112804049B (en) Hexagonal CAP optical transmission method based on dynamic compression and multi-chaos encryption
CN117114959B (en) Image encryption method based on key feedback mechanism of multi-parameter one-dimensional chaotic system
Appaji et al. Recent Advancements on symmetric cryptography techniques-A comprehensive Case Study
Saadi et al. Physical layer security based on chaotic maps applied to OFDM systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant