CN102624523A - 1D-ICMIC-based encryption and decryption method by utilizing synchronous chaotic stream cipher - Google Patents

1D-ICMIC-based encryption and decryption method by utilizing synchronous chaotic stream cipher Download PDF

Info

Publication number
CN102624523A
CN102624523A CN2012101072313A CN201210107231A CN102624523A CN 102624523 A CN102624523 A CN 102624523A CN 2012101072313 A CN2012101072313 A CN 2012101072313A CN 201210107231 A CN201210107231 A CN 201210107231A CN 102624523 A CN102624523 A CN 102624523A
Authority
CN
China
Prior art keywords
sequence
icmic
key
stream cipher
plus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101072313A
Other languages
Chinese (zh)
Inventor
邱跃洪
何晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XiAn Institute of Optics and Precision Mechanics of CAS
Original Assignee
XiAn Institute of Optics and Precision Mechanics of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XiAn Institute of Optics and Precision Mechanics of CAS filed Critical XiAn Institute of Optics and Precision Mechanics of CAS
Priority to CN2012101072313A priority Critical patent/CN102624523A/en
Publication of CN102624523A publication Critical patent/CN102624523A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a 1D-ICMIC (One-dimensional-Iterative Chaotic Map With Infinite Collapses)-based encryption and decryption method by utilizing a synchronous chaotic stream cipher. The encrypting method comprises the following steps: 1, generating a key stream sequence Kn plus 1 by an encrypting end through utilizing the synchronous chaotic stream cipher on the basis of 1D-ICMIC; and 2, after encrypting a plaintext sequence Mn plus 1 by utilizing the key stream sequence Kn plus 1, obtaining a mod value and generating a ciphertext sequence Cn plus 1, wherein cn plus 1 equals to mod (mn plus 1 plus kn plus 1, 1). The invention provides the encryption and decryption method by utilizing the synchronous chaotic stream cipher on the basis of 1D-ICMIC, which uses composite mapping formed by one-dimensional piecewise linear mapping (1D-PLM) and 1D-ICMIC as an encrypting function and has the advantages of simpleness, high efficiency and high safety.

Description

Encipher-decipher method based on the synchronous chaos stream cipher of 1D-ICMIC
Technical field
The invention belongs to field of information security technology, relate to a kind of synchronous chaos stream cipher encrypting and decrypting method based on 1D-ICMIC.
Background technology
Along with the develop rapidly of the communication technology and internet, information security issue becomes the focus of social concerns day by day, and this has promoted the research of novel private communication technology greatly.The discovery of chaos phenomenon and the good cryptography character that is had thereof are for cryptography and communication security provide new thinking, the visual field and method.In chaos phenomenon, as long as initial condition is slightly different, its result is just far from each other, is difficult to prediction, but in some cases, but reflect that the Mathematical Modeling of this type phenomenon is very simple, even the one-dimensional nonlinear iteration function just can demonstrate this chaotic characteristic.
Chaos stream cipher and some other stream cipher arithmetics (Zhou hong based on one dimension piecewise linear maps (1D-PLM); Ling Xieting.Generating chaotic secure sequences with desired statistical properties and high security [J]; Int J Bifurcation and Chaos; 1997,7 (1): 205-213.Zhou Hong, Luo Jie, Ling Xieting, the Design Theory of chaos nonlinear feedback keying sequence and limited precision realize [J], electronic letters, vol, 1997,25 (10): 58-60.Sang Tao, Wang Ruli, Yan Yixun, the Design Theory [J] of one type of novel chaos feedback cipher sequence, electronic letters, vol, 1999,27 (7): 47-50.) chaotic maps be the limited folding mapping in the finite interval.In order to improve the fail safe of cryptographic algorithm, need to increase the folding times in the finite interval.For the simple effective method of limited folding mapping is the compound number of times that increases mapping, but this is a cost to reduce ageing.Have unlimited folding chaotic maps (Iterative Chaotic Maps with Infinite Collapses, ICMIC) (Qiu Yuehong, He Chen in a kind of simply constructed finite interval; All great writings, the unlimited folding chaotic maps [J] in a kind of finite interval, high-tech communication; 2002,12 (9): 12-15, Qiu Yuehong; He Chen, all great writings, a kind of unlimited folding chaotic maps machine and quantized sequences [J] thereof; Shanghai Communications University's journal, 2002,36 (12): 1788-1790) have than limited folding mappings such as one dimension piecewise linear maps complex dynamic characteristic more; Can obtain enough complicated phase space structure with less compound number of times, thereby be the desirable member of structure cryptographic algorithm.Have complex dynamic characteristic and ideal uniform distribution character though one dimensional infinite folds chaotic maps (1D-ICMIC), have only a parameter, may be not enough when reality is used.And one dimension piecewise linear maps (1D-PLM) has good parameter autgmentability and statistical property.In conjunction with the advantage of two kinds of mappings, through shining upon compound mode, the infinitely folding easily chaotic maps of the parameter space that just can construct expansion.
Summary of the invention
In order to solve the above-mentioned technical problem that exists in the background technology; The Compound Mappings that the invention provides the folding mapping of a kind of one dimension piecewise linear maps (1D-PLM) and one dimensional infinite (1D-ICMIC) formation is an encryption function, has the synchronous chaos stream cipher encrypting and decrypting method based on 1D-ICMIC simple, efficient, high safety.
Technical solution of the present invention is: the invention provides a kind of synchronous chaos stream cipher encrypting method based on 1D-ICMIC, its special character is: said synchronous chaos stream cipher encrypting method based on 1D-ICMIC may further comprise the steps:
1) generates key stream sequence K by encrypting end N+1
2) utilize key stream sequence K N+1To plaintext sequence M N+1Get the mod value after encrypting, produce the ciphertext sequence C N+1, wherein:
c n+1=mod(m n+1+k n+1,1)。
Above-mentioned steps 1) the synchronous chaos stream cipher that is based on 1D-ICMIC generates key stream sequence K N+1
A kind of decryption method of the synchronous chaos stream cipher based on 1D-ICMIC, its special character is: the decryption method of said synchronous chaos stream cipher based on 1D-ICMIC may further comprise the steps:
1) by decrypting end generating solution decryption key sequence K N+1
2) to the ciphertext sequence C N+1Utilize decruption key sequence K N+1Decipher, recover to obtain expressly sequence M N+1
Above-mentioned steps 1) be to utilize the motor synchronizing chaos stream cipher of 1D-ICMIC to generate key stream sequence K N+1
