CN101436928B - Parameter estimation method for chaos system - Google Patents

Parameter estimation method for chaos system Download PDF

Info

Publication number
CN101436928B
CN101436928B CN2008102367274A CN200810236727A CN101436928B CN 101436928 B CN101436928 B CN 101436928B CN 2008102367274 A CN2008102367274 A CN 2008102367274A CN 200810236727 A CN200810236727 A CN 200810236727A CN 101436928 B CN101436928 B CN 101436928B
Authority
CN
China
Prior art keywords
chaos
sequence
analyzed
parameter
chaos sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2008102367274A
Other languages
Chinese (zh)
Other versions
CN101436928A (en
Inventor
胡汉平
朱子奇
王祖喜
程孟凡
王炫聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN2008102367274A priority Critical patent/CN101436928B/en
Publication of CN101436928A publication Critical patent/CN101436928A/en
Application granted granted Critical
Publication of CN101436928B publication Critical patent/CN101436928B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Complex Calculations (AREA)

Abstract

The invention discloses a method for estimating a parameter for a chaotic system. The method comprises a chaotic system type determination process, a chaotic parameter rang estimation process and a chaotic parameter determination process. Under the condition of only obtaining a finite chaotic state sequence, the method can estimate the type and parameters of chaotic mapping. The method breaks the condition limitation that the prior chaotic parameter estimation method can only aim at the prior chaotic mapping and carry out estimation under the condition that only one of the system parameters is unknown. The parameter estimation method can be widely applied to security analysis based on a chaotic cipher system and a security communication system, does not need to be based on the chaotic mapping type, parameters and other conditions in the analytic process and has strong applicability and maneuverability.

