CN102904710B - Hyper-chaos encryption method for weak password based on quantum cellular neural network - Google Patents
Hyper-chaos encryption method for weak password based on quantum cellular neural network Download PDFInfo
- Publication number
- CN102904710B CN102904710B CN201210384510.4A CN201210384510A CN102904710B CN 102904710 B CN102904710 B CN 102904710B CN 201210384510 A CN201210384510 A CN 201210384510A CN 102904710 B CN102904710 B CN 102904710B
- Authority
- CN
- China
- Prior art keywords
- image
- password
- isk
- quantum
- encryption method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The invention relates to a hyper-chaos encryption method for a weak password based on a quantum cellular neural network, which belongs to the field of the information security technology. The method provided by the invention solves the problem that the existing password system is limited by limited key space so that the safety of the system is difficult to guarantee when running into brute-force attacks. The encryption method provided by the invention combines the hyper-chaos characteristic of the quantum cellular neural network with the advantages of human brain identification; the safe password is divided into two parts, wherein one part is translated into the picture form; in terms of an initial value and extremely sensitive characteristics of a control parameter, images are encrypted by using the high complexity of the hyper-chaos system; the other part of secret key is encrypted by using an AES (Advanced Encryption Standard) encryption method; and the two parts form a safe password for encrypting the data. The encryption method provided by the invention has great key space; the ability resisting to brute force attack is obviously strengthened; the calculated quantity in the encryption process is reduced when less password number is used; and the encryption method has the characteristics of high safety and convenience for remembering by a user.
Description
Technical field
The present invention relates to field of information security technology, be specifically related to a kind of weak password hyperchaos encryption method based on quantum cellular neural.
Background technology
Computer and information security issue by deep research more than 50 years.Comprise the Generally Recognized as safe of cryptographic algorithm, calculation element, operating system and network.Wherein cryptographic system is widely used in authentication and data encryption.The mankind remember the limited in one's ability of password and tend to select weak password that is too simple and that can be foreseen.Thus, the leak that weak password is correlated with becomes the safety problem extensively existed.The method solving weak password problem is all being found by global user and enterprise.
According to statistics, the u s company of 2009 86% will access to your password certification and encryption.If weak password is used as a strong encryption or authentication, then the attack that system may be made to be easy to be subject to violence password search.Research shows, user uses simply usually, and the password that can be foreseen is to treat the problem of this complexity of password.Schneier has investigated 34, online user's password of 000 " Myspace ": wherein user's choice for use 8 characters of 65%, and use " password1 ", " abc123 ", " myspace1 ", and " password " this kind of password there are plenty of such people especially.Also have a considerable amount of user that all accounts are all set to same password, or password is write in notepad, or password is recorded in a form, or iterative cycles uses these class methods of Old Password.Horowitz reports neat password being write on Sticky Note and to be attached on computer screen of the user of 15-20%.Another is recorded in password on paper when investigating the user job of discovery 66%, and 58% is recorded in form.
The defect that weak password is correlated with has great impact to World Economics, and the symmetric key cryptography system of existing commercialization is generally DES (data encryption standard) and AES (Advanced Encryption Standard).One is used to the desirable key of the completely random of aes algorithm, a violence is searched and is attacked in the future present or infeasible.But when key is restricted to a less subspace, will there is theatrical change in situation.And actual conditions are, the password that usual keyword is remembered by people, or assailant by crack accordingly, mechanism can obtain.For so very little key subspace, violence is searched will be effective.
Quantum Cellular Automata (Quantum cellular automata, QCA) is a kind of nano level Novel electronic devices, has superelevation integrated level, super low-power consumption and without the lead-in wire advantage such as integrated, is one of electronic component of new generation.Abroad in Recent Years scholar utilizes the mechanism QCA of Cai Schwann Cells neural net to construct the locally coupled network of cell based on Schrodinger equation, i.e. quantum cellular neural (QCNN).Because the quantum between quantum dot interacts, complicated dynamics can be obtained from the polarizability of each cell.
