CN103346875A - Method for generating digital chaos code in chaotic secure communication system - Google Patents

Method for generating digital chaos code in chaotic secure communication system Download PDF

Info

Publication number
CN103346875A
CN103346875A CN2013101680347A CN201310168034A CN103346875A CN 103346875 A CN103346875 A CN 103346875A CN 2013101680347 A CN2013101680347 A CN 2013101680347A CN 201310168034 A CN201310168034 A CN 201310168034A CN 103346875 A CN103346875 A CN 103346875A
Authority
CN
China
Prior art keywords
chaos
digital
network
net
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013101680347A
Other languages
Chinese (zh)
Other versions
CN103346875B (en
Inventor
黄洪斌
邱灿灿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201310168034.7A priority Critical patent/CN103346875B/en
Publication of CN103346875A publication Critical patent/CN103346875A/en
Application granted granted Critical
Publication of CN103346875B publication Critical patent/CN103346875B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a method for generating a digital chaos code in a chaotic secure communication system. The digital chaotic secure communication system comprises a channel for communication between an information sending terminal A and an information receiving terminal B and a digital chaotic network that is connected with the channel and is used for generating a chaotic digital numerical code; and a chaotic numerical code with a certain length is selected in numerical codes generated by the digital chaotic network and is converted into a chaotic code k1(t) by a code generation function g1 of chaotic coding, wherein the k1 (t) is expressed by the following formula: k1 (t)= g1 (X, p). The complex receiving and sending chaotic networks employ an identical method to carry out calculation so as to obtain a chaotic synchronous digital numerical code. A chaotic code is generated or decoded from the digital chaotic network based on chaotic code generation and a clear chaotic coding or decoding module by using the following method: a code k1 has the length of one bit or multiple bits, a certain amount P of digital construction codes are selected from chaotic numerical codes generated by the chaotic network according to a random or regular way and the k1 is expressed by the following formula: k1=g1 [X,p], wherein the p is less than or equal to the q; and a series of function bi operation is carried out on all original codes generated by the complex networks so as to generate a series of new digital functions.