Description

A kind of method for parameter estimation that is used for chaos system
Technical field
The invention belongs to information security safety analysis technology, be specifically related to a kind ofly, can be widely used in based on fields such as the cryptographic system of chaos and secret signalling safety analysis at chaos method for parameter estimation based on the cryptographic system and the secret signalling of chaos.
Background technology
Existing safety analysis technology at chaos cipher system and secret signalling mainly adopts as methods such as genetic algorithm, improvement particle swarm optimization algorithms to be estimated the parameter of chaotic maps.Yet in actual application, these safety analytical methods exist realizes that difficulty is big, and efficiency of evolution is low, problems such as low precision.Therefore said method only is in theoretical research stage, can not be as the safety analysis method of actual cryptographic system or secret signalling.
Paper " a kind of chaotic maps method for parameter estimation based on genetic algorithm " (is worn, Ma Xikui, Li Fucai, outstanding brave, Acta Physica Sinica, 2002 (51), 11, a kind of chaotic maps method for parameter estimation based on genetic algorithm has been proposed in P2459-4), this method is by suitable fitness function of structure, the parameter Estimation problem of chaotic maps is converted into the optimizing problem of a parameter, utilizes the global optimization search capability of genetic algorithm that it is found the solution then.Yet this method only can be meaningful at short notice.Along with the long-time evolution of system, the error between estimated parameter institute's characterization system and the real system will increase.In addition, this method only at the situation of a unknown parameters of chaotic maps, yet for the condition of whole system parameters the unknowns, can only the searching for of this method in a bigger scope, efficient is low, poor accuracy.
Summary of the invention
The object of the present invention is to provide a kind of method for parameter estimation that is used for chaos system, this method can be under the condition of unknown password system or the employed chaotic maps type of secret signalling, parameter to chaotic maps estimates that it is fast that it has analysis speed, the characteristics that accuracy is high.
For realizing purpose of the present invention, the method for parameter estimation that is used for chaos system provided by the invention, its step comprises:
(A1) according to chaos system type and parameter information, determine parameter group, the quantity of parameter group is l, and l is a positive integer;
(A2) use respectively every group of parameter generate one with the isometric comparison chaos sequence { C1 of chaos sequence to be analyzed { T (i) } j(i) }, wherein, i represents the sequence number of element in the chaos sequence to be analyzed, i=1, and 2 ..., N, N represent the length of chaos sequence to be analyzed, j represents to be used to generate the sequence number of the parameter group of this comparison chaos sequence, and j=1,2 ..., l;
(A3) calculate the nonlinear characteristic amount of chaos sequence to be analyzed { T (i) }, comprise time delay τ and embed dimension d;
(A4) according to time delay τ that calculates and embedding dimension d, chaos sequence to be analyzed { T (i) } and each are compared chaos sequence { C1 j(i) } carry out phase space reconfiguration, obtain respectively the vector sequence { T (i) } that reconstitutes and C1 ' j(i) };
T′(i)={T(i),T(i+τ),...,T(i+(d-1)τ)}
C1′ j(i)={C1 j(i),C1 j(i+τ),...,C1 j(i+(d-1)τ)}
(A5) calculate each vector sequence that reconstitutes { T (i) } and C1 ' j(i) } Central Moment Feature amount λ TWith
Figure G2008102367274D00021
(A6) according to vector sequence T (i), utilize statistical analysis technique, calculate the threshold epsilon that is used for critical parameter;
(A7) the Central Moment Feature amount λ of chaos sequence more to be analyzed TWith the Central Moment Feature amount that compares chaos sequence
Figure G2008102367274D00022
, obtain the comparison chaos sequence of its difference, with the system parameters of the comparison chaos sequence that obtains parameter Estimation result as chaos sequence to be analyzed smaller or equal to ε.
When chaos cipher system or secret signalling adopt multiple chaos system, under chaos system type condition of unknown, entering step (A1) before, according to following step the chaos sequence that chaos sequence to be analyzed and chaotic maps to be selected generate is carried out the nonlinear correlation degree relatively, determine the chaos system type that chaos cipher system to be analyzed or secret signalling are adopted when generating chaos sequence to be analyzed:
(B1) according to the design rule of chaos cipher system to be analyzed or secret signalling, the n kind chaos system type that definite random source that generates this chaos sequence to be analyzed { T (i) } can be adopted;