Advantage of the present invention is: the synchronous chaos stream cipher encrypting and decrypting method based on 1D-ICMIC provided by the present invention combines the unlimited aliasing effect that is easy to autgmentability and one dimension piecewise linear maps of the key space of one dimension piecewise linear maps, folds the chaos stream cipher algorithm that shines upon a kind of novel feedback-feed forward architecture of formation with one dimension piecewise linear maps and one dimensional infinite.The unlimited aliasing character that this encipher-decipher method is had by means of the folding mapping of one dimensional infinite; Make that the key stream sequence is extremely responsive to the change of key parameter, on phase space, approach even distribution, the sequence adjacent element approaches statistics independently; And between drive sequences and key stream sequence dependence unusual complicated and both to approach statistics independent, have the advantage of simple, efficient, high safety etc.
Description of drawings
Fig. 1 is the principle schematic of encipher-decipher method provided by the present invention.
Embodiment
The invention provides a kind of synchronous chaos stream cipher encrypting method based on 1D-ICMIC, this encryption method may further comprise the steps:
1) generates key stream sequence K by encrypting the synchronous chaos stream cipher of end group in 1D-ICMIC N+1
2) utilize key stream sequence K N+1To plaintext sequence M N+1Get the mod value after encrypting, produce the ciphertext sequence C N+1, wherein:
c n+1=mod(m n+1+k n+1,1)。
A kind of decryption method of the synchronous chaos stream cipher based on 1D-ICMIC, this decryption method may further comprise the steps:
1) utilizes the motor synchronizing chaos stream cipher generating solution decryption key sequence K of 1D-ICMIC by decrypting end N+1
2) to the ciphertext sequence C N+1Utilize decruption key sequence K N+1Decipher, recover to obtain expressly sequence M N+1
The one dimension piecewise linear maps is:
x n + 1 = Φ ( x n , Θ ) = ( x n - θ i ) / ( θ i + 1 - θ i ) x n ∈ [ θ i , θ i + 1 ) 0 x n = 0.5 Φ ( 1 - x n , Θ ) x n ∈ ( 0.5,1 ) - - - ( 1 )
Wherein, x ∈ [0,1); 0=θ 0<θ 1<Λ<θ i<Λ<θ N+1=0.5, i=0,1 ... N, N>=1; Θ=[θ 1, θ 2.., θ N]
The folding chaotic maps of one dimensional infinite is:
x n + 1 = &Psi; ( x n , a ) = mod ( a / ( 1 / 2 - x n ) , 1 ) x n < 1 / 2 0 x n = 1 / 2 mod ( a / ( x n - 1 / 2 ) , 1 ) x n > 1 / 2 - - - ( 2 )
In the formula, x n∈ [0,1), and a ∈ [1, ∞), n=0,1,2,3..., mod (, 1) and be mould 1 function.
The composite chaotic that is made up of mapping (1) and mapping (2) is mapped as:
x n+1=Λ(x n,Θ,a)=Ψ(Φ(x n,Θ),a) (3)
As the drive sequences generator, the chaos sequence of generation is as the drive sequences of feedforward function with Compound Mappings (3):
x n+1=Λ(x n,Θ,a) (4)
With the mapping (2) repeatedly Compound Mappings be feedforward function, the key stream sequence
Figure BDA0000152708700000041
that obtains encrypting usefulness is:
k n+1=Ψ q(x n+1,a) (5)
Encryption function is:
c n=mod(m n+k n,1) (6)
Corresponding decryption function is:
m n=mod(c n-k n,1) (7)
Ψ q(x, a)=Ψ (Ψ (..., a), a) be Ψ (, a) to q the Compound Mappings of variable x.That
Figure BDA0000152708700000042
Figure BDA0000152708700000043
in formula (6), (7) and
Figure BDA0000152708700000044
are respectively is interval [0,1) go up expressly sequence, key stream sequence and ciphertext sequence.The parameter Θ of mapping (3) is a seed key, and parameter a and q are the non-key parameter of adjustment aliasing effect.As the reason of key be not: because the ambiguity of formula (4) with the initial value of formula (4); Make under the identical situation of parameter Θ; Some initial values inequality obtain identical drive sequences
Figure BDA0000152708700000045
thereby obtain identical key stream sequence
Figure BDA0000152708700000046
like this; These initial values are of equal value; The number N of parameter Θ is big more; The initial value of equivalence is many more; And the concrete numerical value of these equivalent key depends on parameter Θ; Like this, just there is stronger correlation between key parameter, thereby effective key space is reduced greatly.
Key stream sequence has following character: when a levels off to when just infinite, key stream sequence
Figure BDA0000152708700000048
levels off to even distribution and have the two-value auto-correlation function.
The above-mentioned character of sequence just becomes the necessary condition of safe key stream sequence.And adequate condition should be:
(1) key stream sequence
Figure BDA00001527087000000410
is independent with drive sequences
Figure BDA00001527087000000411
statistics; Promptly can't obtain the information of drive sequences
Figure BDA00001527087000000413
, also just can't and then confirm parameter Θ as key from key stream sequence
Figure BDA00001527087000000412
.
(2) key stream sequence
Figure BDA00001527087000000414