Description

The production method of digital chaos password in the chaotic secret communication system
One, technical field:
The present invention relates to the ELECTRONIC INFORMATION SECURITY technical field, especially relate to secret signalling and method.
Two, background technology:
In recent years, synchronous secure communication has caused international very big research interest based on chaos.People have carried out a large amount of theories and experimental study to chaotic secret communication, and have carried out at a high speed remote (120km) experiment in the commercial fibres communication network.In the chaotic secret communication scheme, transmission information is covered by chaotic signal at transmitting terminal, and utilizes chaos synchronously chaotic signal to be removed and decipher at receiving terminal.Because chaotic dynamics is extremely responsive to the kinetic parameter of the initial condition of system and system, make chaotic dynamics reconstruction and reproduce extremely difficult, thereby the person of stealing secret information is difficult to the deciphering signal of stealing secret information, and the chaos simultaneous techniques can make the legal information recipient remove chaotic signal and decipher.Yet there are the following problems in theory up to the present and the experimental study:
(1), used chaotic signal mostly is low-dimensional chaos system (single chaotic laser light device or single chaos circuit) and produces in the communication, this makes the person of stealing secret information might utilize methods such as postponing coordinate to rebuild chaotic dynamics and then decode.Thereby to produce higher-dimension Stochastic Chaos signal and utilize in channel be essential.
(2), in the research of present chaotic secret, what transmit in the channel is the chaos ripple, because of the chaos ripple to extraneous factor and sensitivities thereof such as noises, so it is also unresolved to utilize chaos to carry out the decrypts information technology synchronously in remote information transmission.The digitlization of chaotic signal is the effective scheme that addresses this problem.
(3), utilize digitized chaotic signal digital information to be encrypted and to utilize the communication schemes of chaos simultaneous techniques deciphering and technology also do not occur.Particularly digital chaos secrecy technology compatible with the modern digital information technology and that obtain to use yet there are no report.
(4), effectively produce complexity and practical digital chaos cryptographic methods and technology and yet there are no report.
At present mainly be with the password that traditional algorithm produces information to be encrypted, mainly contain symmetric encipherment algorithm (as DES, AES etc.) and rivest, shamir, adelman (as RSA, ECC etc.).But because the traditional algorithm password is not disposal password, thus be cracked very risky, in fact existing traditional algorithm passwords are cracked.
Three, summary of the invention:
The present invention seeks to, propose a kind of chaotic secret communication system based on the digital chaos encryption algorithm, comprise the chaotically coding algorithm and the technology that produce the complicated chaos net of digital chaos password in a kind of complex digital chaotic secret system.The present invention produces the complex digital chaos cipher by complicated chaos net, and this chaos cipher is disposal password, and the password space is much larger than the password space based on traditional algorithm, and it is synchronous that the deciphering of information is based on chaos.
Technical scheme of the present invention is that the digital chaos secret signalling based on the digital chaos encryption algorithm comprises:
1), the channel that communicates of information transmitting terminal A and information receiving end B,
2), the digital chaos network for generation of the chaos digital number that is connected with channel, from the number that this digital chaos network produces by the password generating function g of the chaos number of choosing certain-length through chaotically coding 1Be transformed into chaos cipher k 1(t), k 1(t)=g 1(X, p)
Wherein X is the numeral number that the digital chaos network produces, and p is that t is constantly from the selected digital length of digital chaos network; Information transmitting terminal A will be in channel information transmitted M by password k 1Become ciphertext C in described channel, to transmit through encryption function F encryption: C (t)=F[M (t), k 1(t)]
Information receiving end B receives ciphertext C from described channel, then with ciphertext C by chaos cipher k ' 1Through the chaos decode function F -1The deciphering: M ' (t)=F -1[C (t), k ' 1(t)]=M (t)
Chaos cipher k ' 1Produced by information receiving end chaos cipher generation system, this system for generating password is by producing digital chaos network and password generating function g digital and that link to each other with described channel 1Constitute g 1The number of will the mode identical with receiving terminal choosing from the digital chaos network becomes chaos cipher k ' 1(t-τ)=g 1[Y (t-τ), p]
Wherein Y is the numeral number that the information receiving end chaos net produces, and p is that t is constantly from the selected digital length of complicated chaos net.And the chaos cipher k ' of information receiving end 1Chaos cipher k with information transmitting terminal 1Chaos is synchronous:
lim t → ∞ [ k 1 ′ ( t - τ ) - k 1 ( t ) ] → 0 .
The digital chaos network refers to complicated digital chaos network.
Decoding method can adopt differential driving force to learn equation or unidirectional couplings ring-type iteration (OCRM L) non linear system produces chaotic signal, and to chaotic signal carry out truncation and the chaos pseudo random sequence that produces or classical Logistic mapping as the chaotic signal generation model.
Full duplex bi-directional digital chaotic secret communication system of the present invention.Information sender and recipient respectively have two (identical or different) chaos nets to be respectively applied to chaos encryption and chaos decode, one side's encryption and decryption password is produced by different chaos nets, but a pair of (as among Fig. 1 14 and 17 and 15 and 16) encryption and decryption chaos net of both sides' correspondence will have identical topological structure and dynamical structure.Encryption function F i(i=1,2) satisfy F iF i -1=I.Digital information M is transferred to receiving terminal by inverse function F by chaos cipher through F functional operation encrypted ciphertext C channel (can contain digital multiplexer, modulator, demodulator, digital demultiplexer and other digital signal processor etc.) i -1Computing utilizes chaos to decipher synchronously and obtains transmission information M.To telecommunication, reception information will be carried out information processing (amplifying signal processing etc.).
The digital chaos network that information transmitting terminal A links to each other with described channel has following feature with the digital chaos network that information receiving end B links to each other with described channel:
(1), has identical topological sum dynamical structure, be subjected to common signal driving and the two to be in the chaos synchronous state, the digital chaos network can be made of chaotic oscillator on the single or multiple networks, choosing of chaotic oscillator (node) i will make chaos net form complicated spot figure chaotic dynamics, both space-time chaos dynamics.Guaranteeing that complicated chaos net is randomly topologically structured structure under the synchronous condition of two network spot figure chaotic dynamics, as regular network, random network, the worldlet network, scale free net and module network etc.,
(2), information transmitting terminal A learns the equation description for generation of the complicated chaos net kinetics equation of chaos digital number by differential driving force
x · i = f i ( x i , a i ) + Σ j = 1 n G ij H j ( x j ) + Σ j α ij h j [ D ( C A ) , x j ]
Or described by the iteration kinetics equation
x l n + 1 = g l ( x l n , b l ) + Σ k = 1 n U lk W k ( x k n , x l ) + Σ k β lk w k [ D ( C A ) , x k n ]
Or learn equation and the iteration kinetics equation is described jointly by differential driving force,
z · i = f i ( z i , a i ) + Σ j = 1 n G ij H j ( z j , x j n ) + Σ j α ij h j [ D ( C A ) , z j , x j n ]
x l n + 1 = g l ( x l n , b l ) + Σ k = 1 n U lk W k ( x k n , x l ) + Σ k β lk w k [ D ( C A ) , x k n , z k ]
Wherein:
z · i = f i ( z i , a i ) , z i ∈ R mi , f i : R mi → R mi , H i : R mi → R mi
x l n + 1 = g l ( x l n , b l ) , x l n ∈ R ml , g l : R ml → R ml , W l : R ml → R ml Be the isolated oscillator m of i and l network node iDimension chaotic dynamics equation (non-coupled wave equation),
x iAbove a bit represent x iTime differential, a iAnd b lBe the kinetic parameter of isolated oscillator equation, H jAnd W jCoupling function between network node, G IjAnd U IjBe internodal coupling matrix unit, h jAnd w jBe the driving function of chaos net, driving function D (C A) be to transmit ciphertext C AFunction, α IjAnd β IjBe coupling coefficient, number n 〉=1 of network chaos node, the chaos net kinetics equation of information receiving end B and the chaos net kinetics equation of information transmitting terminal A are identical;
(3), the digital chaos network that links to each other with described channel of information transmitting terminal A and information receiving end B is provided with the digitized module of above-mentioned equation or will be transformed into the generation module of digital chaos signal by the chaotic signal that the described analog circuit of above-mentioned complicated chaos net kinetics equation produces with analog-digital converter
(4), the digital complicated chaos net that information transmitting terminal A links to each other with described channel in (3) is digital and electronic chaos net or simulation electronic chaos net with the digital chaos network that information receiving end B links to each other with described channel, the digital and electronic chaos net is gone up and is realized by logic chip (as FPGA etc.), also can be realized at digital signal processor (as DSP etc.) by certain language, also can be realized by computer program, also can be made into the special digital chip in addition; The simulation electronic chaos net can be transformed into the digital chaos network through analog-digital converter, or many chaotic signals of simulation electronic chaos net generation are transformed into the digital chaos signal through analog-digital converter,
(5), the coupling between any two node i of digital chaos network, j can be that two variablees directly are coupled, and also can choose each node variable x iPart digital with variable x jThe part number be coupled, in the coupling of chaos net, can all take this digital coupling, also can partly take this digital coupling;
(6), in (5), can be to x iAnd x jCoupling again after the number of choosing is encoded, chaos net can be coupled by this coding of all or part of employing;
Further, in (5) and (6), x iAnd x jThe expression number in all numbers that chaos net generates, choose by certain way, as picked at random mode etc., therefore the coupling between complicated chaos net variable is according to certain rules coupling between all numbers of generating of network, and chaos net can this code selection of all or part of employing and coding coupling.
Further, complicated chaos net can be coupled to form by certain coupled modes by its number that generates, as coupling, the free coupled modes of scale etc. at random, it is the number that the number of a certain variable of chaos net can partly or entirely be selected from the network others variable, therefore number is the elementary cell of complicated chaos net coupling, digital coupling is a kind of brand-new network coupled modes, and chaos net can the digital coupling of all or part of employing.
Further, chaos net can be formed jointly by number coupling, code selection and coding coupling and Coupled Variable.
The parameter of the complicated chaos net kinetics equation that further, links to each other with channel is the function of time.
Further, the common driving function D (C) of information sender and receiving party's digital chaos network assurance transmit leg and two network chaos of recipient are synchronous; The common driving function D (C) of chaos net is the coding function of ciphertext number, and different common driving function D (C) provides different chaos net dynamics computings, also will obtain different chaos cipher k; Common driving function is the function of time, namely the different information encryption periods with different common driving functions.
Further, the driving function D (C) that information sender and receiving party link to each other with channel is used for generating the digital chaos net of numeral is used for driving the part or all of variable of chaos net, see the kinetics equation of above-mentioned chaos net, also can choose the digital part or all of variable that drives chaos net of part of D (C), the digital coupling with a certain driven variable of the part of D (C) is that this coding or its certain function are used for driving this variable with the digital recompile of the digital part with this driven variable of the part of D (C).