(B2) the n kind chaos system that utilizes above step to determine adopts classical parameter setting, generates and the identical comparison chaos sequence { C2 of chaos sequence to be analyzed { T (i) } length k(i) }, k represents to be used to generate the sequence number of the chaos system type of this comparison chaos sequence, k=1, and 2 ..., n, n represent the quantity of chaos system type;
(B3) the nonlinear characteristic amount of calculating chaos sequence to be analyzed comprises embedding dimension d and time delay τ;
(B4) according to the embedding peacekeeping time delay of determining, to chaos sequence to be analyzed { T (i) } and comparison chaos sequence { C2 k(i) } carry out phase space reconfiguration, obtain:
T′(i)={T(i),T(i+τ),...,T(i+(d-1)τ)}
C2′ k(i)={C2 k(i),C2 k(i+τ),...,C2 k(i+(d-1)τ)}
(B5) calculate T (i) and the C2 that reconstruct obtains k' (i) dynamics auto-correlation factor index, that is:
Q T _ C 2 k = lim ϵ → 0 | ln C T ( ϵ ) C C 2 k ( ϵ ) |
Wherein:
C T ( &epsiv; ) = P ( | | T &prime; ( i ) - T &prime; ( j ) | | < &epsiv; )
= 2 ( N - d ) ( N - d + 1 ) &times; &Sigma; i = 1 N - m &Sigma; j = i + 1 N - m + 1 &Theta; ( &epsiv; - | | T &prime; ( i ) - T &prime; ( j ) | | )
C C 2 k ( &epsiv; ) = P ( | | C 2 k &prime; ( i ) - C 2 k &prime; ( j ) | | < &epsiv; )
= 2 ( N - d ) ( N - d + 1 ) &times; &Sigma; i = 1 N - m &Sigma; j = i + 1 N - m + 1 &Theta; ( &epsiv; - | | C 2 k &prime; ( i ) - C 2 k &prime; ( j ) | | )
Θ is the Heaviside step function.
(B6) comparison chaos sequence and the chaos sequence to be analyzed with chaos sequence dynamics auto-correlation factor index value minimum to be analyzed results from identical chaos system; Draw the chaos system type that chaos cipher system to be analyzed or secret signalling are adopted thus when generating chaos sequence to be analyzed.
This method is compared with existing method, has overcome the condition restriction that existing chaos method for parameter estimation can only only have the condition an of the unknown to estimate at known chaotic maps and system parameters.This system can type and the parameter to chaotic maps estimate under the condition that only obtains limited chaos state sequence.This method for parameter estimation can be widely used in the safety analysis based on the cryptographic system and the secret signalling of chaos, and analytic process need not to have stronger adaptability and operability based on conditions such as chaotic maps type and parameters.Compare with documents " a kind of chaotic maps method for parameter estimation based on genetic algorithm ", the present invention has following characteristics:
(1), the chaos sequence that chaos sequence to be analyzed and chaotic maps to be selected are generated carries out the nonlinear correlation degree relatively, determine the type of chaotic maps to be analyzed, thereby can under the condition of unknown chaotic maps type, analyze, strengthen the adaptability of this analytical method.
(2), compare, seek possible the value space of parameter, dwindle the parameter search scope, improve analysis efficiency, reduction overall calculation complexity by the Central Moment Feature amount.
(3), in determining parameter space, utilize possible parameter to generate chaos sequence, the chaos sequence of chaos sequence to be analyzed and generation is compared, determine whole system parameters spans of chaotic maps to be analyzed.
Description of drawings
Fig. 1 is the flow chart of chaos method for parameter estimation of the present invention;
Fig. 2 is for determining the method flow diagram of chaotic maps type;
Fig. 3 is for determining the method flow diagram of chaos parameter value scope.
Embodiment
The present invention is further detailed explanation below in conjunction with accompanying drawing and example.
The invention provides a kind of to based on the cryptographic system of chaos and the safety analysis method of secret signalling.This method is estimated the chaos system type of cryptographic system and secret signalling employing by the chaos sequence for the treatment of that analysis collects, according to the Given informations such as parameter information of cryptographic system and secret signalling the parameter that this chaos system adopts is estimated on this basis.
As shown in Figure 1, the step of the inventive method is as follows:
(1) cryptographic system or the secret signalling based on chaos might adopt following dual mode to design random source: one, single chaos system; Two, multiple chaos system.If chaos cipher system to be analyzed or secret signalling adopt mode directly to enter step (2) first, if chaos cipher system to be analyzed or secret signalling adopt mode two, then this step is carried out the nonlinear correlation degree relatively with the chaos sequence that chaos sequence to be analyzed and chaotic maps to be selected generate, and determines the chaos system type that chaos cipher system to be analyzed or secret signalling are adopted when generating chaos sequence to be analyzed.Its specific implementation process comprises as shown in Figure 2:
(1.1) design rule of chaos cipher system to be analyzed or secret signalling, the n kind chaos system type that definite random source that generates this chaos sequence to be analyzed may be adopted;
(1.2) each chaos system that utilizes above step to determine adopts classical parameter setting, generates the comparison chaos sequence { C2 that is all length N with chaos sequence to be analyzed { T (i) } k(i) }, wherein, i represents the sequence number of element in the chaos sequence to be analyzed, i=1,2, ..., N, N represent the length of chaos sequence to be analyzed, k represents to be used to generate the sequence number of the chaos system type of this comparison chaos sequence, k=1,2 ..., n, n represent the quantity of chaos system type;
(1.3) the nonlinear characteristic amount of calculating chaos sequence to be analyzed: embed dimension d and time delay τ;
(1.4) according to the result of step (1.3), to chaos sequence to be analyzed { T (i) } and chaos sequence { C2 relatively k(i) } carry out phase space reconfiguration, obtain:
T′(i)={T(i),T(i+τ),...,T(i+(d-1)τ)}
C2′ k(i)={C2 k(i),C2 k(i+τ),...,C2 k(i+(d-1)τ)}
(1.5) calculate T (i) and the C2 that reconstruct obtains k' (i) dynamics auto-correlation factor index, that is:
Q T _ C 2 k = lim &epsiv; &RightArrow; 0 | ln C T ( &epsiv; ) C C 2 k ( &epsiv; ) |
Wherein:
C T ( &epsiv; ) = P ( | | T &prime; ( i ) - T &prime; ( j ) | | < &epsiv; )
= 2 ( N - d ) ( N - d + 1 ) &times; &Sigma; i = 1 N - m &Sigma; j = i + 1 N - m + 1 &Theta; ( &epsiv; - | | T &prime; ( i ) - T &prime; ( j ) | | )
C C 2 k ( &epsiv; ) = P ( | | C 2 k &prime; ( i ) - C 2 k &prime; ( j ) | | < &epsiv; )
= 2 ( N - d ) ( N - d + 1 ) &times; &Sigma; i = 1 N - m &Sigma; j = i + 1 N - m + 1 &Theta; ( &epsiv; - | | C 2 k &prime; ( i ) - C 2 k &prime; ( j ) | | )
Θ is the Heaviside step function.
(1.6) comparison chaos sequence and the chaos sequence to be analyzed with chaos sequence dynamics auto-correlation factor index value minimum to be analyzed results from identical chaos system.Draw the chaos system type that chaos cipher system to be analyzed or secret signalling are adopted thus when generating chaos sequence to be analyzed.
(2) can in specific scope, choose the parameter generation chaos sequence of specific parameter according to key protocol based on the cryptographic system or the secret signalling of chaos as chaos system.Therefore will in possible parameter value, compare the possible value of searching and definite parameter by the Central Moment Feature amount.Its specific implementation process comprises as shown in Figure 3:
(2.1) according to the result and the parameter information of step (1), determine possible parameter group, species number is l;
(2.2), generate and the isometric comparison chaos sequence { C1 of chaos sequence to be analyzed according to every group of possible parameter j(i) } (j=0,1,2..., l);
(2.3) result according to step (1.3) carries out phase space reconfiguration { C1 according to the method for step (1.4) to each comparison chaos sequence j(i) } (j=0,1,2... l), obtains the vector sequence after the reconstruct;
C1′ j(i)={C1 j(i),C1 j(i+τ),...,C1 j(i+(d-1)τ)}
(2.4) calculate vector sequence T (i) and the C1 ' that each reconstitutes j(i) Central Moment Feature amount λ TWith
Figure G2008102367274D00071
(2.5) according to vector sequence T (i), utilize statistical analysis technique, calculate the threshold epsilon that is used for critical parameter;
(2.6) the Central Moment Feature amount λ of chaos sequence more to be analyzed TWith the Central Moment Feature amount that compares chaos sequence
Figure G2008102367274D00072
, obtain the comparison chaos sequence of its difference, with the system parameters of the comparison chaos sequence that relatively obtains estimated result as chaos sequence to be analyzed smaller or equal to ε.
Example 1:
Suppose A for the chaos cipher system, according to its design and key protocol, known following information:
(1) this cryptographic system may be chosen a random source of conduct in a plurality of chaos systems, these chaos systems comprise the Lorenz chaos system, Chen chaos system, three kinds of three-dimensional chaos systems of Lu chaos system, and the sampling interval that produces chaos sequence is 1ms, and its chaos system equation is as follows:
Lorenz chaotic maps equation:
dx / dt = a ( y - x ) dy / dt = bx - y - xz dz / dt = xy - cz
Chen chaotic maps equation:
dx / dt = a ( y - x ) dy / dt = ( b - a ) x + by - xz dz / dt = xy - cz
Lu chaotic maps equation:
dx / dt = a ( y - x ) dy / dt = - xz + cy dz / dt = xy - bz
(2) for the Lorenz chaos system, its parameter value scope is:
a∈{x|x=7+0.2*i,i=0,1,...,30}
b∈{x|x=25+0.2*i,i=0,1,...,30}
c∈{x|x=2/3+0.2*i,i=0,1,...,20}