is the independent same distribution sequence, other element or the reconstruct whole sequence that promptly can't come forecasting sequence through a fragment of sequence .
(3) key stream sequence is extremely responsive to the change of key parameter Θ.
If the lyapunov index of mapping Ψ () is λ, then as a enough greatly the time, Compound Mappings Ψ q(x, lyapunov index a) are q λ, and the promptly compound phase space complexity that increased has improved the aliasing effect.A or q are big more, Compound Mappings Ψ q(x, phase space complexity a) is high more, mapping output is sensitiveer to the variation of mapping input, statistics dependence between the two more a little less than.As q or a when being infinitely great, mapping Ψ q(x, output a), input statistics are independently.But the size of a receives the restriction of actual realization precision, and the efficient of the bigger then algorithm of q is low more.Therefore, under given realization precision, need to confirm the upper limit a of a MaxLower limit q with q Min, under the prerequisite that guarantees safe enough property, make algorithm have best real-time.
In following analysis, to suppose to adopt floating-point operation, operational precision is P, key parameter Θ is P ΘPosition precision fixed point decimal, expressly sequence
Figure BDA0000152708700000051
Drive sequences
Figure BDA0000152708700000052
With the key stream sequence
Figure BDA0000152708700000053
Be P kThe fractional fixed point of position precision.
Because the translocation of modular function; Precision is that last
Figure BDA0000152708700000054
at least ( expression is not more than the maximum integer of x) behind the decimal point of the fixed-point number y in the interval (0.1) that obtains after through mapping (2) of floating number x in the interval (0.1) of P is zero; Thereby the number of significant digit of y to become
Figure BDA0000152708700000056
a big more, the number of significant digit behind the decimal point of y is few more.
Fixed-point number y in the interval (0.1) that number of significant digit is
Figure BDA0000152708700000057
behind the decimal point is during as the input of mapping (2); Owing to ask the stretching action of computing reciprocal in the mapping (2); Make intermediate object program x ∈ (0; 0.5); Or
Figure BDA0000152708700000059
x ∈ (0.5; 1) is the floating number of P position precision; The interior fixed-point number in interval (0.1) of t obtains
Figure BDA00001527087000000510
under function m od (2at, 1) effect position precision.
Therefore, Compound Mappings Ψ q(x, a) precision of the number of gained still does
Figure BDA00001527087000000511
When reality realizes, can be according to realizing precision P and key stream sequence
Figure BDA00001527087000000512
Required precision P kConfirm the upper limit a of parameter a Max:
a max = 2 P - P k - 1 - - - ( 8 )
After a upper limit of having confirmed, need to confirm that compound number of times q is to obtain satisfied aliasing effect.Though compound number of times q is big more, the aliasing effect is good more, and correspondingly operand is also big more, cryptographic algorithm ageing also poor more.Under limited precision realizes, because there is minimum compound number of times q in the quantization effect of limited realization precision Min, make compound number of times q>=q MinThe limited precision key stream sequence and the compound number of times of gained are q MinThe time gained limited precision key stream sequence on statistics, be undistinguishable, therefore, only need compound q MinThe inferior aliasing effect that can obtain satisfaction.Discuss below and how to confirm q Min
Compound Mappings y=Ψ q(x, output y a) to the sensitivity of input x is:
&xi; &Psi; = | dy dx | = | d &Psi; q ( x , a ) dx | &GreaterEqual; ( 4 a ) q - - - ( 9 )
When input x and output y are P kPosition precision fixed point number, x changes
Figure BDA0000152708700000061
Promptly
Figure BDA0000152708700000062
If the change of caused output y:
|Δy|=ξ Ψ·|Δx|≥(4a) q|Δx|≥1 (10)
Then two inputs of deviation for are positioned in the different non-linear segmentation of formula (5).Like this, the information about x among the output y is zero, and promptly x and y statistics is independent.
Therefore; When inequality (10) was set up, drive sequences
Figure BDA0000152708700000064
and corresponding key stream sequence
Figure BDA0000152708700000065
statistics were independent.In addition, when inequality (10) is set up, if drive sequences
Figure BDA0000152708700000066
Adjacent element deviation more than or equal to
Figure BDA0000152708700000067
The corresponding key stream sequence of gained then
Figure BDA0000152708700000068
Adjacent element statistics independent, and chaotic maps x N+1=Λ (x n, Θ, the drive sequences that a) is produced
Figure BDA0000152708700000069
The deviation of adjacent element
Figure BDA00001527087000000610
Therefore, key stream sequence