Summary of the invention
The present invention solves existing password system due to the restriction by limited key space, and when being subject to Brute Force and attacking, its fail safe is difficult to guaranteed problem, provides a kind of weak password hyperchaos encryption method based on quantum cellular neural.
Based on the weak password hyperchaos encryption method of quantum cellular neural, the method is realized by following steps:
Step one, designated length be the password of n position as cryptographic object, n is positive integer;
Step 2, n position password selected for step one is split as the short password SP of m position and the strong encryption keys SK of k position, described m and k is positive integer;
Step 3, strong encryption keys SK step 2 split embed in two dimensional image, obtain image strong encryption keys ISK;
Step 4, Discrete Chaotic Map is carried out to the image strong encryption keys ISK that step 3 obtains, and setup control parameter, obtain scramble image S_ISK, and by scramble image S_ISK according to from top to bottom, order from left to right arranges, and obtains scrambling sequence S;
Step 5, selection quantum cellular neural hyperchaotic system, and initialization and controling parameters.Adopt fourth-order Runge-Kutta method to carry out iterative to described quantum cellular neural hyperchaotic system, obtain chaos sequence K;
Step 6, adopt chaos sequence K to carry out DIFFUSION TREATMENT to the scrambling sequence S that step 4 obtains, realize the equalization of scramble image S_ISK, obtain ciphering sequence C, and to ciphering sequence C according to from top to bottom, order from left to right arranges, generation encrypted image C
final;
Step 7, the encrypted image C that the short password SP employing in m position AES encryption method is encrypted afterwards and step 6 generates that step 2 is split
finalmerge, jointly transmit as Crypted password.
Beneficial effect of the present invention: the present invention proposes a kind of weak password hyperchaos encryption method based on quantum cellular neural, the Dominant Facies of the hyperchaos characteristic of quantum cellular neural and human brain pattern recognition combines by this cryptography scheme.Security password is divided into two parts, is wherein partially converted into graphic form, the high complexity of application hyperchaotic system, to the feature of initial value and controling parameters extreme sensitivity, encrypted image, carrys out mental picture by user, is user-friendly to; Another part key adopts traditional password encryption scheme.Two parts form a security password to data encryption jointly.Key space is large, and the ability of opposing brute force attack obviously strengthens; 105 SP combinations are carried out spending very considerable time required for Brute Force.Simple growth SP space just significantly limit assailant to 106, still keeps quite short password simultaneously.Weak password system of the present invention, use less password figure place, greatly reduce the amount of calculation in ciphering process, reach higher lsafety level, it is high that the method for the invention has fail safe, and user remembers feature easily.
Accompanying drawing explanation
Fig. 1 is the encrypting and decrypting of the weak password hyperchaos encryption method based on quantum cellular neural of the present invention and attacks schematic diagram;
Fig. 2 is the encryption flow figure of the weak password hyperchaos encryption method based on quantum cellular neural of the present invention;
Fig. 3 is the cipher round results figure of the weak password hyperchaos encryption method based on quantum cellular neural of the present invention; Wherein scheming A is original image, and figure B is encrypted image, the correct decrypted image of figure C, and figure D is wrong decrypted image.
Embodiment
Embodiment one, composition graphs 1 to Fig. 3 illustrate present embodiment, and based on the weak password hyperchaos encryption method of quantum cellular neural, the method is realized by following steps:
A1, designated length be the password of n as cryptographic object, n is positive integer, and the pattern length of described n is in the reasonable scope (as 105 combinations);
B1, n position password is split as the short password SP of m position and the strong encryption keys SK of k position;
C1, strong encryption keys SK to be embedded in two dimensional image, form image strong encryption keys ISK; Be with the difference of existing encryption technology, user need not be required to remember SK again, and for human brain, memory piece image is easily a lot of more than memory k position character;
D1, Discrete Chaotic Map is carried out to the image strong encryption keys ISK in step C1, and setup control parameter, obtain scramble image S_ISK.By scramble image S_ISK according to from top to bottom, order from left to right arranges, and obtains scrambling sequence S;
E1, selection quantum cellular neural hyperchaotic system, and initialization and controling parameters.Adopt 4 rank Runge-Kutta methods to carry out iterative to this hyperchaotic system, produce chaos sequence K;
F1, carry out DIFFUSION TREATMENT with above chaos sequence to the scrambling sequence S that step D1 generates, as XOR, obtain ciphering sequence C, realize image equilibration, to C sequence according to from top to bottom, order from left to right arranges, and generates encrypted image C
final;
G1, to step B1 produce the short password SP(SP in l position remembered by user), adopt conventional encryption methods be encrypted, as AES encryption algorithm;
H1, encrypted result step F 1 and G1 generated merge, and jointly transmit as Crypted password.