For the Chen chaos system, its parameter value scope is:
a∈{x|x=32+0.2*i,i=0,1,...,30}
b∈{x|x=25+0.2*i,i=0,1,...,30}
c∈{x|x=2/3+0.2*i,i=0,1,...,20}
For the Lu chaos system, its parameter value scope is:
a∈{x|x=33+0.2*i,i=0,1,...,30}
b∈{x|x=17+0.2*i,i=0,1,...,30}
c∈{x|x=1+0.2*i,i=0,1,...,20}
(3) chaos sequence to be analyzed comprises x, y, three dimension { T of z x(i) }, { T y(i) }, { T z(i) }, wherein, i represents the sequence number of element in the chaos sequence to be analyzed, i=1, and 2 ..., 1,000,000.
By analyzing known chaos sequence { T x(t i), { T y(t i), { T z(t i), the type and the system parameters of the chaos system that generates this sequence are estimated that concrete implementation method is as follows:
(1) determine the chaos system type:
(1.1), learn that the chaos cipher system may adopt following 3 kinds of chaos systems: Lorenz chaos system, Chen chaos system, Lu chaos system according to Given information (1);
(1.2) chaos system of determining according to step (1.1), generation length are 1,000,000 three-dimensional comparison chaos sequence { C2 Lorenz_x(i) }, { C2 Lorenz_y(i) }, { C2 Lorenz_z(i) }, { C2 Chen_x(i) }, { C2 Chen_y(i) }, { C2 Chen_z(i) }, { C2 Lu_x(i) }, { C2 Lu_y(i) }, { C2 Lu_z(i) }, wherein the parameter of chaos system is classical parameter setting, { a Lorenz=10, b Lorenz=28, c Lorenz=8/3}, { a Chen=35, b Chen=28, c Chen=8/3}, { a Lu=36, b Lu=20, c Lu=3};
(1.3) utilize pseudo-neighbor point to calculate the embedding dimension d of chaos sequence to be analyzed x, d y, d z, utilize mutual information method to calculate the time delay τ of chaos sequence to be analyzed x, τ y, τ z
(1.4) according to the result of step (1.3), to chaos sequence { T to be analyzed x(i) }, { T y(i) }, { T z(i) } chaos sequence { C2 and relatively Lorenz_x(i) }, { C2 Lorenz_y(i) }, { C2 Lorenz_z(i) }; { C2 Chen_x(i) }, { C2 Chen_y(i) }, { C2 Chen_z(i) }; { C2 Lu_x(i) }, { C2 Lu_y(i) }, { C2 Lu_z(i) }, carry out phase space reconfiguration, obtain the sequence { T after the reconstruct x' (i) }, { T y' (i) }, { T z' (i) }; { C2 Lorenz_x' (i) }, { C2 Lorenz_y' (i) }, { C2 Lorenz_z' (i) }; { C2 Chen_x' (i) }, { C2 Chen_y' (i) }, { C2 Chen_z' (i) }; { C2 Lu_x' (i) }, { C2 Lu_y' (i) }, { C2 Lu_z' (i) };
(1.5) calculate { T xAnd { C2 (i) } Lorenz_x(i) }; { T xAnd { C2 (i) } Chen_x(i) }; { T xAnd { C2 (i) } Lu_x(i) }; { T yAnd { C2 (i) } Lorenz_y(i) }; { T yAnd { C2 (i) } Chen_y(i) }; { T yAnd { C2 (i) } Lu_y(i) }; { T zAnd { C2 (i) } Lorenz_z(i) }; { T zAnd { C2 (i) } Chen_z(i) }; { T zAnd { C2 (i) } Lu_zDynamics auto-correlation factor index (ii) }:
Q T x _ C 2 Lorenz _ x , Q T x _ C 2 Chen _ x , Q T x _ C 2 Lu _ x
Q T y _ C 2 Lorenz _ y , Q T y _ C 2 Chen _ y , Q T y _ C 2 Lu _ y
Q T z _ C 2 Lorenz _ z , Q T z _ C 2 Chen _ z , Q T z _ C 2 Lu _ z
(1.6) the dynamics auto-correlation factor index that calculates by comparison step (1.5), the result points out:
min ( Q T x _ C 2 Lorenz _ x , Q T x _ C 2 Chen _ x , Q T x _ C 2 Lu _ x ) = Q T x _ C 2 Chen _ x
min ( Q T y _ C 2 Lorenz _ y , Q T y _ C 2 Chen _ y , Q T y _ C 2 Lu _ y ) = Q T y _ C 2 Chen _ y
min ( Q T z _ C 2 Lorenz _ z , Q T z _ C 2 Chen _ z , Q T z _ C 2 Lu _ z ) = Q T z _ C 2 Chen _ z
Be the dynamics auto-correlation factor index minimum of the comparative sequences of chaos sequence to be analyzed and Chen chaos system generation, illustrate that chaos sequence to be analyzed is to have the Chen chaos system to generate;
(2) determine the possible value of the parameter of chaos system:
(2.1) chaos system of Chen as a result and the Given information of determining according to step (1) (2) determined parameter range;
a∈{x|x=32+0.2*i,i=0,1,..,30}
b∈{x|x=25+0.2*i,i=0,1,...,30}
c∈{x|x=2/3+0.2*i,i=0,1,...,20}
(2.2) the parameter value scope of determining according to step (2.1) is utilized possible parameter group, and generation length is 1,000,000 comparison chaos sequence { C 1 x j ( i ) } , { C 1 y j ( i ) } , { C 1 z j ( i ) } , Wherein, i represents the sequence number of element in the chaos sequence to be analyzed, i=1, and 2 ..., 1,000,000, j represents to be used to generate the sequence number of the parameter group of this comparison chaos sequence, j=1,2 ..., 20181;
(2.3) result according to step (1.3) compares chaos sequence to each
Figure G2008102367274D00102
Carry out phase space reconfiguration, obtain the vector sequence after the reconstruct
Figure G2008102367274D00104
Figure G2008102367274D00105
(2.4) calculate the vector sequence { T that each reconstitutes x' (i) }, { T y' (i) }, { T z' (i) } and
Figure G2008102367274D00106
Figure G2008102367274D00107
Central Moment Feature amount λ x, λ y, λ zWith
(2.5) choose 100 respectively smaller or equal to 1,000,000 positive integer: 1,000,000,1,000,000-500,1,000,000-500 * 2 ..., 1,000,000-500 * 99, computational length is for being 1,000,000,1,000 respectively, 000-500,1,000,000-500 * 2 ..., 1,000,000-500 * 99, vector sequence { T x' (t i), { T y' (t i), { T z' (t i) the Central Moment Feature amount { &lambda; x 1 , &lambda; x 2 , &CenterDot; &CenterDot; &CenterDot; , &lambda; x 100 } , { &lambda; y 1 , &lambda; y 2 , &CenterDot; &CenterDot; &CenterDot; , &lambda; y 100 } , { &lambda; z 1 , &lambda; z 2 , &CenterDot; &CenterDot; &CenterDot; , &lambda; z 100 } . Calculate