Figure BDA00001527087000000611
Adjacent element statistics independent.Consider chaotic maps x N+1=Λ (x n, Θ a) is Markov mapping, then key stream sequence Be the even distribution series of statistical independent.
Therefore, can obtain the key stream sequence that obtains to have desirable cryptography characteristic by inequality (10)
Figure BDA00001527087000000613
Required minimum compound number of times q Min:
Figure BDA00001527087000000614
In the formula,
Figure BDA00001527087000000615
expression is not more than the maximum integer of x.
At last, according to the key stream sequence
Figure BDA00001527087000000616
The extremely responsive requirement of the change of key parameter Θ is confirmed the precision P of key parameter Θ ΘFormulation to this requirement is exactly:
Figure BDA00001527087000000617
Figure BDA00001527087000000618
Arbitrary element θ as Θ i(i=1,2 ... N) change Become
Figure BDA00001527087000000620
The time, correspondingly, satisfy following formula if cause the change of formula (4) output:
| x n + 1 &prime; - x n + 1 | = | &Lambda; ( x n , &Theta; , a ) - &Lambda; ( x n , &Theta; &prime; , a ) | (12)
&GreaterEqual; min ( | &Lambda; ( x n , &Theta; , a ) - &Lambda; ( x n , &Theta; &prime; , a ) | ) &GreaterEqual; 2 - P k
Then, can know x by formula (10) N+1And x ' N+1The element k of pairing key stream sequence N+1And k ' N+1Uncorrelated.
(x, output y Θ) is to parameter θ to get y=Φ by formula (1) iThe sensitivity that changes:
&xi; &Phi; = | d&Phi; ( x , &Theta; ) d &theta; i | = x - &theta; i - 1 ( &theta; i - &theta; i - 1 ) 2 i=1,2,...N
Then as x ≠ θ I-1The time,
&xi; &Phi; = x - &theta; i - 1 ( &theta; i - &theta; i - 1 ) 2 &GreaterEqual; 2 - P k + 2 - - - ( 13 )
Convolution (9) and formula (13) can get:
| &Lambda; ( x n , &Theta; , a ) - &Lambda; ( x n , &Theta; &prime; , a ) |
= | &xi; &Psi; &CenterDot; &xi; &Phi; &CenterDot; &Delta; &theta; i | (14)
&GreaterEqual; 4 a &CenterDot; 2 - P k + 2 &CenterDot; 2 - P &Theta;
= a &CenterDot; 2 - P &Theta; - P k + 4
Convolution (12), (14) can get:
a 2 - P k - P &Theta; + 4 &GreaterEqual; 2 - P k
Promptly have:
P Θ≤log 2a+4 (15)
When the given maximum of a modus ponens (8), can get by formula (15):
P Θ≤P-P k+3 (16)
So, at P and P kAfter confirming, maximum key entropy H (K) ≈ N (P-P of this cryptographic algorithm k+ 3).The main computing of this cryptographic algorithm is a floating-point multiplication, needs q altogether Min+ 2 floating-point multiplications.If adopt the double-precision floating point computing, then the number of significant digit P=52 of mantissa.If obtain P kThe key stream sequence of=32 precision
Figure BDA0000152708700000076
Can get corresponding a by formula (8) Max=2 19, can obtain minimum compound number of times q by formula (11) Min=2.Can obtain the maximal accuracy P of key parameter Θ by formula (16) Θ max=23, corresponding key entropy H (K) ≈ 23N, N is the element number of parameter Θ.
In order to understand scheme of the present invention better, do further to describe below in conjunction with accompanying drawing and specific embodiment.
The present invention is based on the Compound Mappings that the folding mapping of one dimension piecewise linear maps and one dimensional infinite constitutes, schematic diagram is as shown in Figure 1.Wherein, the key generator of encryption and decryption end constitutes by formula (4), (5), and the key and the initial condition of two key generators are identical, thereby the key sequence that is produced is synchronous fully.Encrypt end and encrypt with formula (6), obtain the ciphertext sequence, send it to decrypting end with the key sequence of key generator.Decrypting end is used with the synchronous key sequence of transmitting terminal the ciphertext sequence is deciphered with formula (7), obtains expressly sequence.And the third party who does not know key can't decrypting ciphertext because of producing and encrypt the synchronous key sequence of end.
Expressly sequence is the SIN function sequence on interval (0,1)
Figure BDA0000152708700000077
The key sequence that is produced with formula (4), (5)
Figure BDA0000152708700000078
It is encrypted obtain the ciphertext sequence
Figure BDA0000152708700000079
Under the prerequisite that knows for sure as the parameter of key, decrypting end can accurately be duplicated key sequence
Figure BDA00001527087000000710
And then the plaintext sequence after obtaining deciphering
Figure BDA00001527087000000711
And if only know approximation as the parameter of key, then can not accurately duplicate key sequence
Figure BDA0000152708700000081
Also just can not be from the ciphertext sequence
Figure BDA0000152708700000082
Accurately recover expressly sequence
Figure BDA0000152708700000083
Initial value x 0And during Θ '=[0.2645757], with the sequence of gained
Figure BDA0000152708700000084
To the ciphertext sequence
Figure BDA0000152708700000085
The sequence of deciphering gained
Figure BDA0000152708700000086