Because this cryptographic algorithm is symmetric cryptography, decrypting process is the inverse process of ciphering process.Decrypted result can be obtained according to the reverse operating of ciphering process.
Use variable element Cat to map in present embodiment step D1, the equation that Cat maps is defined as:
In formula, suppose that image strong encryption keys ISK is the gray level image of N × N pixel, controling parameters p, q are positive integer, can be set by the user, and are required to meet det (A)=1.
By image strong encryption keys ISK according to equation (1) arrangement, be converted into scramble image S_ISK.
The quantum cell neural network system model that in present embodiment, step e 1 uses is:
Wherein, P
1and P
2be the polarizability of two Quantum Cellular Automata (QCA), φ
1and φ
2be the phase place of two QCA, a1 and a2 is the coefficient be directly proportional to energy between quantum dot in each QCA, ω
1and ω
2it is the weighted influence coefficient of the difference of adjacent QCA polarizability.
Work as ω
1=ω
2=0.5, a
1=a
2when=0.075, system (2) is in hyperchaos state.Parameter a1 and a2, ω
1and ω
2also can be chosen by user.
When i-th (i=1,2 ..., (N × N)/4) secondary iteration system (2) quantum cellular neural time, four of generation value { x
1(i), x
2(i), x
3(i), x
4(i) } for generating chaos sequence
.Through type (3) is asked for:
Image equilibration method in present embodiment in step F 1 adopts scheme shown in formula (4), obtains sequence C
Embodiment two, composition graphs 3 illustrate present embodiment, and present embodiment is the embodiment of the weak password hyperchaos encryption method based on quantum cellular neural described in embodiment one:
One, select seven passwords " custABC " as cryptographic object, wherein front four " cust " strong encryption keys SK, rear three " ABC " are as short password SP;
Two, " cust " is embedded in two dimensional image, generate the image strong encryption keys ISK of 128 × 128 pixels;
Three, by chaotic maps equation (1) Suo Shi, setup control parameter p=36, q=3, carries out image scrambling process to image strong encryption keys ISK, obtains scramble image S_ISK.And by scramble image S_ISK according to from top to bottom, order from left to right arranges, and obtains scrambling sequence S;
Four, by hyperchaotic system formula (2) Suo Shi, initialization P
1(0)=0.5, P
2(0)=0.999, φ
1=-20, φ
2=2.5 and controling parameters ω
1=ω
2=0.5, a
1=a
2=0.075.Adopt 4 rank Runge-Kutta methods to carry out iterative to this hyperchaotic system, produce chaos sequence K;
Five, carry out equalization processing according to method formula (4) Suo Shi to image, obtain sequence C, to C sequence according to from top to bottom, order from left to right arranges, and generates encrypted image C
final;
Six, AES encryption scheme is used to be encrypted short password " ABC "; By encrypted result and encrypted image C
finalintegrate, by the Crypted password transmission finally obtained.
Cipher round results composition graphs 3, can find out that encryption rear video image scrambling is abundant, cannot reflect any information of original image, cipher round results is good; Image after correct deciphering and original image completely the same.
Claims (4)
1., based on the weak password hyperchaos encryption method of quantum cellular neural, it is characterized in that, the method is realized by following steps:
Step one, designated length be the password of n position as cryptographic object, n is positive integer;
Step 2, n position password selected for step one is split as the short password SP of m position and the strong encryption keys SK of k position, described m and k is positive integer;
Step 3, strong encryption keys SK step 2 split embed in two dimensional image, obtain image strong encryption keys ISK;
Step 4, Discrete Chaotic Map is carried out to the image strong encryption keys ISK that step 3 obtains, and setup control parameter, obtain scramble image S_ISK, and by scramble image S_ISK according to from top to bottom, order from left to right arranges, and obtains scrambling sequence S;
Step 5, selection quantum cellular neural hyperchaotic system, and initialization and controling parameters, adopt fourth-order Runge-Kutta method to carry out iterative to described quantum cellular neural hyperchaotic system, obtain chaos sequence K;
Step 6, adopt chaos sequence K to carry out DIFFUSION TREATMENT to the scrambling sequence S that step 4 obtains, realize the equalization of scramble image S_ISK, obtain ciphering sequence C, and to ciphering sequence C according to from top to bottom, order from left to right arranges, generation encrypted image C
final;
Step 7, the encrypted image C that the short password SP employing in m position AES encryption method is encrypted afterwards and step 6 generates that step 2 is split
finalmerge, jointly transmit as Crypted password.
2. the weak password hyperchaos encryption method based on quantum cellular neural according to claim 1, it is characterized in that, described in step 4, Discrete Chaotic Map is carried out to image strong encryption keys ISK, and setup control parameter, the detailed process obtaining scramble image S_ISK is: adopt variable element Cat to map, the equation definition equation one that described Cat maps is expressed as:
Equation one
Wherein, setting image strong encryption keys ISK is the gray level image of N × N pixel, and controling parameters is p, q is positive integer, is set by the user, and is required to meet det (A)=1; Image strong encryption keys ISK is arranged according to equation one, is converted into scramble image S_ISK.
3. the weak password hyperchaos encryption method based on quantum cellular neural according to claim 1, it is characterized in that, the quantum cell neural network system model formation one of the employing described in step 5 is expressed as:
Formula one
In formula, P
1and P
2be respectively the polarizability of two Quantum Cellular Automata, φ
1and φ
2be the phase place of two Quantum Cellular Automata, a1 and a2 is the coefficient be directly proportional to energy between quantum dot in each two Quantum Cellular Automata, ω
1and ω
2it is the weighted influence coefficient of the difference of adjacent Quantum Cellular Automata polarizability;
Work as ω
1=ω
2=0.5, a
1=a
2when=0.075, quantum cell neural network system is in hyperchaos state; Wherein, a1 and a2, ω
1and ω
2value can be chosen by user;
Adopt formula one carry out i-th (i=1,2 ..., (N × N)/4) secondary iteration time, four values of generation are respectively: { x
1(i), x
2(i), x
3(i), x
4(i) }, described four values are for generating chaos sequence
i=1,2 ..., (N × N)/4; Described generation chaos sequence K is asked for by formula two:
Formula two:
4. the weak password hyperchaos encryption method based on quantum cellular neural according to claim 1, is characterized in that, the image equilibration in step 6 adopts formula three to realize, and obtains ciphering sequence C,
Carry out according to from top to bottom to ciphering sequence C, order from left to right arranges, and generates encrypted image.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210384510.4A CN102904710B (en) | 2012-10-11 | 2012-10-11 | Hyper-chaos encryption method for weak password based on quantum cellular neural network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210384510.4A CN102904710B (en) | 2012-10-11 | 2012-10-11 | Hyper-chaos encryption method for weak password based on quantum cellular neural network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102904710A CN102904710A (en) | 2013-01-30 |
CN102904710B true CN102904710B (en) | 2015-01-07 |
Family
ID=47576764
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210384510.4A Expired - Fee Related CN102904710B (en) | 2012-10-11 | 2012-10-11 | Hyper-chaos encryption method for weak password based on quantum cellular neural network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102904710B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103501224B (en) * | 2013-09-23 | 2016-05-25 | 长春理工大学 | Based on the asymmetric image encryption decryption method of quantum cellular neural system |
CN104092530B (en) * | 2014-06-11 | 2017-07-07 | 长春理工大学 | Based on quantum cellular neural hyperchaotic system optical image encryption method |
CN106373082A (en) * | 2016-09-23 | 2017-02-01 | 中山大学 | Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof |
CN109003314B (en) * | 2018-08-14 | 2023-03-21 | 长春理工大学 | Image encryption and decryption method based on four-dimensional quantum Dicke mapping |
CN109117657B (en) * | 2018-08-28 | 2020-06-16 | 电子科技大学 | Lossy image compression encryption method |
CN109672517B (en) * | 2018-12-20 | 2021-07-27 | 杭州电子科技大学 | Encryption and decryption method of OFDM-PON system based on cellular neural network |
CN111464304B (en) * | 2019-01-18 | 2021-04-20 | 江苏实达迪美数据处理有限公司 | Hybrid encryption method and system for controlling system network security |
CN110190959B (en) | 2019-06-28 | 2021-05-07 | 中南大学 | Encryption and decryption method based on continuous variable quantum neural network |
CN111062453B (en) * | 2019-10-16 | 2022-03-18 | 浙江联云智鼎信息科技有限公司 | Super-fusion full-stack type cloud data center system and method |
CN113923315B (en) * | 2021-12-13 | 2022-03-29 | 湖南菠萝互娱网络信息有限公司 | Image cloud storage leakage-prevention encryption system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102360488A (en) * | 2011-09-29 | 2012-02-22 | 付冲 | Digital image encryption method based on chaotic orbit perturbation |
-
2012
- 2012-10-11 CN CN201210384510.4A patent/CN102904710B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102360488A (en) * | 2011-09-29 | 2012-02-22 | 付冲 | Digital image encryption method based on chaotic orbit perturbation |
Non-Patent Citations (1)
Title |
---|
一种结合Cat映射和Henon映射的图像加密技术;田汉清;《计算机应用与软件》;20100930;第27卷(第9期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN102904710A (en) | 2013-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102904710B (en) | Hyper-chaos encryption method for weak password based on quantum cellular neural network | |
Ye | Image scrambling encryption algorithm of pixel bit based on chaos map | |
CN103501224B (en) | Based on the asymmetric image encryption decryption method of quantum cellular neural system | |
CN101447870B (en) | Safe storage method of private key based on technology of distributed password | |
CN106301760B (en) | A kind of 3D point cloud model encryption method based on chaotic maps | |
CN105743645B (en) | Stream code key generating means, method and data encryption, decryption method based on PUF | |
CN103440613B (en) | The color image encrypting method of hyperchaos Rossler system | |
CN109450632A (en) | Key recovery method based on whitepack block cipher CLEFIA analysis | |
Rajput et al. | Towards the growth of image encryption and authentication schemes | |
CN101030852B (en) | Method for enciphering and deciphering human-body safety | |
CN103258312A (en) | Digital image encryption method with rapid key stream generative mechanism | |
CN107276766A (en) | A kind of many authorization attribute encipher-decipher methods | |
CN105373739A (en) | Hyperchaotic system based quantum image encryption method | |
Cao et al. | Secure QR code scheme based on visual cryptography | |
CN102664727A (en) | Virtual optical encryption method based on chaotic mapping | |
CN109361830A (en) | A kind of image encryption method based on plaintext | |
CN110166784A (en) | A kind of adapting to image texture area steganographic algorithm based on block of pixels | |
CN109951273A (en) | A kind of SM4 algorithm whitepack implementation method and device | |
Kamath et al. | Extended visual cryptography for color images using coding tables | |
CN102722856B (en) | Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping | |
Wang et al. | Fisher-Yates scrambling algorithm combined with S-box color image encryption technology based on 3D-SCCM chaotic system | |
Kumar et al. | Image encryption using simplified data encryption standard (S-DES) | |
CN103546277B (en) | The DPA of a kind of smart card SM4 algorithm attacks and key recovery method and system | |
Alghamdi et al. | A secure iris image encryption technique using bio-chaotic algorithm | |
Alghamdi et al. | Bio-chaotic stream cipher-based iris image encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150107 Termination date: 20161011 |
|
CF01 | Termination of patent right due to non-payment of annual fee |