Figure G2008102367274D001011
Variance ε x, calculate
Figure G2008102367274D001012
Variance ε y, calculate
Figure G2008102367274D001013
Variance ε z
(2.6) the Central Moment Feature amount λ of chaos sequence more to be analyzed x, λ y, λ zWith the Central Moment Feature amount that compares chaos sequence
Figure G2008102367274D00111
λ C1z, obtain its difference smaller or equal to ε x, ε y, ε yThe comparison chaos sequence, with the system parameters of the comparison chaos sequence that relatively obtains estimated result, from 20181 groups of possible parameter values, finally determined 25 groups of possible parameter values thus as chaos sequence to be analyzed.
Example 2:
Suppose B for the chaos cipher system, according to its design and parameter information, known following information:
(1) this cryptographic system utilizes the Lorenz chaos system as random source, and Lorenz chaotic maps equation is:
dx / dt = a ( y - x ) dy / dt = bx - y - xz dz / dt = xy - cz
(2) the parameter value scope of Lorenz chaos system is:
a∈{x|x=7+0.2*i,i=0,1,...,30}
b∈{x|x=25+0.2*i,i=0,1,...,30}
c∈{x|x=2/3+0.2*i,i=0,1,...,20}
(3) chaos sequence to be analyzed comprises x, y, three dimension { T of z x(i) }, { T y(i) }, { T z(i) }, the length of sequence is 1,000,000;
By analyzing known chaos sequence, the type and the system parameters of the chaos system that generates this sequence are estimated that concrete implementation method is as follows:
(1) owing to known definite chaos system type, skips steps 1 is directly estimated the parameter of chaos system;
(2) determine the possible value of the parameter of chaos system:
(2.1) determine possible parameter group according to Given information (1) and (2), have 20181 groups;
(2.2) the parameter value scope of determining according to step (2.1) is utilized possible parameter group, and generation length is 1,000,000 comparison chaos sequence { C 1 x j ( i ) } , { C 1 y j ( i ) } , { C 1 z j ( i ) } , Wherein, i represents the sequence number of element in the chaos sequence to be analyzed, i=1, and 2 ..., 1,000,000, j represents to be used to generate the sequence number of the parameter group of this comparison chaos sequence, j=1,2 ..., 20181;
(2.3) utilize pseudo-neighbor point to calculate the embedding dimension d of chaos sequence to be analyzed x, d y, d z, utilize mutual information method to calculate the time delay τ of chaos sequence to be analyzed x, τ y, τ z
(2.4) according to the result of step (1.3) to chaos sequence { T to be analyzed x(i) }, { T y(i) }, { T zAnd each chaos sequence relatively (i) } { C 1 x j ( i ) } , { C 1 y j ( i ) } , { C 1 z j ( i ) } Carry out phase space reconfiguration, obtain the vector sequence { T after the reconstruct x' (i) }, { T y' (i) }, { T z' (i) }; With { C 1 &prime; x j ( i ) } , { C 1 &prime; y j ( i ) } , { C 1 &prime; z j ( i ) } ;
(2.5) choose 200 respectively smaller or equal to 1,000,000 natural number: 1,000,000,1,000,000-100,1,000,000-100 * 2 ..., 1,000,000-100 * 199, computational length is 1,000,000,1,000 respectively, 000-100,1,000,000-100 * 2 ..., 1,000,000-100 * 199, vector sequence { T x' (t i, { T y' (t i), { T z' (t i) the Central Moment Feature amount { &lambda; x 1 , &lambda; x 2 , &CenterDot; &CenterDot; &CenterDot; , &lambda; x 200 } , { &lambda; y 1 , &lambda; y 2 , &CenterDot; &CenterDot; &CenterDot; , &lambda; y 100 } , { &lambda; z 1 , &lambda; z 2 , &CenterDot; &CenterDot; &CenterDot; , &lambda; z 200 } . Calculate
Figure G2008102367274D00125
Average E x, calculate
Figure G2008102367274D00126
Average E y, calculate
Figure G2008102367274D00127
Average E z, calculate
Figure G2008102367274D00128
And E xThe average ε of difference x, calculate
Figure G2008102367274D00129
And E yThe average ε of difference y, calculate
Figure G2008102367274D001210
And E zThe average ε of difference z
(2.6) the Central Moment Feature amount λ of chaos sequence more to be analyzed x, λ y, λ zWith the Central Moment Feature amount that compares chaos sequence
Figure G2008102367274D001211
λ C1z, obtain its difference smaller or equal to ε x, ε y, ε zThe comparison chaos sequence, with the system parameters of the comparison chaos sequence that relatively obtains estimated result, from 20181 groups of possible parameter values, finally determined 25 groups of possible parameter values thus as chaos sequence to be analyzed.
The above is preferred embodiment of the present invention, but the present invention should not be confined to the disclosed content of this embodiment and accompanying drawing.So everyly do not break away from the equivalence of finishing under the spirit disclosed in this invention or revise, all fall into the scope of protection of the invention.