Further, in the dynamics calculation of chaos net, after each step of all chaos net dynamical variables or part dynamical variable or a few step number value are calculated, variable is encoded again, carry out next step then or descend the calculating of several portions, this coding calculates and is arbitrarily to choosing of variable, can be the function of time to variable recompile rule.
Further, in the dynamics calculating process of chaos net some calculated the step and according to certain rules subnetwork dynamical variable or overall network dynamical variable pressed the certain way coding, wherein the number of some dynamical variables can be chosen by certain way from all numbers that the network dynamical variable generates according to certain rules, digital length (vector length) definable of some dynamical variables within the specific limits, this is called distributed chaotically coding computing method and the distributed chaotically coding coupled method of chaos net.Certain way refers to random fashion or regular fashion, or the worldlet mode etc.
Further, Partial Variable in the chaos net dynamics calculation process or whole variable are gone on foot certain functional operation of do in some calculating step or whole calculating, as logical operations such as XOR between recompile computing, different variable etc., also some function of this function and introduction can be done certain functional operation, as logical operation etc.
Further, the dynamic (dynamical) calculating of chaos net can be adopted parallel algorithm and other fast algorithm, the parameter of chaos net and dynamical variable can adopt integer type or real number type data, these data can adopt different systems such as binary system to represent that the complicated chaos net of information transmitting terminal and the complicated chaos net of information receiving end adopt identical algorithm.
Further, calculating the gained chaos net can be stored in the memory used in order to code fetch from calculating the zero hour to code fetch all numbers or part number constantly.Certain functional operation of the digital do of gained chaos digital in can calculating chaos net.
Further, to guarantee that for the driving function D (C) that generates the digital chaos network two network chaos of these receipts are synchronous.The common driving function D (C) of chaos net is the driving function D (C) of certain permutation and combination of the number of digital ciphertext C or the digital ciphertext C of part, be that D (C) is the coding function of ciphertext number, different common driving function D (C) will provide different chaos net dynamics, also will obtain different chaos cipher k, common driving function can be the function of time, namely the different information encryption periods with different common driving functions.
Further, the driving function D (C) that information sender and receiving party link to each other with channel is used for generating the digital chaos net of numeral can be used to drive the part or all of variable of chaos net, also can choose the digital part or all of variable that drives chaos net of part of D (C), the digital coupling with a certain driven variable of the part of D (C) is that this coding or its certain function are used for driving this variable with the digital recompile of the digital part with this driven variable of the part of D (C).
The production method of digital chaos password in the chaotic secret communication system is characterized in that in the chaotic secret communication system based on the digital chaos encryption algorithm: the digital chaos network that information transmitting terminal A links to each other with described channel has following feature with the digital chaos network that information receiving end B links to each other with described channel:
1) has identical topological sum dynamical structure, be subjected to common signal driving and the two to be in the chaos synchronous state, guarantee under the synchronous condition of two network spot figure chaotic dynamics, the digital chaos network comprises complicated chaos net, complicated chaos net is randomly topologically structured structure, comprises regular network, random network, the worldlet network, scale free net and module network;
2) information transmitting terminal A is learned the equation description, is described or described jointly by differential driving force equation and iteration kinetics equation by the iteration kinetics equation by differential driving force for generation of the complicated chaos net kinetics equation of chaos digital number;
The complicated chaos net of transmitting-receiving two-end adopts identical method to calculate to obtain chaos synchronous digital number; Chaos encryption or deciphering module by chaos cipher generation and plaintext produces or the deciphering chaos cipher from the digital chaos network with the following method:
(1) password k 1Length be one the total Nq of all original digital B that digital network produces, wherein N be complicated chaos net member of equation number to multidigit that q is the digitized figure place of equation variable; If only utilize original number, then password k 1The longest is k 1=Nq; Generally speaking, from the chaos number that chaos net produces by at random, mode such as rule chooses the number structure password k of some p 1=g 1[X, p], p≤q;
(2) all original numbers that complex network is produced are made a series of function b iComputing produces a series of new digital function,
b 1(X, p 1), b 2(X, p 2) ..., b m(X, p m), b wherein iBe polynomial function etc., digital by function g by waiting mode to choose at random from this series digit function then 1Structure password: k 1=g 1[b 1(X, p 1), b 2(X, p 2) ... b m(X, p m), p], g wherein 1Be at random, coding function such as rule;
(3) password k 1Also function F (B) generates in certain of the digital B that is generated by complicated chaos net: k 1=g 1[F (B)];
(4) chaos cipher of Chan Shenging will meet certain password and distributes, and as noise profile etc., the password power spectrum will be covered the power spectrum of information;
(5) at information receiving end, clear crytpographic key k ' 1Producing method and information transmitting terminal encrypted code k 1Producing method just the same;
(6) choosing number from digital complex network or its group of functions, to be that the exponential code selector is continuously chosen digital to produce password.
Further, from the chaos number that the complicated chaos net of information transmitting terminal produces, choose different modes by identical or different mode and choose number, produce chaos cipher k by identical or different mode 1, k 2..., k i..., from the chaos number that the complicated chaos net of information receiving terminal produces, choose chaos number digital and the generation deciphering by the rule identical with information transmitting terminal ... k ' i... k ' 2, k ' 1, k ' wherein i-k i=0.
Further, choose Chooser, the maker of password, the encryption equipment of information and the driving function device of network of digital structure password is all realized by digital integrated circuit from complicated chaos net, comprise with hardware description language and realizing at logic chip or special integrated chip, or on signal processor, realize with computer program.
Further, in chaos cipher generation and chaos encryption module expressly, comprise:
First register is used for accepting and storing the chaos cipher k that information M encrypts that is used for that generates 1,
Second register is used for accepting and storing encrypted information M,
The 3rd register is used for accepting and storage chaos encryption information C,
Also be used for all or part number that the gained chaos net is calculated in storage by a register,
At least one selector is used for from choosing from complicated chaos net digital for the structure password,
At least one encryption function maker, i.e. information encryption functional operation device,
At least one generates chaos cipher k 1Password generating function arithmetic unit, be used for becoming chaos cipher k from the number that complicated chaos net is chosen 1
Further, in the generation of information receiving end chaos decode password and the deciphering module of ciphertext C, comprise:
First register is used for accepting and storing the chaos cipher that is used for decrypting ciphertext C that generates,
Second register is used for accepting and storing decrypted ciphertext C,
The 3rd register is used for accepting and storage chaos decode information M,
Also be used for all or part number that the gained chaos net is calculated in storage by a register,
At least one selector is used for from choosing from complicated chaos net digital for clear crytpographic key,
At least one decryption function maker, both decrypt ciphertext functional operation devices,
At least one generates chaos cipher k ' 1Password generating function arithmetic unit, be used for becoming chaos cipher k ' from the number that complicated chaos net is chosen 1
Further, information sender and receiving party comprise m digital function b respectively 1(X, p 1), b 2(X, p 2) ... b m(X, p m) generation module and corresponding function register.
Further, information sender and receiving party comprise driving function maker and the corresponding driving function register of complicated chaos net respectively.
Further, selecting digital mode with the generation chaos cipher from the digital chaos network can be to choose from the digital chaos network with random fashion, also can be modes such as rule, scale are free, worldlet network, chaos cipher generating function g 1Can be the function of coding and rule encoding etc. immediately of network code selection, also can be that the network code selection is done as functional operation such as multinomials earlier, encodes again.
Further, from the digital chaos network, select digital mode g with the generation chaos cipher 1Be all digital functions that the digital chaos network produces.
The present invention is chaotically coding algorithm and the technology that produces the complicated chaos net of digital chaos password in a kind of complex digital chaotic secret system.Adopt suitable encryption function computing to encrypt transmission information (plaintext M) in information transmitting terminal with chaos cipher, this digital chaos enciphered message (ciphertext C) channel is transferred to information receiving end, information receiving end adopt the inverse function computing utilize chaos synchronously ciphertext C deciphering is obtained to transmit plaintext M '=M.The chaos cipher of information transmitting terminal is produced by the complicated chaos net of transmitting terminal.The chaos decode password of information receiving end is produced by the complicated chaos net of information receiving end and is synchronous with information transmitting terminal Crypted password chaos.The complicated chaos net of receiving terminal and transmitting terminal can be formed by Coupled Variable, code selection and coding coupling or digital coupling, also can be formed jointly by these couplings.
The complicated chaos net of receiving terminal and transmitting terminal has identical topology and dynamical structure.The complicated chaos net that adopts common Driving technique to drive receiving terminal and transmitting terminal makes them be in the chaos synchronous state, and driving function is the function of ciphertext.In the dynamics calculation of chaos net, all or part of dynamical variable in the network can be encoded in computational process according to certain rules, and the numeral number of some or all network dynamical variable can be chosen by certain way in the number of all-network dynamical variable or network function generation.
Beneficial effect of the present invention is: by producing the complex digital chaos cipher from complicated chaos net, this chaos cipher is disposal password, the password space is much larger than the password space based on traditional algorithm, it is synchronous that the deciphering of information is based on chaos, particularly this invention technology can obtain complexity, practicality and chaos cipher at a high speed, this invention technology is the digital chaos secrecy technology with the modern information technologies compatibility, this digital chaos secrecy technology can be applicable in the modern digital communication, as wired, radio digital communication; The information storage; Computer internet etc.
Four, description of drawings
Fig. 1 is full duplex bi-directional digital chaotic secret communication system figure;
Fig. 2 is half-duplex bidirectional digital chaos secret signalling figure
Fig. 3 is unidirectional digital chaos secret signalling figure;
Fig. 4 is unidirectional digital signature chaotic secret communication system figure;
Fig. 5 is complicated chaos net and chaos encryption figure;
Fig. 6 is complicated chaos net and chaos decode figure;
Fig. 7 transmitting terminal and receiving terminal produce the complicated chaos net figure of chaos net;
Fig. 8 is full duplex bi-directional digital signature chaotic secret communication system figure;
Fig. 9 is half-duplex bidirectional digital signature chaotic secret communication system figure;
Figure 10 is multiple terminals unidirectional digital chaos secret signalling figure;
Figure 11 is another kind of multiple terminals unidirectional digital chaos secret signalling figure;
Figure 12 is the complicated chaos net figure by 8 complicated chaos nets of son.