Claims (2)

1. encryption method based on the synchronous chaos stream cipher of 1D-ICMIC, it is characterized in that: said synchronous chaos stream cipher encrypting method based on 1D-ICMIC may further comprise the steps:
1) generates key stream sequence K by encrypting the synchronous chaos stream cipher of end group in 1D-ICMIC N+1
2) utilize key stream sequence K N+1To plaintext sequence M N+1Get the mod value after encrypting, produce the ciphertext sequence C N+1, wherein:
c n+1=mod(m n+1+k n+1,1)。
2. decryption method based on the synchronous chaos stream cipher of 1D-ICMIC is characterized in that: the decryption method of said synchronous chaos stream cipher based on 1D-ICMIC may further comprise the steps:
1) utilizes the motor synchronizing chaos stream cipher generating solution decryption key sequence K of 1D-ICMIC by decrypting end N+1
2) to the ciphertext sequence C N+1Utilize decruption key sequence K N+1Decipher, recover to obtain expressly sequence M N+1
CN2012101072313A 2012-04-12 2012-04-12 1D-ICMIC-based encryption and decryption method by utilizing synchronous chaotic stream cipher Pending CN102624523A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101072313A CN102624523A (en) 2012-04-12 2012-04-12 1D-ICMIC-based encryption and decryption method by utilizing synchronous chaotic stream cipher

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101072313A CN102624523A (en) 2012-04-12 2012-04-12 1D-ICMIC-based encryption and decryption method by utilizing synchronous chaotic stream cipher

Publications (1)

Publication Number Publication Date
CN102624523A true CN102624523A (en) 2012-08-01

Family

ID=46564215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101072313A Pending CN102624523A (en) 2012-04-12 2012-04-12 1D-ICMIC-based encryption and decryption method by utilizing synchronous chaotic stream cipher

Country Status (1)