Claims (1)

1. one kind at the chaos method for parameter estimation based on the cryptographic system and the secret signalling of chaos, and its step comprises:
(A1) according to chaos system type and key protocol, determine parameter group, the quantity of parameter group is l, lBe positive integer;
(A2) use respectively every group of parameter generate one with the isometric comparison chaos sequence { C1 of chaos sequence to be analyzed { T (i) } j(i) }, wherein, i represents the sequence number of element in the chaos sequence to be analyzed, i=1, and 2 ..., N, N represent the length of chaos sequence to be analyzed, j represents to be used to generate the sequence number of the parameter group of this comparison chaos sequence, and j=1,2 ..., l
(A3) calculate the nonlinear characteristic amount of chaos sequence to be analyzed { T (i) }, comprise time delay τ and embed dimension d;
(A4) according to time delay τ that calculates and embedding dimension d, chaos sequence to be analyzed { T (i) } and each are compared chaos sequence { C1 j(i) } carry out phase space reconfiguration, the vector sequence that obtains respectively reconstituting T ' (i) } and C1 ' j(i) };
T′(i)={T(i),T(i+τ),...,T(i+(d-1)τ)}
C1′ j(i)={C1 j(i),C1 j(i+τ),...,C1 j(i+(d-1)τ)}
(A5) calculate each vector sequence that reconstitutes { T ' (i) } and C1 ' j(i) } Central Moment Feature amount λ TWith
Figure FDA0000028295320000011
(A6) according to vector sequence T ' (i), utilize statistical analysis technique, calculate the threshold epsilon that is used for critical parameter;
(A7) Correlation Centre moment characteristics amount λ TWith the Central Moment Feature amount that compares chaos sequence
Figure FDA0000028295320000012
Obtain the comparison chaos sequence of its difference, with the system parameters of the comparison chaos sequence that obtains parameter Estimation result as chaos sequence to be analyzed smaller or equal to ε.
CN2008102367274A 2008-12-09 2008-12-09 Parameter estimation method for chaos system Expired - Fee Related CN101436928B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008102367274A CN101436928B (en) 2008-12-09 2008-12-09 Parameter estimation method for chaos system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008102367274A CN101436928B (en) 2008-12-09 2008-12-09 Parameter estimation method for chaos system