Five, embodiment
For this digital chaos secrecy technology of clearer description, figure introduces digital chaos secrecy technology principle and method in detail then.
Fig. 1 is the full duplex bi-directional digital chaotic secret communication system of this invention technology.Information sender and recipient respectively have two (identical or different) chaos nets to be respectively applied to chaos encryption and chaos decode, one side's encryption and decryption password is produced by different chaos nets, but a pair of (as among Fig. 1 14 and 17 and 15 and 16) encryption and decryption chaos net of both sides' correspondence will have identical topological structure and dynamical structure.Encryption function F i(i=1,2) satisfy F iF i -1=I.Digital information M is transferred to receiving terminal by inverse function F by chaos cipher through F functional operation encrypted ciphertext C channel (can contain digital multiplexer, modulator, demodulator, digital demultiplexer and other digital signal processor etc.) i -1Computing utilizes chaos to decipher synchronously and obtains transmission information M.To telecommunication, reception information will be carried out information processing (amplifying signal processing etc.).
Fig. 2 is the half-duplex bidirectional digital chaos secret signalling of this invention technology.Different with Fig. 1 full duplex intercommunication system is that information sender and recipient respectively have a chaos net namely to be used for chaos encryption and also for chaos decode, to two terminal communications, encryption function F satisfies FF -1=I is to multiple terminals communication, encryption function F iSatisfy F i 2=F i -2=I.
Fig. 3 is unidirectional digital chaos secret signalling.Can be used for storage and the extraction of chaos encryption information, identification.
Fig. 5 is that information transmitting terminal is for generation of the complicated chaos net of chaos cipher (using and enciphered message) in this invention technology, and wherein stain is represented the chaos node (as digital chaos circuit, being realized by hardware or software) of network.The chaos state that each node produces in the network is different, available suitable mode is chosen digital digital through the required chaos cipher of password generation function g generation that digital complicated chaos net produces in the application, information transmitting terminal and receiving terminal complex network produce the mode of password, as among Fig. 16 and 13(10 and 9), the same.The node of chaos net is more many, and the mode that produces password is also just more many.
Fig. 6 is that information receiving end is for generation of the chaos cipher complicated chaos net of (being used for decryption information) in this invention technology, and the chaos net corresponding with transmitting terminal has identical topological structure and dynamical structure.Chaos net among Fig. 5 and Fig. 6 is driven jointly by the ciphertext signal C in the channel 5, and loop 7 and 12 is driver circuits among Fig. 1 and Fig. 2.
Fig. 7 is the complicated chaos net of information system transmitting terminal and receiving terminal, and two complex nonlinear networks have identical dynamics topological structure, the maximum Lyapunov exponent λ of two networks MaxShould be greater than 0 to guarantee the stable network chaos state.Two internetwork maximum transversal Lyapunov index λ Should be synchronous to guarantee two internetwork stable chaos less than 0.Under these conditions, it is synchronous to produce delay chaos spot figure between two networks, thereby can produce the synchronous Crypted password of chaos and clear crytpographic key.
In Fig. 1-4, that transmit in the channel is digital chaos enciphered message C, and this has guaranteed the robustness that chaos is synchronous.
Figure 10 is the unidirectional digital chaos secret signalling in multiple terminals, can be designed to full and half duplex bi-directional digital chaotic secret communication system.
Figure 11 is the unidirectional digital signature chaotic secret communication system in multiple terminals, and is similar with Fig. 8 and Fig. 9, can be designed to full and half duplex bi-directional digital signature chaotic secret communication system.
Figure 12 is a module chaos net, is made of 8 sub-chaos nets.Can place a certain chaotic secret communication terminal for generation of different chaos ciphers.This function of module chaos net also can be replaced by the complicated chaos net of a non-module (as regular network, worldlet network, any labyrinth network such as scale free net).Therefore a plurality of chaos nets of a certain terminal can replace with a complicated chaos net among Fig. 1, Fig. 4, Fig. 8 and Fig. 9.
The detailed description of digital chaos encryption technology:
Fig. 1 describes the bi-directional digital chaotic secret communication system relevant with this invention technology.The A terminal sends digital information M ABy chaos cipher k 1Through encryption function F 1Encryption becomes digital ciphertext C A=F 1(M A, k 1), this ciphertext sends the B terminal to by channel 5, and the B terminal is through decryption function F 1 -1With the synchronous k ' of password chaos 1=k 1Deciphering obtains to transmit digital information M ' A=F 1 -1(C A, k ' 1)=M AThe B terminal also can be same method send information security to the A terminal.Remote information is transmitted, and channel 5 can comprise modulator, demodulator, amplifier and signal processing system etc.Among Fig. 1 14 and 17 be respectively the complicated chaos net (16 and 15 also are) of information transmitting terminal and receiving terminal for generation of the encryption and decryption chaos cipher, chaos net 14 and 17 has identical topological sum dynamical structure.The chaos net 14 total n nodes of information transmitting terminal A, the dynamical variable of i node is x i, chaos net 14 dynamical variables are described by X: X ( t ) = [ x 1 ( t ) , x 2 ( t ) , . . . , x n ( t ) ] T , x i = ( x i 1 , x i 2 , . . . , x im i ) T
The network kinetics equation of chaos net 14 is:
x · i = f i ( x i , a i ) + Σ j = 1 n G ij H j ( x j ) + Σ j α ij h j [ D ( C A ) , x j ]
Or:
X · ( t ) = F ( X , a , G , α )
Wherein:
x · i = f i ( x i , a i ) , x i ∈ R m i , f i : R m i → R m i , H i : R m i → R m i
Be the isolated oscillator m of i network node iDimension chaotic dynamics equation (non-coupled wave equation), x iAbove a bit represent x iTime differential, a iBe the kinetic parameter of isolated oscillator equation, H j(x j) coupling function between network node, G IjBe internodal coupling matrix unit, h j[D (C A), x j] be the couple drive function of chaos net, driving function D (C A) be C AFunction, α IjIt is coupling coefficient.All possible parameter { a of network 14 i, G Ij, α IjThe continuous parameter space of formation:
ω X={{a i}:{G ij:i,j=1,2,...,n}:{α ij:i,j=1,2,...,n}}
And the geometry of network is by the matrix element G of n * n coupling matrix G IjNumber and distribution (the internodal linking number of network 14 and be connected distribution) and H (x) and h[D (C A), x] describe.Make G 1Be the connection matrix of network 14, that is:
{G 1}≡{G:{G ij=1:i,j=1,2,..,n}}
This be one by n * n matrix G 1The space of matrices that constitutes.The driving matrix of network 14 is
1}≡{α:{α ij=1;i,j=1,2,..,n}}
All n * n matrix G 1And α 1Form the geometry space of network:
Figure BDA00003160596600136
Thereby under the situation that n network node selected, the dynamics space of network 14 is the parameter space of network and the direct product in geometry space:
Figure BDA00003160596600137
Following equation and top the same (replacement: x of equation i→ y i), for the dynamics of the chaos net 17 of describing information receiving end B.
Y ( t ) = [ y 1 ( t ) , y 2 ( t ) , . . . , y n ( t ) ] T , y i = ( y i 1 , y i 2 , . . . , y im i ) T
y · i = f i ( y i , a i ) + Σ j = 1 n G ij H j ( y j ) + Σ j α ij h j [ D ( C A ) , x j ]
Or Y · ( t ) = F ( Y , a , G , α )
Wherein y · i = f i ( y i , a i ) , y i ∈ R m i , f i : R m i → R m i , H i : R m i → R m i
Figure BDA000031605966001310
Figure BDA000031605966001311
The fail safe of chaotic secret communication is by the chaotic dynamics { f of network node i(x i, a i), the topological structure of complicated chaos net, the dynamical structure of complicated chaos net, the parameter ω (ω of network kinetics equation XAnd ω Y) and the driving function D (C of network A) determine that (the another one safety factor is the mode that is produced chaos cipher by chaos net, the introduction of seeing below.)。When the actual configuration chaotic secret communication system, each communication terminal should be maintained secrecy for generation of the network kinetics equation of chaos cipher, the information that the person that like this do not steal secret information is difficult to steal from channel is rebuild the network kinetics equation, also just can't produce the chaos cipher that is used for encryption and decryption in the channel.
In order to produce stable chaos cipher, the maximum Lyapunov exponent λ of network 14 and network 17 MaxMust be greater than zero:
λ max = lim t → ∞ 1 t ln ( | δX ( t ) | | δX ( 0 ) | ) = lim t → ∞ 1 t ln ( | δY ( t ) | | δY ( 0 ) | ) > 0
Wherein t is the time, and δ X (t) is the variation of X (t).Choose suitable network oscillator { f i: i=1,2 ..., n} and suitable coupling function H j(x j) and h j[D (C A), x j] and adjust network parameter
ω Y={{a i};{G ij:i,j=1,2,...,n};{α ij:i.j=1,2,...,n}}=ω X
Can make maximum Lyapunov exponent λ MaxGreater than greater than zero:
λ max》0
In order to utilize chaos to decipher synchronously, the maximum transversal Lyapunov index λ that network 14 and network are 17 Must be less than zero:
&lambda; &perp; = lim t &RightArrow; &infin; 1 t ln ( | X ( t - &tau; ) - Y ( t ) | | X ( 0 ) - Y ( 0 ) | ) < 0
This condition guarantees that network 14 and network 17 are in the chaos synchronous state:
lim t &RightArrow; &infin; | X ( t - &tau; ) - Y ( t ) | = 0
Wherein τ is that chaotic signal X (t) is sent to B end network 17 required times by A end network 14.Choose suitable network oscillator { f iAnd suitable coupling function H j(x j) and h j[D (C A), x j] and adjust network parameter
Y={{a i};{G ij:i,j=1,2,...,n};{α ij:i.j=1,2,...,n}}=ω X
Can make maximum transversal Lyapunov index λ Less than less than zero: λ " 0
In fact two networks 14 and 17 s' chaos is synchronously by common driving D (C A) by function h j[D (C A), x j] guarantee that this can find out from the kinetics equation of two networks.Initial value X (0) and the Y (0) of two network kinetics equations are at random.Suitable net structure can make
λ Max" 0, λ " 0 liang of condition is set up simultaneously, sees Fig. 7.Same calculating can be used for network 16 and 15.When reality was used, can there be identical dynamical structure this two group network (14,17) and (16,15), also different dynamical structure can be arranged.During actual the use, network 14 and complicated chaos net of 15 usefulness can be replaced, and 16 with the identical complicated chaos net replacement with it of one of 17 usefulness.
Producing chaos cipher in information transmitting terminal by network 14 has multiple mode, if network dynamical variable x IjRepresent with the q bit: x Ij=b Ij qb Ij Q-1... b Ij 1b Ij 0, then N network kinetics equation item can produce Nq binary numeral constantly altogether at t, and (the individual binary numeral of 1<p≤Nq) is through function g to choose p by certain mode (as picked at random etc.) by selector 6 from this Nq binary numeral 1Constitute chaos cipher k 1
k 1(t)=g 1(X(t),p),1<p≤Nq
Taked to select the digital chaos signals to produce the chaos cipher same with information transmitting terminal with the same mode of information transmitting terminal from chaos net 17 by selector 13 at information receiving end:
k′ 1(t-τ)=g 1(Y(t-τ),p),1<p≤Nq
Because network 14 and network 17 chaos are synchronous, so the chaos cipher of information receiving end and information transmitting terminal is in the chaos synchronous state.
lim t &RightArrow; &infin; [ k 1 &prime; ( t - &tau; ) - k 1 ( t ) ] &RightArrow; 0
Thereby the legal information receiving terminal can become decrypt ciphertext expressly, t-τ herein be deciphering constantly.
In the technology of the present invention, the mode that chaos net produces chaos cipher is function g 1Be that (both different period can be with different g in communication process for the function of maintaining secrecy and can be time t 1Function).As can be seen, the fail safe that transmits information by chaos net kinetics equation dX/dt=F (X, a, G, α) and g 1Function determines that this is equivalent to traditional symmetric encipherment algorithm secure communication.In this symmetrical chaotic secret communication, chaos net kinetics equation and g that communicating pair is used 1Function is to arrange in advance.
In fact, when the size of complicated chaos net (14 and 17) when enough big (tens chaos nodes get final product) and its kinetics equation are underground, chaos encryption decryption function g 1Can disclose, even this is because identical chaos cipher is produced function g 1, different chaos nets also produces different chaos cipher k 1, and the person of stealing secret information is difficult to from the information of stealing rebuild the network kinetics equation, so know g 1Function can not produce password k 1And k ' 1This asymmetric chaotic secret communication provides convenience for the digital signature secure communication.