Country Link
CN (1) CN102624523A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102629899A (en) * 2012-04-12 2012-08-08 中国科学院西安光学精密机械研究所 Encryption and decryption method based on self-synchronizing chaotic stream ciphers of 1D-ICMIC (One Dimensional-Iterative Chaotic Maps with Infinite Collapses)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1770680A (en) * 2005-10-17 2006-05-10 浙江大学 Output-cryptograph mixed feedback chaos stream cipher encrypting and decrypting method
US20080267409A1 (en) * 2000-07-26 2008-10-30 Rpk New Zealand Limited Encryption processing for streaming media
CN102629899A (en) * 2012-04-12 2012-08-08 中国科学院西安光学精密机械研究所 Encryption and decryption method based on self-synchronizing chaotic stream ciphers of 1D-ICMIC (One Dimensional-Iterative Chaotic Maps with Infinite Collapses)

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080267409A1 (en) * 2000-07-26 2008-10-30 Rpk New Zealand Limited Encryption processing for streaming media
CN1770680A (en) * 2005-10-17 2006-05-10 浙江大学 Output-cryptograph mixed feedback chaos stream cipher encrypting and decrypting method
CN102629899A (en) * 2012-04-12 2012-08-08 中国科学院西安光学精密机械研究所 Encryption and decryption method based on self-synchronizing chaotic stream ciphers of 1D-ICMIC (One Dimensional-Iterative Chaotic Maps with Infinite Collapses)

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
邱跃洪等: "《一种反馈-前馈结构的混沌流密码》", 《西安交通大学学报》 *
邱跃洪等: "《一种有限区间内无限折叠的混沌映射》", 《高技术通讯》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102629899A (en) * 2012-04-12 2012-08-08 中国科学院西安光学精密机械研究所 Encryption and decryption method based on self-synchronizing chaotic stream ciphers of 1D-ICMIC (One Dimensional-Iterative Chaotic Maps with Infinite Collapses)

Similar Documents

Publication Publication Date Title
CN103259643B (en) A kind of full homomorphic cryptography method of matrix
CN107196926A (en) A kind of cloud outsourcing privacy set comparative approach and device
CN106230590A (en) A kind of ciphertext policy ABE base encryption method of many authorized organizations
CN105323061A (en) Outsourced key generation and decryption property-based system capable of realizing keyword search and decryption method
CN103973439B (en) A kind of multi-variable public key ciphering method
CN102263636A (en) Stream cipher key control method for fusing neural network with chaotic mappings
JP2016517046A (en) Method and system for encrypting data
CN103780382A (en) Multivariable public-key encryption/decryption system and method based on hypersphere
KR20150003932A (en) Method for generating a pseudorandom sequence, and method for coding or decoding a data stream
CN101814985A (en) Block cipher system using multi-chaotic mapping multi-dynamic S-box
CN103490883A (en) System and method for encryption/decryption of multivariable public key
CN102279840B (en) Method for quickly generating prime number group applicable to information encryption technology
Li et al. Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
JunLi et al. Email encryption system based on hybrid AES and ECC
Al-Arjan et al. Intelligent security in the era of AI: The key vulnerability of RC4 algorithm
CN102769528A (en) Quick large number decomposition method based on cryptographic technology application
CN1251444A (en) Efficient block encryption method
Lechtaler et al. Model design for a reduced variant of a Trivium Type Stream Cipher
CN102624523A (en) 1D-ICMIC-based encryption and decryption method by utilizing synchronous chaotic stream cipher
CN104144057A (en) CP-ABE method for generating security decryption secret key
CN109088721B (en) Entrustable uncovering and encrypting method
CN102246456A (en) System and method for countering side-channel attacks against encryption based on cyclic groups
Li et al. Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation
EP2571192A1 (en) Hybrid encryption schemes
CN102629899A (en) Encryption and decryption method based on self-synchronizing chaotic stream ciphers of 1D-ICMIC (One Dimensional-Iterative Chaotic Maps with Infinite Collapses)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120801