Publications (2)

Publication Number Publication Date
CN101436928A CN101436928A (en) 2009-05-20
CN101436928B true CN101436928B (en) 2011-01-26

Family

ID=40711167

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008102367274A Expired - Fee Related CN101436928B (en) 2008-12-09 2008-12-09 Parameter estimation method for chaos system

Country Status (1)

Country Link
CN (1) CN101436928B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103218459A (en) * 2013-05-13 2013-07-24 无锡职业技术学院 Chaotic system parameter estimating method based on neighborhood information optimization algorithm

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556602A (en) * 2003-12-31 2004-12-22 华中科技大学 Chaotic cipher production method under limited precision
CN1852089A (en) * 2005-12-31 2006-10-25 华中科技大学 System and method for generating analog-digital mixed chaos signals

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556602A (en) * 2003-12-31 2004-12-22 华中科技大学 Chaotic cipher production method under limited precision
CN1852089A (en) * 2005-12-31 2006-10-25 华中科技大学 System and method for generating analog-digital mixed chaos signals

Also Published As

Publication number Publication date
CN101436928A (en) 2009-05-20

Similar Documents

Publication Publication Date Title
US9892211B2 (en) Searchable code processing system and method
Dong et al. A fast secure dot product protocol with application to privacy preserving association rule mining
CN110324147B (en) GAN game countermeasure encryption method based on chaos model
CN111475690B (en) Character string matching method and device, data detection method and server
Rachmawanto et al. A comparative study of image cryptographic method
CN111756521B (en) Cipher S box design method based on Feistel-SP structure
CN113935050B (en) Feature extraction method and device based on federal learning, electronic equipment and medium
CN113934983A (en) Characteristic variable analysis method and device, computer equipment and storage medium
Gao et al. Secure cloud-aided object recognition on hyperspectral remote sensing images
CN112860932B (en) Image retrieval method, device, equipment and storage medium for resisting malicious sample attack
CN105281889B (en) A kind of algorithm restoring method and system based on side channel leakage
Liu et al. Secure remote sensing image registration based on compressed sensing in cloud setting
CN101436928B (en) Parameter estimation method for chaos system
CN111934852A (en) AES password chip electromagnetic attack method and system based on neural network
CN105162740A (en) Single-channel time-frequency overlapping signal blind separation method
Nakouri et al. Chaotic construction of cryptographic keys based on biometric data
Zou et al. Secure encrypted image search in mobile cloud computing
David et al. Fast analytical rank estimation
Doroud et al. Encrypted traffic detection: Beyond the port number era
Lei et al. Global solutions of the evolutionary Faddeev model with small initial data
Garasym et al. Application of observer-based chaotic synchronization and identifiability to original CSK model for secure information transmission
Xin et al. Template attack based on uBlock cipher algorithm
Kekre et al. Sectorization of Full Kekre’s Wavelet Transform for Feature extraction of Color Images
CN110912906A (en) Edge calculation malicious node identification method
Li et al. Explicit approximation of the invariant measure for SDDEs with the nonlinear diffusion term

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110126

Termination date: 20111209