On the other hand, if the parameter space of chaos net
ω X={{a i};{G ij:i,j=1,2,...,n}:{α ij:i.j=1,2,...,n}}
Enough big (large scale chaos net), we also can disclose topology of networks, and the parameter space of chaos net and encryption and decryption function g 1Underground.
The driving function h[D (C) of network, X] to password k 1Influence also very big, know network configuration and decryption function, but do not know D (C A) also can't generate k 1
But safest chaotic communication security scheme is chaos net kinetics equation, g 1And D (C A) function is all underground, secondly safety but chaotic secret communication scheme easy to use are both underground and g of chaos net kinetics equation of asymmetric chaotic secret communication scheme 1Function is open, and secondly security scheme is that topology of networks is open again, and the parameter space of chaos net, function g 1And D (C A) underground.The fail safe of these three kinds of chaotic secret communication schemes all is better than the traditional algorithm cryptography scheme.
Be transmitted digital information M AHold by password k at A 1Through function F 1Computing is encrypted and is transformed into digital ciphertext C A
C A=F′ 1(M A,k 1)
Because k 1(t) be stream cipher, M ABe segmented and encrypt and every section password k 1(t) all different, because k 1(t i) ≠ k 1(t j).Ciphertext C AChannel 5 is sent to information receiving end B, at B end parts D (C A) 12 driving B hold chaos nets 17 to produce chaos Synchronizing Passwords k ' through the loop 1(t).Numeral ciphertext C ABy chaos Synchronizing Passwords k ' 1(t) through function F 1 -1Computing is transformed into numeral expressly
M A &prime; = F 1 - 1 ( C A , k 1 &prime; ) = M A
But but also constructor F 1Make
M′ A=F 1(C A,k′ 1)
Loop 7 and 12 is respectively the driving signal D (C of chaos net 14 and 17 among Fig. 1 A) loop, drive signal D (C A) will handle through digital processing system (being used for frequency spectrum design, signal amplification and signal stabilization etc.), so that the driving signal D (C of side a and b A) have and stablize and identical intensity, while D (C A) frequency spectrum and the frequency spectrum of network 14 and 17 should be overlapping, thereby guarantee that A end network 14 and B end 17 are in the chaos synchronous state.
If the digital information M that transmits ADifference, then C AAlso different, thereby transmit information M at every turn AThe password k that produces 1(k ' 1) also different, so chaos cipher k 1And k ' 1Be disposable stream cipher, and Password Length and the information M that transmits ALength is the same.
In this chaotic secret communication, can user cipher D be set by the kinetic parameter that changes network 14 and 17 A1And D B1, as do following parameter transformation
&omega; X = { a 1 , a 2 , . . . ; { G ij } ; { &alpha; ij } } &DoubleRightArrow; &omega; X = { { a i 1 + &delta; i 1 } ; { G ij } ; { &alpha; ij } }
&omega; Y = { a 1 , a 2 , . . . ; { G ij } ; { &alpha; ij } } &DoubleRightArrow; &omega; Y = { { a j 1 + &Element; i 1 } ; { G ij } ; { &alpha; ij } }
The A end subscriber can with &delta; = { &delta; i 1 , &delta; i 2 , . . . }
As the A end user cipher D is set A1Foundation: when A end is not inputed password, δ ≠ 0
Network 14 and 17 is asynchronous, and the B end can't utilize chaos to decipher synchronously.During A end input password, δ=0
Same B end subscriber can with &Element; = { &Element; i 1 , &Element; i 2 , . . . }
As user cipher D is set B1Foundation, when B end is not inputed password, ∈ ≠ 0
Network 14 and 17 is asynchronous, and the B end can't utilize chaos to decipher synchronously, during B end input password, and ∈=0
As can be seen, has only when password is all inputed in A and B two ends ciphertext C A(C B) could the decrypted plaintext M that becomes A(M B).
In this case, planned network 14 and will guarantee that following two formulas set up at 17 o'clock.
lim t &RightArrow; &infin; | X ( t - &tau; ) - Y ( t ) | &NotEqual; 0 , lim t &RightArrow; &infin; | D A 1 [ X ( t - &tau; ) ] - D B 1 [ Y ( t ) ] | = 0
These two equations have guaranteed the synchronous of chaos cipher:
lim t &RightArrow; &infin; | D A 1 [ k 1 ( t - &tau; ) ] - D B 1 [ k 1 &prime; ( t ) ] | = 0
Equally, the B end can be with digital information M BThrough function F 2Chaos encryption becomes digital ciphertext C BAnd ciphertext is sent to A end by channel 5, A holds through function F 2 -1Utilize chaos synchronously with ciphertext C BBe transformed into digital plaintext M BThe chaotic secret communication process of B → A and the chaotic secret communication process of A → B are just the same.
If A end will transmission information be given other legal information recipient, as the E end, then the E end must have and A end network 14 identical networks (dynamical structure is identical), the chaotic secret communication process of A → E(E → A) and A → B(B → and A) identical.With top same principle and method, can set up local chaotic secret communication net.
The shown two-way chaotic secret communication system of full duplex of top Fig. 1 can be replaced by the shown half-duplex bidirectional chaotic secret communication system of Fig. 2.To two terminal half-duplex bidirectional chaotic secret communications, encryption function F and deciphering function F -1Satisfy
FF -1=I or F 2=F -1F -1=I
And to multiple terminals (m terminal) half-duplex bidirectional chaotic secret communication, encryption function F and deciphering function F -1Satisfy:
F 2=F -1F -1=I
Fig. 3 is the unidirectional chaotic secret communication system of this invention technology, can be used for the storage of ciphertext and reads, and in this case, memory is the part of channel 5.Information M AThe password k that is produced by network 14 becomes digital ciphertext C through encryption function F encryption A, C AChannel deposits memory in, reads C from the memory channel AThen by the password k ' of network 17 generations and through decryption function F -1Deciphering becomes digital plaintext M A, this process can simply be expressed as:
M A→ F (M A, k)=C A→ memory → F -1(M A, k ')=M ' A=M A
Also can be with digital plaintext M ADirectly channel deposits memory in, and at the information outlets chaos encryption of memory, validated user can be with chaos decode with digital ciphertext C ADeciphering becomes digital plaintext M A, this process can simply be expressed as:
M A→ memory → F (M A, k)=C A→ F -1(M A, k ')=M ' A=M A
The user can arrange password and also password can be set among Fig. 3, if then user cipher D of password is set AAnd D BMethod to set up be the same with Fig. 1 system.
Fig. 3 is unidirectional chaotic secret communication system, can be used for: identification (authentication function); E-commerce system, electronic cash system, electronic voting system, e-bidding system and electronic lottery system etc.
Fig. 4 is the digital signature chaotic secret system of this invention technology.Compare with Fig. 3, Fig. 4 is many one deck chaos net 18 and 19, network 18 and 19 has identical topological structure and chaotic dynamics structure, the chaos net 18 of this one deck and 19 and topological structure and the chaotic dynamics structure of the chaos net 14 of last layer and 17 identical or different.Be transmitted information M at the A end ADigital chaos password k by chaos net 18 generations SThrough encryption function F SComputing is transformed into signature file M AS:
M As=F′ s(M A,k s)
M ASBe transformed into the signature file C of chaos encryption through encryption function F computing by the digital chaos password k of chaos net 14 generations AS:
C As=F(M As,k)
The digital signature file C of this chaos encryption ASChannel 5 is sent to the B terminal.The B terminal utilizes chaos cipher k ' that network 17 produces and chaos synchronously through decryption function F -1The C that the computing deciphering receives ASBecome M ' AS:
M′ As=F(C As,k′)
This signature file M ' ASThrough F S -1Computing also utilizes the chaos cipher k ' that chaos is synchronous and network 19 produces SBe transformed into the digital document M ' that does not have signature A
M′ A=F s(M′ As,k′ s)=M A
Fig. 4 system is used for the file of chaos encryption is sent to the B terminal from the A terminal, be similar to Fig. 1 and 2, also can utilize full duplex (see figure 8) or the two-way chaotic secret communication system of half-duplex (see figure 9) that the digital signature file of chaos encryption is sent to the A terminal by the B terminal.The B terminal to the digital signature chaotic secret system of A terminal and A terminal arrive the digital signature chaotic secret system of B terminal can be identical also can be inequality.By increasing communication terminal, also can carry out multiple terminals digital signature chaotic secret communication.The chaos net that is used for signature in the communication network between a pair of mutual communication terminal (as Fig. 4 18 and 19) identical with the chaotic dynamics structure with topological structure of another chaos net that being used between communication terminal signed.
In fact, a communication terminal that links to each other with channel only needs a complicated chaos net get final product, should and carry out the dynamical structure of its complicated chaos net of terminal of chaotic secret communication in the communication network mutually.The chaos encryption password k that same terminal is different iCan adopt different production methods by same chaos net, i.e. different g iFunction produces, each g iThe corresponding chaos cipher selector of function.A terminal and B terminal only need a complex network to get final product respectively among Fig. 1, Fig. 4, Fig. 8 and Fig. 9 like this, see Figure 10.The terminal of carrying out chaotic secret communication in the communication network mutually except the dynamical structure of its complicated chaos net equally, its corresponding password produces function g also should be the same with chaos net driving function D (C), and corresponding encryption and decryption function also each other inverse function concern.
Figure 11 is that a communication terminal has only a complicated chaos net for generation of the multiple terminals digital signature chaotic secret communication system (network) of different chaos ciphers.Be example with digital signature secure communication between the A in this communication network and B, the A terminal is to transmitting information M ADigital signature password k s AiEncryption function F with correspondence s AiClear crytpographic key k with the B terminal s BjEncryption function [F with correspondence s Bj] -1Should satisfy relation to unidirectional or full-duplex communication:
k Bj S = k Ai S , [ F Bj s ] - 1 F Ai s = I
Or k Bj S = k Ai S , F Bj s F Ai s = I , [ F Bj s ] - 1 [ F Ai s ] - 1 = I
And should satisfy relation to the half-duplex two-way communication:
k Bj S = k Ai S , F Bj s F Ai s = I , [ F Bj s ] - 1 [ F Ai s ] - 1 = I
Equally, the A terminal digital signature information M ASCrypted password k AiEncryption function F with correspondence AiClear crytpographic key k with the B terminal BjDecryption function [F with correspondence Bj] -1Should satisfy relation to unidirectional or full-duplex communication:
k Bj=k Ai,[F Bj] -1F Ai=I
Or k Bj=k Ai, F BjF Ai=I, [F Bj] -1[F Ai] -1=I
And should satisfy relation to the half-duplex two-way communication:
k Bj=k Ai,F BjF Ai=I,[F Bj] -1[F Ai] -1=I
Be simplicity of design, any two terminals such as the A of communication network iTerminal and A jAll encrypted signature decryption function of terminal can be taken as the same with the information encryption decryption function:
F Bj s = F Ai s = F S , i , j = 1,2 , . . . , l
F Bj=F Ai=F,i,j=1,2,...,l
Or F Bj s = F Ai s = F Bj = F Ai = F , i , j = 1,2 , . . . , l
From top introduction as can be seen, the a certain chaotic secret communication terminal that links to each other with channel in this invention can have multilayer chaos net (〉=2 layers), two-layer chaos net is arranged in the digital signature chaotic secret communication system shown in Fig. 4,8,9, a certain chaotic secret communication terminal also can have a plurality of chaos nets (〉=2) with one deck, has two in the two-way chaotic secret communication system of full duplex as shown in Figure 1.Because these chaos nets have connection, thereby these chaos sub-networks have constituted a module chaos net.This module chaos net can be described with a chaos net equation.Although so a certain chaotic secret communication terminal may have a plurality of chaos sub-networks for generation of different cipher function g i(i=1,2,3 ...), in fact can regard a module chaos net as, see Figure 12.Can construct a plurality of chaos cipher function g from this module chaos net i, i=1,2,3 ...Since the complicated chaos net of an arbitrary structures, as the regular structure network, the worldlet network, the scale free net, random structure networks etc. also can be constructed a plurality of chaos cipher function g i, i=1,2,3 ..., so we are discussing a plurality of chaos cipher function g i, i=1,2,3 ... generation the time, no longer distinguish the complicated chaos net of general complicated chaos net and module.Figure 10,11 chaotic secret communication systems have utilized this thought of this invention technology.
Fig. 5 and chaos net shown in Figure 6 can be realized by software in this invention technology, but also hardware is realized.When hardware was realized, both the available digital circuit was realized, also available analog circuit is realized.Choosing of scheme depends on applied environment.When the digital circuit of chaos net realizes hardware description language (as Verilog HDL or VHDL etc.) is write programmable logic device or design specialized integrated circuit and form the digital chaos network, and as far as possible hardware description language is encrypted.
The digital chaos network can be realized that also available high-level language realizes at chips such as DSP by computer software.
The isolated chaotic dynamics of the n of chaos net 14 node will be stablized (maximum Lyapunov exponent of each isolated oscillator equation is greater than 0), and preferably different (node chaotic dynamics equation is different) mutually, at least want part of nodes different, can produce complicated space-time chaos spot figure like this, and then produce the rational chaos cipher k of more distributions 1Attitude.k 1The mode of choosing of password is more many, information M ATo crack difficulty just more big.All k 1The mode of choosing constitute a discrete space:
K={g 1(X,p),p=1,2,...Nq;{g 1i,i=1,2,...}}
The chaos cipher space that is produced by chaos net 14 is:
Figure BDA00003160596600201
After n chaos a period of time (node) { f (x) } is selected, the a certain chaos state of network 14 determines a bit that by this space choosing of this point will guarantee: 1, the maximum Lyapunov exponent of network 14 is greater than 0 to guarantee that network 14 has stable chaos net dynamics; 2, the maximum transversal Lyapunov index of network 14 is less than 0 to guarantee that network 14 and network 17 have stable chaos spot figure synchronous; 3, choosing of matrix α and function h (x) wants suitable for to guarantee that network 14 and network 17 are at ciphertext C AChaos is synchronous under driving.
Among Fig. 1, A terminal chaos cipher selector 6 is at t 1Constantly the binary numeral that produces from digital chaos network 14 is (as 1011001010 ...) in choose m binary numeral and be written into register by certain way and form chaos cipher k 1(t 1):
k 1(t 1)=g 1(X(t 1),p)
This password and the binary numeral information M that is written into another register ABecome digital ciphertext C through encryption function F computing A(t 1), ciphertext C AChannel 5 sends legal information receiving terminal B to.
A terminal chaos cipher selector 6 is at t 2From the binary numeral that digital chaos network 14 produces, choose binary numeral by same mode constantly and be written into register formation chaos cipher k 1(t 2)
k 1(t 2)=g 1(X(t 2),p)
K generally speaking l(t 1) ≠ k 1(t 2)
This password and the binary numeral information M that is written into another register ABecome digital ciphertext C through encryption function F computing A(t 2), ciphertext C AChannel 5 sends legal information receiving terminal B to, this ciphering process repeatedly, information M ABe transformed into digital ciphertext C A
As can be seen, k 1(t i) ≠ k 1(t j), this chaos cipher is stream cipher.To different encrypted information M A, the chaos state of network 14 is different, thereby this chaos cipher k 1Be disposal password, compare with traditional algorithm cipher that confidentiality is stronger.The Crypted password k of different message segments when encrypting 1(t) also available different mode is chosen, i.e. g 1Function is different in different message segments.
As can be seen, the chaos encryption of information is the same with common encryption, also is that the segmentation of information is encrypted, and different with common encryption is that every section Crypted password is different k in chaos encryption 1(t i) ≠ k 1(t j).
This k of chaos cipher flexibly 1Generating mode increased the person of stealing secret information and cracked ciphertext C ADifficulty.
Among the present invention, another kind of simple structure password choice function g 1Mode be the group of functions P={P of tectonic network dynamical variable X (t) j(X), j=1,2 ..., from the binary numeral of group of functions, choose binary code structure password k by certain mode then 1=g 1(P (X), p).Be example structure P with the polynomial function:
{P a({x i}),P b({x i}),P c({x i}),...}
P &alpha; ( { x i } ) = &Sigma; i = 1 N a i x i + &Sigma; i , j = 1 N &alpha; ij x i x j + &Sigma; n 1 n 2 n 3 . . . &Sigma; ijk . . . N &alpha; ijk . . . ( n 1 , n 2 , . . . ) x i n 1 x j n 2 x k n 3 . . . + &CenterDot; &CenterDot; &CenterDot;
{n 1,n 2,n 3,...}∈integers
{a i,b i,a ij,b ij,d ijk...,…}∈R 1
Wherein (underground)
{{a i,b i,a ij,b ij,d ijk...,…},{n 1,n 2,n 3,...}}
Constitute a parameter space.
Underground from digital multinomial group P() { P a({ x i), P b({ x i), P c({ x i) ...
Choose digital through function g by any-mode (as random fashion, certain regular fashion etc.) in the binary numeral that produces 1Structure chaos cipher k 1=g 1(P, p).Group of functions P will be convenient to calculate, and it takies resources of chip and will lack chaos cipher k 1Generation speed want high.
Above about complicated chaos net 14 and binary system chaos cipher k 1Digital circuit realize also can utilizing software to realize by digital systems such as computer and DSP.Obviously
k 1(t 1)=g 1(P(t l),p)
Comprise k 1(t 2)=g l(X (t 2), p)
Digital information and chaos digital password used among the present invention are not limited to binary numeral, also other digital information and chaos digital password.Binary digit cipher-text information C ACan long-distance transmissions, the difficult problem that the chaos encryption information (mainly be simulation chaos encryption etc., what transmit in the channel is analog encryption information) in the past of having solved can not long-distance transmissions, this is the more important of this invention technology all one's life.
The fail safe of this digital chaos secrecy technology depends on:
(1), the geometry of network,
(2), network node chooses f ω={ f i(x i): i=1,2 ..., n};
(3), the kinetic parameter of network, ω X={ { a i; { G Ij; { α Ij;
(4), k 1The mode of choosing, K={g 1(X, p), p=1,2 ... Nq; { g 1i, i=1,2 ...
(5), the structure of chaos net driving function, H, h[D (C A), X]
If choosing of the geometry of network and network node is known, namely
Figure BDA00003160596600224
And f ω={ f i(x i): i=1,2 ..., n}
Known, we will obtain one group of specific kinetic parameter ω at estimation x={ { a i; { G Ij; { α IjAnd definite digital chaos password k 1, to calculate what points at least in the password space.Network kinetic parameter space is continuous, and we will be at the every bit computing network kinetics equation of the chaos in the network kinetic parameter space and chaos retaining zone, and certain this amount of calculation is huge.For the ease of estimation, choose adjacent parameter point and make the chaos synchronous error the same with the chaos wave amplitude order of magnitude, suppose that chaos and the chaos retaining zone in the parameter space is that the length of side is 1 regular polygon (actual area is much larger than this), then to calculate
N ω=10 2Q
The network kinetics equation of individual point, Q are the numbers of network kinetic parameter.If Q=40, per second calculates 10 8Individual, then need 10 at least 65Year.
The hypothetical network dynamical variable is represented that by the q bit chaos cipher is directly taken from the network dynamical variable, and is then total
N K = qN ( qN - 1 ) qN - 1 qN - 2 &ap; ( qN ) qN
Individual chaos cipher k 1Selection scheme.Therefore the person of stealing secret information is in order to obtain chaos cipher k 1, be from (qN) QNIndividual k 1Specific k of middle searching 1If N=20, q=32, then (qN) QN=(640) 640≈ 2 5966≈ 10 1796If per second can seek 10 13Individual key k 1, classic algorithm then needs about 10 1775Year.Particularly owing to the sensitiveness of network dynamics to its parameter, (qN) QNIndividual key k 1In the uncertain used specific key k of chaos encryption that contains 1If further consider the space structure with network chosen of network chaotic oscillator, as can be seen, the person of stealing secret information can not crack chaos encryption information basically.
Embodiment: chaos encryption and the deciphering of digital information are described by an example now.A end link to each other with channel 5 for generation of chaos cipher k 1Network 14 constituted by two nodes, described by following two isolated node kinetics equations respectively,
The dynamical variable of node 1 is by 3-n dimensional vector n x 1=(x 11, x 12, x 13) TDescribe, the isolated kinetics equation of node 1 is:
dx 11 dt = - a 1 x 11 - a 2 x 12
dx 12 dt = a 3 x 11 + a 4 x 11 x 13
dx 13 dt = - a 5 x 13 - a 6 x 11 x 12 - a 7
The dynamical variable of node 2 is by 3-n dimensional vector n x 2=(x 21, x 22, x 23) TDescribe, the isolated kinetics equation of node 2 is:
dx 21 dt = - a 8 x 21 - a 9 x 22
dx 22 dt = a 10 x 21 + a 11 x 21 x 23 + a 12 x 22
dx 23 dt = - a 13 x 23 - a 14 ( x 21 ) 2 - a 15
Two equations all are class Lorenz equations, pass through coupling terms
G 1(x 11-x 21)
The formation network that is coupled together, this network is by 6 dynamical variable X=(x 1, x 2)=(x 1 1, x 1 2, x 1 3, x 2 1, x 2 2, x 2 3) TDescribe, satisfy the network kinetics equation:
dx 11 dt = - a 1 x 11 - a 2 x 12
dx 12 dt = a 3 x 11 + a 4 x 11 x 13 + &alpha; [ D ( C A ) ] + x 21 - x 11 ]
dx 13 dt = - a 5 x 13 - a 6 x 11 x 13 - a 7
dx 21 dt = - a 8 x 21 - a 9 x 22
dx 22 dt = a 10 x 21 + a 11 x 21 x 23 + a 12 x 22 + G 1 ( x 11 - x 21 )
dx 23 dt = - a 13 x 23 - a 14 ( x 21 ) 2 - a 15
Coupling matrix is:
G = 0 0 G 21 G 22 = G 21 0 0 1 - 1
Coupling function is
H 1(x 1)=E 1x 1,H 2(x 2)=E 2x 2
E 1 = E 2 = E = 1 0 0 0 0 0 0 0 0
The driving function h of network and corresponding coupling matrix are:
&alpha; = &alpha; 11 &alpha; 12 0 0 = &alpha; 12 - 1 1 0 0
h 1[D(C A),x 1]=Ex 1+C A
h 2[D(C A),x 2]=Ex 2+2C A
17 network kinetic parameters can be taken as:
ω=({a i};{G ij};{α ij})=(a 1,a 2,...,a 15;G 1;α)
=(1,1,2.5,1.2,0.28,1.2,0.5,1,1,2.5,1.2,1,0.28,1.2,0.5;1.6;2.5)
In the network equation,
α[D(C A)+x 21-x 11]
Be digital ciphertext chaotic signal C AFunction S to the driving item of network 14 network kinetics equations.The B end produces chaos cipher k 1, the kinetics equation of network 17 and network parameter and A end identical.Under selected network parameter, the maximum Lyapunov exponent of network and two internetwork horizontal Lyapunov indexes are respectively λ Max>0, λ <0.If x iAnd y iBinary number representation be
x 11=b nb n-1...b 1b 0,x 12=c nc n-1...c 1c 0,x 21=d nd n-1...d 1d 0
x 22=e ne n-1...e 1e 0,y 11=B nB n-1...B 1B 0,y 12=C nC n-1...C 1C 0
y 21=D nD n-1...D 1D 0,y 22=E nE n-1...E 1E 0
A terminal number word Crypted password k then 1Be taken as:
k 1=g 1(x 11,x 12,x 21,x 22)=c j1e jkc jmb j1d j2...e j2b jld j1c j2d jpe j1
Encryption function F is taken as digital chaos password k 1With transmission digital information M AXOR:
C A=F(M A,k 1)=M A⊕k 1
B terminal number word clear crytpographic key k 1, be taken as:
k′ 1=g 1(y 11,y 12,y 21,y 22)=C j1E jkC jmB j1D j2B j2...E j2B jlD j1C j2D jpE j1
Decryption function F -1Be taken as digital chaos password k 1, with the digital cipher-text information C of transmission AXOR, because of chaos synchronous, so k 1⊕ k ' 1=0, ciphertext becomes expressly through chaos deciphering synchronously:
M A &prime; = F - 1 ( C A , k 1 &prime; ) = C A &CirclePlus; k 1 &prime; = M A
We also can be to information M with different password k iWith different encryption function F iEncrypt continuously, then ciphertext is
C=b jF j(b j-1...b 3F 3(b 2F 2(b 1F 1(M,k 1),k 2),k 3)...k j)
The recipient deciphers with opposite order and opposite mode
M &prime; = F 1 - 1 ( b 1 - 1 F 2 - 1 ( b 2 - 1 F 3 - 1 ( b 3 - 1 . . . b j - 1 - 1 F j - 1 ( b j - 1 C , k j &prime; ) . . . , k 3 &prime; ) , k 2 &prime; ) , k 1 &prime; ) = M
Information M encrypted as continuous three times, then ciphertext is
C=b 3F 3(b 2F 2(b 1F 1(M,k 1),k 2),k 3)
Decrypting process is
M &prime; = F 1 - 1 ( b 1 - 1 F 2 - 1 ( b 2 - 1 F 3 - 1 ( b 3 - 1 C , k 3 &prime; ) , k 2 &prime; ) , k 1 &prime; ) = M
This chaos encryption technology also can be united use with symmetric cryptosystem with tradition is asymmetric.
The complicated chaos net equation digitlization that in the digital chaos secure communication, will use computer program (rudimentary or high-level language) that above-mentioned and described channel is linked to each other, or will be transformed into the digital chaos signal with analog-digital converter by the chaotic signal that the described analog circuit of above-mentioned complicated chaos net kinetics equation produces
Introduction to this invention technology only is that the part description is not the whole of this invention technology above, chaos net to any labyrinth adopts distributed number coupling and distributed digital calculating to produce the chaos number and to choose the chaos number by certain way from calculate chaos net gained number, the digital certain way of press generates password and also presses certain way enciphered message and the synchronous decryption information of chaos thus, and the information transmitting terminal of communication system and the information receiving end coding function that all adopts ciphertext all belongs to this invention technology category as the driving of chaos net.The technology of this invention and method scope are described by following right application rather than are described by the introduction of front, and the variation of all and right application content equivalence all is contemplated as falling with among the following claim.

Claims (9)

1. the production method of digital chaos password in the chaotic secret communication system is characterized in that chaotic secret communication system comprises:
1), the channel that communicates of information transmitting terminal A and information receiving end B,
2), the digital chaos network for generation of the chaos digital number that is connected with channel, from the number that this digital chaos network produces by the password generating function g of the chaos number of choosing certain-length through chaotically coding 1Be transformed into chaos cipher k 1(t), k 1(t)=g 1(X, p), wherein X is the numeral number that the digital chaos network produces, p is that t is constantly from the selected digital length of digital chaos network; Information transmitting terminal A will be in channel information transmitted M by password k 1Become ciphertext C in described channel, to transmit through encryption function F encryption: C (t)=F[M (t), k 1(t)];
Information sender and recipient respectively have chaos net to be respectively applied to chaos encryption and chaos decode, and a side encryption or clear crytpographic key are produced by different chaos nets; Encryption function F i(i=1,2) satisfy F iF i -1=I; Digital information M by chaos cipher through F functional operation encrypted ciphertext C channel; Channel contains digital multiplexer, modulator, demodulator, digital demultiplexer and other digital signal processor; Be transferred to receiving terminal by inverse function F i -1Computing utilizes chaos to decipher synchronously and obtains transmission information M; To telecommunication, reception information is carried out information processing;
Information receiving end B receives ciphertext C from described channel, then with ciphertext C by chaos cipher k ' 1Through the chaos decode function F -1The deciphering: M ' (t)=F -1[C (t), k ' 1(t)]=M (t)
Chaos cipher k ' 1Produced by information receiving end chaos cipher generation system, this system for generating password is by producing digital chaos network and password generating function g digital and that link to each other with described channel 1Constitute g 1The number of will the mode identical with receiving terminal choosing from the digital chaos network becomes chaos cipher k ' 1(t-τ)=g 1[Y (t-τ), p]
Wherein Y is the numeral number that the information receiving end chaos net produces, and p is that t is constantly from the selected digital length of complicated chaos net; And the chaos cipher k ' of information receiving end 1Chaos cipher k with information transmitting terminal 1Chaos is synchronous:
lim t &RightArrow; &infin; [ k 1 &prime; ( t - &tau; ) - k 1 ( t ) ] &RightArrow; 0
The digital chaos network that information transmitting terminal A links to each other with described channel has following feature with the digital chaos network that information receiving end B links to each other with described channel:
1) has identical topological sum dynamical structure, be subjected to common signal driving and the two to be in the chaos synchronous state, guarantee under the synchronous condition of two network spot figure chaotic dynamics, the digital chaos network comprises complicated chaos net, complicated chaos net is randomly topologically structured structure, comprises regular network, random network, the worldlet network, scale free net and module network;
2) information transmitting terminal A is learned the equation description, is described or described jointly by differential driving force equation and iteration kinetics equation by the iteration kinetics equation by differential driving force for generation of the complicated chaos net kinetics equation of chaos digital number;
Receiving and dispatching two complicated chaos nets adopts identical method to calculate to obtain chaos synchronous digital number; Chaos encryption or deciphering module by chaos cipher generation and plaintext produce or the deciphering chaos cipher from the digital chaos network:
(1) password k 1Length be one the total Nq of all original digital B that digital network produces, wherein N be complicated chaos net member of equation number to multidigit that q is the digitized figure place of equation variable; If only utilize original number, then password k 1The longest is k 1=Nq; Generally speaking, from the chaos number that chaos net produces by at random or regular fashion choose the number structure password k of some p 1=g 1[X, p], p≤q;
(2) all original numbers that complex network is produced are made a series of function b iComputing produces a series of new digital function,
b 1(X, p 1), b 2(X, p 2) ..., b m(X, p m), b wherein iBe polynomial function, digital by function g by waiting mode to choose at random from this series digit function then 1Structure password: k 1=g 1[b 1(X, p 1), b 2(X, p 2) ... b m(X, p m), p], g wherein 1Be at random or the rule encoding function,
(3) password k 1Also function F (B) generates in certain of the digital B that is generated by complicated chaos net: k 1=g 1[F (B)],
(4) chaos cipher of Chan Shenging will meet certain password and distributes, and as noise profile etc., the password power spectrum will be covered the power spectrum of information,
(5) at information receiving end, clear crytpographic key k ' 1Producing method and information transmitting terminal encrypted code k 1Producing method identical;
(6) choosing number from digital complex network or its group of functions, to be that the exponential code selector is continuously chosen digital to produce password.
2. the production method of digital chaos password in the chaotic secret communication system according to claim 1, it is characterized in that choosing different modes by identical or different mode from the chaos number that the complicated chaos net of information transmitting terminal produces chooses number, produces chaos cipher k by identical or different mode 1, k 2..., k i..., from the chaos number that the complicated chaos net of information receiving terminal produces, choose chaos number digital and the generation deciphering by the rule identical with information transmitting terminal ... k ' i... k ' 2, k ' 1, k ' wherein i-k i=0.
3. the production method of digital chaos password in the chaotic secret communication system according to claim 1, it is characterized in that choosing digital Chooser, the maker of password, the encryption equipment of information and the driving function device of network of constructing password from complicated chaos net is all realized by digital integrated circuit, comprise with hardware description language and realizing at logic chip or special integrated chip, or on signal processor, realize with computer program.
4. the production method of digital chaos password in the chaotic secret communication system according to claim 1, it is characterized in that chaos cipher generate and chaos encryption module expressly in, comprise:
First register is used for accepting and storing the chaos cipher k that information M encrypts that is used for that generates 1,
Second register is used for accepting and storing encrypted information M,
The 3rd register is used for accepting and storage chaos encryption information C,
Also be used for all or part number that the gained chaos net is calculated in storage by a register,
At least one selector is used for from choosing from complicated chaos net digital for the structure password,
At least one encryption function maker, i.e. information encryption functional operation device,
At least one generates chaos cipher k 1Password generating function arithmetic unit, be used for becoming chaos cipher k from the number that complicated chaos net is chosen 1
5. the production method of digital chaos password in the chaotic secret communication system according to claim 1 is characterized in that comprising in the deciphering module of the generation of information receiving end chaos decode password and ciphertext C:
First register is used for accepting and storing the chaos cipher that is used for decrypting ciphertext C that generates,
Second register is used for accepting and storing decrypted ciphertext C,
The 3rd register is used for accepting and storage chaos decode information M,
Also be used for all or part number that the gained chaos net is calculated in storage by a register,
At least one selector is used for from choosing from complicated chaos net digital for clear crytpographic key,
At least one decryption function maker, both decrypt ciphertext functional operation devices,
At least one generates chaos cipher k ' 1Password generating function arithmetic unit, be used for becoming chaos cipher k ' from the number that complicated chaos net is chosen 1
6. according to the production method of digital chaos password in the described chaotic secret communication system of one of claim 1-5, it is characterized in that information sender and receiving party comprise m digital function b respectively 1(X, p 1), b 2(X, p 2) ... b m(X, p m) generation module and corresponding function register.
7. according to the production method of digital chaos password in the described chaotic secret communication system of one of claim 1-5, it is characterized in that information sender and receiving party comprise driving function maker and the corresponding driving function register of complicated chaos net respectively.
8. according to the production method of digital chaos password in the described chaotic secret communication system of one of claim 1-5, it is characterized in that selecting from the digital chaos network digital mode with the generation chaos cipher can be to choose from the digital chaos network with random fashion, also can be modes such as rule, scale are free, worldlet network, chaos cipher generating function g 1Can be the function of coding and rule encoding etc. immediately of network code selection, also can be that the network code selection is done as functional operation such as multinomials earlier, encodes again.
9. according to the production method of digital chaos password in the described chaotic secret communication system of one of claim 1-5, it is characterized in that from the digital chaos network, selecting digital to produce the mode g of chaos cipher 1Be all digital functions that the digital chaos network produces.
CN201310168034.7A 2013-05-08 2013-05-08 The production method of digital chaotic ciphers in chaotic secret communication system Active CN103346875B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310168034.7A CN103346875B (en) 2013-05-08 2013-05-08 The production method of digital chaotic ciphers in chaotic secret communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310168034.7A CN103346875B (en) 2013-05-08 2013-05-08 The production method of digital chaotic ciphers in chaotic secret communication system

Publications (2)

Publication Number Publication Date
CN103346875A true CN103346875A (en) 2013-10-09
CN103346875B CN103346875B (en) 2016-10-26

Family

ID=49281651

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310168034.7A Active CN103346875B (en) 2013-05-08 2013-05-08 The production method of digital chaotic ciphers in chaotic secret communication system

Country Status (1)

Country Link
CN (1) CN103346875B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103716149A (en) * 2014-01-15 2014-04-09 东南大学 High-speed random number generating system based on chaos network
CN104935425A (en) * 2015-06-17 2015-09-23 贵州诚谨正信息系统工程监理有限公司 Code computing method based on nonlinear theory
CN106788965A (en) * 2016-12-13 2017-05-31 陈伟 A kind of Digita1 chaotic systems cryptographic methods based on chaos number spectrum
CN107391978A (en) * 2017-07-06 2017-11-24 厦门市美亚柏科信息股份有限公司 Dictionary expanding method and computer-readable recording medium
CN109104544A (en) * 2018-08-07 2018-12-28 东北大学 A kind of New chaotic image encryption method synchronous based on complex network
CN112217628A (en) * 2020-10-10 2021-01-12 黄山学院 Chaotic encryption method for communication signals
CN113014396A (en) * 2021-03-01 2021-06-22 重庆邮电大学 Ultra-lightweight encryption method suitable for WBAN data real-time encryption transmission

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050271207A1 (en) * 2004-06-05 2005-12-08 Helmut Frey Method and system for chaotic digital signature, encryption, and authentication
CN101216868A (en) * 2007-01-05 2008-07-09 李树德 A method and system with the application of chaos cipher stream encryption
CN102064934A (en) * 2010-06-12 2011-05-18 深圳市九洲电器有限公司 Encryption and decryption method based on chaos ciphers

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050271207A1 (en) * 2004-06-05 2005-12-08 Helmut Frey Method and system for chaotic digital signature, encryption, and authentication
CN101216868A (en) * 2007-01-05 2008-07-09 李树德 A method and system with the application of chaos cipher stream encryption
CN102064934A (en) * 2010-06-12 2011-05-18 深圳市九洲电器有限公司 Encryption and decryption method based on chaos ciphers

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103716149A (en) * 2014-01-15 2014-04-09 东南大学 High-speed random number generating system based on chaos network
CN104935425A (en) * 2015-06-17 2015-09-23 贵州诚谨正信息系统工程监理有限公司 Code computing method based on nonlinear theory
CN104935425B (en) * 2015-06-17 2019-01-18 贵州诚谨正信息系统工程监理有限公司 A kind of cryptographic calculations method based on nonlinear theory
CN106788965A (en) * 2016-12-13 2017-05-31 陈伟 A kind of Digita1 chaotic systems cryptographic methods based on chaos number spectrum
CN106788965B (en) * 2016-12-13 2020-05-05 陈伟 Digital chaotic cipher method based on chaotic number spectrum
CN107391978A (en) * 2017-07-06 2017-11-24 厦门市美亚柏科信息股份有限公司 Dictionary expanding method and computer-readable recording medium
CN107391978B (en) * 2017-07-06 2020-01-14 厦门市美亚柏科信息股份有限公司 Dictionary expansion method and computer-readable storage medium
CN109104544A (en) * 2018-08-07 2018-12-28 东北大学 A kind of New chaotic image encryption method synchronous based on complex network
CN109104544B (en) * 2018-08-07 2020-09-22 东北大学 Chaotic image encryption method based on complex network synchronization
CN112217628A (en) * 2020-10-10 2021-01-12 黄山学院 Chaotic encryption method for communication signals
CN113014396A (en) * 2021-03-01 2021-06-22 重庆邮电大学 Ultra-lightweight encryption method suitable for WBAN data real-time encryption transmission
CN113014396B (en) * 2021-03-01 2022-07-22 重庆邮电大学 Ultra-lightweight encryption method suitable for WBAN data real-time encryption transmission

Also Published As

Publication number Publication date
CN103346875B (en) 2016-10-26

Similar Documents

Publication Publication Date Title
Abd El-Latif et al. Secure data encryption based on quantum walks for 5G Internet of Things scenario
CN103346875B (en) The production method of digital chaotic ciphers in chaotic secret communication system
CN104038341B (en) A kind of cross-system of identity-based acts on behalf of re-encryption method
CN101076968B (en) Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups
CN101374043B (en) Cipher key negotiating method, enciphering/deciphering method and signature/verification method
CN101447870B (en) Safe storage method of private key based on technology of distributed password
KR19990082665A (en) Common Key Communication Method
CN101192924B (en) P2P storage system coding method based on Reed-Solomon code
CN107078906A (en) Public key encryp
CN103490883B (en) A kind of multi-variable public key ciphering/decryption system and encrypting/decrypting method
JP2008513811A (en) Calculation conversion method and system
CN101321058B (en) Method and system for encoding and decoding digital message
CN113141247B (en) Homomorphic encryption method, homomorphic encryption device, homomorphic encryption system and readable storage medium
Zaibi et al. Efficient and secure chaotic S‐Box for wireless sensor network
CN101814985A (en) Block cipher system using multi-chaotic mapping multi-dynamic S-box
CN104380651A (en) Method for generating pseudorandom sequence, and method for coding or decoding data stream
CN111600661B (en) Three-dimensional encryption OFDM optical system based on real-time updated chaotic key distribution
CN103220130B (en) The encryption of digital chaotic secure communication and decryption method
CN101783728B (en) Public key encryption method for ergodic matrix over hidden field
CN101022331A (en) Chaos encrypting method based on carrier
CN102013974B (en) Randomly varying nonlinear step-based encryption method
CN109344627A (en) A kind of novel Shannon perfection time slot scrambling
CN103297221B (en) Based on the chaotic secret communication system of digital chaos encryption algorithm
CN101321060B (en) Method and system for encoding and decoding digital message
CN101582170A (en) Remote sensing image encryption method based on elliptic curve cryptosystem

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant