CN103346875B - The production method of digital chaotic ciphers in chaotic secret communication system - Google Patents

The production method of digital chaotic ciphers in chaotic secret communication system Download PDF

Info

Publication number
CN103346875B
CN103346875B CN201310168034.7A CN201310168034A CN103346875B CN 103346875 B CN103346875 B CN 103346875B CN 201310168034 A CN201310168034 A CN 201310168034A CN 103346875 B CN103346875 B CN 103346875B
Authority
CN
China
Prior art keywords
chaos
digital
network
net
chaotic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310168034.7A
Other languages
Chinese (zh)
Other versions
CN103346875A (en
Inventor
黄洪斌
邱灿灿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201310168034.7A priority Critical patent/CN103346875B/en
Publication of CN103346875A publication Critical patent/CN103346875A/en
Application granted granted Critical
Publication of CN103346875B publication Critical patent/CN103346875B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The production method of digital chaotic ciphers in chaotic secret communication system, digital chaotic secure communication system includes 1), the channel that communicates of information transmitting terminal A and information receiving end B, 2) the digital chaos network for producing chaos digital number being connected with channel, by the digital key derivation function g through chaotically coding of the chaos choosing certain length from number produced by this digital chaos network1It is transformed into chaos cipher k1(t), k1(t)=g1(X,p);The complicated chaos net of transmitting-receiving two uses identical method to carry out calculating to obtain Chaotic Synchronous numeric digit;Generated by chaos cipher with the following method and chaos encryption in plain text or deciphering module produces from digital chaos network or deciphering chaos cipher: password k1Length be one to multidigit, from the chaos number that chaos net produces, choose the digital structure password k of somes p by random or regular fashion1=g1[X, p], p≤q;Original numbers all produced by complex network are made a series of function biComputing produces one.

Description

The production method of digital chaotic ciphers in chaotic secret communication system
One, technical field:
The present invention relates to ELECTRONIC INFORMATION SECURITY technical field, especially relate to secret signalling and method.
Two, background technology:
In recent years, secret communication based on Chaotic Synchronous causes international very big research interest.Chaos is protected by people Close communication has carried out substantial amounts of theory and experimentation, and has carried out high-speed remote in commercial fibres communication network from (120km) Experiment.In Chaotic Security Communication Schemes, transmission information is covered by chaotic signal at transmitting terminal, and utilizes chaos same at receiving terminal Chaotic signal is removed and deciphers by step.Owing to chaotic dynamics is the quickest to the initial condition of system and the kinetic parameter of system Sense so that the reconstruction of chaotic dynamics and reproduce extremely difficult, thus the person of stealing secret information is difficult to deciphering and steals secret information signal, and Chaotic Synchronous skill Art but can make legal information recipient remove chaotic signal and decipher.But theory up to the present and experimentation exist Following problem:
(1), in communication, chaotic signal used mostly is Low-dimensional Chaotic Systems (single chaos laser or single chaos circuit) Producing, this makes the person of stealing secret information rebuild chaotic dynamics possible with postponing the methods such as coordinate and then decode.Thus generation higher-dimension Stochastic Chaos signal in the channel utilization are required.
(2), in current chaotic secret research, in channel, transmission is chaos ripple, because chaos ripple is to external worlds such as noises Factor and sensitivity thereof, so it is the most unresolved to utilize Chaotic Synchronous to carry out information decryption technology in remote information is transmitted.Chaos The digitized of signal is the effective scheme solving this problem.
(3), utilize digitized chaotic signal that digital information is encrypted and utilizes the guarantor that Chaotic Synchronous technology is deciphered Close communication plan and technology also do not occur.Particularly compatible with modern digital information technology and obtain the digital chaos secrecy of application Technology have not been reported.
(4), effectively produce complicated and practical digital chaotic ciphers method and technology have not been reported.
Be presently mainly with traditional algorithm produce password information is encrypted, mainly have symmetric encipherment algorithm (as DES, AES etc.) and rivest, shamir, adelman (such as RSA, ECC etc.).But owing to traditional algorithm password is not disposal password, thus Be cracked is very risky, actually has some traditional algorithm passwords and is cracked.
Three, summary of the invention:
The present invention seeks to, propose a kind of chaotic secret communication system based on digital chaos encryption algorithm, including one Complex digital chaotic secret system produces chaotically coding algorithm and the technology of the complicated chaos net of digital chaotic ciphers.This Bright by complicated chaos net generation complex digital chaos cipher, this chaos cipher is disposal password, and password space is much larger than Password space based on traditional algorithm, the deciphering of information is based on Chaotic Synchronous.
The technical scheme is that, digital chaotic secure communication system based on digital chaos encryption algorithm, including:
1), the channel that communicates of information transmitting terminal A and information receiving end B,
2), one be connected with channel for producing the digital chaos network that chaos digital is digital, from this digital chaos net By the digital key derivation function g through chaotically coding of the chaos choosing certain length in number produced by network1It is transformed into chaos Password k1(t), k1(t)=g1(X,p)
Wherein X is numeric digit produced by digital chaos network, and p is that t is from digital long selected by digital chaos network Degree;Information M that information transmitting terminal A will be transmitted in the channel is by password k1Encrypted function F encryption becomes ciphertext C with described Channel transmits: C (t)=F [M (t), k1(t)]
Information receiving end B receives ciphertext C from described channel, then by ciphertext C by chaos cipher k '1Decipher through chaos Function F-1Deciphering: M ' (t)=F-1[C(t),k′1(t)]=M(t)
Chaos cipher k '1Being produced system by information receiving end chaos cipher to produce, this system for generating password is by producing number And the digital chaos network that is connected with described channel and key derivation function g1Constitute, g1By the mode identical with receiving terminal from The number that digital chaos network is chosen becomes chaos cipher k '1(t-τ)=g1[Y(t-τ),p]
Wherein Y is numeric digit produced by information receiving end chaos net, and p is that t is from selected by complicated chaos net Digital length.And the chaos cipher k ' of information receiving end1Chaos cipher k with information transmitting terminal1Chaotic Synchronous:
lim t → ∞ [ k 1 ′ ( t - τ ) - k 1 ( t ) ] → 0 .
Digital chaos network refers to the digital chaos network of complexity.
Decoding method can use differential dynamics equation or the ring-type iteration of unidirectional couplings (OCRM L) non-linear System produces chaotic signal, and chaotic signal is carried out truncation and the chaos pseudo random sequence that produces or classics Logistic maps as chaotic signal generation model.
The full duplex bi-directional digital chaotic secret communication system of the present invention.Information sender and recipient are respectively arranged with two (phases Same or different) chaos net is respectively used to chaos encryption and chaos is deciphered, and the encryption of a side and clear crytpographic key are by different chaos Network produces, but a pair that both sides are corresponding (such as in Fig. 1 14 and 17 and 15 and 16) encrypts and decipher chaos net and to have identical Topological structure and dynamical structure.Encryption function Fi(i=1,2) F is metiFi -1=I.Digital information M is transported through F function by chaos cipher The ciphertext C channel calculating encryption (can contain digital multiplexer, manipulator, demodulator, digital demultiplexer and other Digital Signal Processing Device etc.) it is transferred to after receiving terminal through inverse function Fi -1Computing utilizes Chaotic Synchronous deciphering to obtain transmission information M.To telecommunication, The information processing to be carried out of reception information (is amplified, signal processing etc.).
The digital chaos network that information transmitting terminal A is connected with described channel is connected with described channel with information receiving end B Digital chaos network has the feature that
(1), there is identical topological sum dynamical structure, driven by common signal and the two is in Chaotic Synchronous state, number Word chaos net can be made up of chaotic oscillator on single or multiple networks, and chaotic oscillator (node) i chooses chaos net to be made Form complicated speckle figure chaotic dynamics, both space-time chaos kinetics.In the condition ensureing that two network speckle figure chaotic dynamicss synchronize Under, complicated chaos net is randomly topologically structured structure, such as regular Network, random network, small-world network, scale free net With module network etc.,
(2), information transmitting terminal A is for producing the digital complicated chaos net kinetics equation of chaos digital by differential driving force Equation is described
x · i = f i ( x i , a i ) + Σ j = 1 n G ij H j ( x j ) + Σ j α ij h j [ D ( C A ) , x j ]
Or described by iteration kinetics equation
x l n + 1 = g l ( x l n , b l ) + Σ k = 1 n U lk W k ( x k n , x l ) + Σ k β lk w k [ D ( C A ) , x k n ]
Or jointly described by differential dynamics equation and iteration kinetics equation,
z · i = f i ( z i , a i ) + Σ j = 1 n G ij H j ( z j , x j n ) + Σ j α ij h j [ D ( C A ) , z j , x j n ]
x l n + 1 = g l ( x l n , b l ) + Σ k = 1 n U lk W k ( x k n , x l ) + Σ k β lk w k [ D ( C A ) , x k n , z k ]
Wherein:
z · i = f i ( z i , a i ) , z i ∈ R mi , f i : R mi → R mi , H i : R mi → R mi
x l n + 1 = g l ( x l n , b l ) , x l n ∈ R ml , g l : R ml → R ml , W l : R ml → R ml It is I and the isolated oscillator m of l network nodeiDimension Chaos dynamical equation (non-coupled equation),
xiAbove a little represent xiTime differential, aiAnd blIt is the kinetic parameter of isolated Oscillator Equation, HjAnd Wj Coupling function between network node, GijAnd UijIt is internodal Coupling matrix element, hjAnd wjIt is the driving function of chaos net, drives Dynamic function D (CA) it is to transmit ciphertext CAFunction, αijAnd βijBeing the coefficient of coup, number n >=1 of network chaos node, information connects The chaos net kinetics equation of receiving end B is identical with the chaos net kinetics equation of information transmitting terminal A;
(3), the digital chaos network that information transmitting terminal A and information receiving end B are connected with described channel is provided with above-mentioned side The digitized module of journey or the chaotic signal that will be produced by the analog circuit described by above-mentioned complicated chaos net kinetics equation The generation module of digital chaos signal it is transformed into analog-digital converter,
(4) the complicated chaos net of numeral that, information transmitting terminal A is connected with described channel in (3) and information receiving end B with The digital chaos network that described channel is connected is digital and electronic chaos net or simulation electronic chaos net, digital and electronic chaos Network is realized by logic chip (such as FPGA etc.) is upper, it is possible to upper real at digital signal processor (such as DSP etc.) by certain language Existing, also can be realized by computer program, additionally may be made as special digital chip;Simulation electronic chaos net can turn through analog-to-digital Parallel operation is transformed into digital chaos network, or is turned through analog-digital converter by many chaotic signals that simulation electronic chaos net produces Become digital chaos signal,
(5), the coupling between any two node i of digital chaos network, j can be two variable direct-couplings, it is also possible to chooses Each node variable xiPart digital with variable xjPart number couple, can all adopt in the coupling of chaos net Take this digital coupling, it is also possible to part takes this digital coupling;
(6), in (5), can be to xiAnd xjThe number chosen couples after encoding again, and chaos net can all or portion Divide and use this coding coupling;
Further, in (5) and (6), xiAnd xjRepresent digital in all numbers that chaos net generates by certain Mode is chosen, and as randomly selected mode etc., therefore the coupling between complicated chaos net variable is all numbers that network is generated Between coupling according to certain rules, chaos net can completely or partially use this code selection and coding coupling.
Further, the number that complicated chaos net can be generated by it is coupled to form by certain coupled modes, as with Machine coupling, the free coupled modes of scale etc., the i.e. number of a certain variable of chaos net can partly or entirely become selected from network others The number of amount, therefore number is the elementary cell of complicated chaos net coupling, and digital coupling is a kind of brand-new network coupling side Formula, chaos net can completely or partially use digital coupling.
Further, chaos net can be coupled by number, code selection and coding coupling and Coupled Variable be collectively forming.
Further, the parameter of the complicated chaos net kinetics equation being connected with channel is the function of time.
Further, the common driving function D (C) of the digital chaos network of information sender and receiving party ensures to send out The side of sending and two network Chaotic Synchronous of recipient;The common driving function D (C) of chaos net is the coding function that ciphertext is digital, Different common driving function D (C) provides different chaos net kinetics computings, also will obtain different chaos cipher k;Altogether It is the function of time with driving function, i.e. in the different information encryption periods with different common driving functions.
Further, the chaos net for generating numeric digit that information sender is connected with channel with receiving party Driving function D (C) be used for driving the part or all of variable of chaos net, see the kinetics equation of above-mentioned chaos net, also The part number that can choose D (C) drives the part or all of variable of chaos net, and the part of D (C) is digital and a certain to be become by driving The coupling of amount is to be recompiled by the part number driving variable with this by the part number of D (C), this coding or its certain function It is used for driving this variable.
Further, in the dynamics calculation of chaos net, all chaos net dynamical variables or partial power After each step of variable or a few step Numerical calculate, variable is re-started coding, then carry out next step or under the calculating in several portions, This coding calculates and chooses variable is arbitrary, and variable recompiles the function that rule can be the time.
Further, some in the kinetics calculating process of chaos net calculates step according to certain rules to subnetwork Dynamical variable or overall network dynamical variable press certain way coding, and wherein the number of some dynamical variable can be by one Set pattern rule is chosen by certain way from all numbers that network dynamics variable is generated, the number of some dynamical variable Within the specific limits, this distributed chaotically coding being called chaos net calculates method and distributed to length (vector length) definable Chaotically coding coupled method.Certain way refers to random fashion or regular fashion, or worldlet mode etc..
Further, to the Partial Variable during chaos net dynamics calculation or all variable some calculate step or All calculate step and make certain functional operation, as recompiled the logical operationss etc. such as XOR between computing, different variable, it is possible to should Some function of function and introduction makees certain functional operation, such as logical operations etc..
Further, the dynamic (dynamical) calculating of chaos net can use parallel algorithm and other fast algorithm, chaos net Parameter and dynamical variable can use integer type or Real-valued data, and these data can use the different system tables such as binary system Showing, the complicated chaos net of information transmitting terminal uses identical algorithm with the complicated chaos net of information receiving end.
Further, gained chaos net is calculated from calculating all digital of start time to code fetch moment or part number Can store in memory in case used by code fetch.In can calculating chaos net, gained chaos digital number makees certain function fortune Calculate.
Further, the driving function D (C) being used for generating digital chaos network to ensure these two network chaos received Synchronize.The common driving function D (C) of chaos net is certain digital permutation and combination of numeral ciphertext C or part number ciphertext C Driving function D (C), i.e. D (C) be the digital coding function of ciphertext, different common driving function D (C) is different by being given Chaos net kinetics, also will obtain different chaos cipher k, and common driving function can be the function of time, i.e. in difference The information encryption period with different common driving functions.
Further, the chaos net for generating numeric digit that information sender is connected with channel with receiving party Driving function D (C) can be used to drive the part or all of variable of chaos net, it is possible to the part number choosing D (C) drives mixed The part or all of variable of ignorant network, the part of D (C) is digital and a certain is that the part of D (C) is digital by coupling of driving variable Being recompiled by the part number driving variable with this, this coding or its certain function are used for driving this variable.
The production method of digital chaotic ciphers in chaotic secret communication system, is characterized in that based on digital chaos encryption algorithm Chaotic secret communication system in: the digital chaos network that information transmitting terminal A is connected with described channel and information receiving end B and institute The digital chaos network stating channel connected has the feature that
1) there is identical topological sum dynamical structure, driven by common signal and the two is in Chaotic Synchronous state, it is ensured that Under conditions of two network speckle figure chaotic dynamicss synchronize, digital chaos network includes that complicated chaos net, complicated chaos net are Randomly topologically structured structure, including regular Network, random network, small-world network, scale free net and module network;
2) information transmitting terminal A is for producing the digital complicated chaos net kinetics equation of chaos digital by differential dynamics Equation is described, iteration kinetics equation is described or jointly described by differential dynamics equation and iteration kinetics equation;
Transmitting-receiving two-end complexity chaos net uses identical method to carry out calculating to obtain Chaotic Synchronous numeric digit; Generated by chaos cipher with the following method and chaos encryption or deciphering module in plain text produces from digital chaos network or deciphering Chaos cipher:
(1) password k1Length be one produced by digital network, all original digital B have Nq to multidigit, its Middle N is complicated chaos net member of equation number, and q is the digitized figure place of equation variable;If only utilizing original number, then password k1 Up to k1=Nq;Generally, from the chaos number that chaos net produces, a fixed number is chosen by the mode such as random, regular The digital structure password k of amount p1=g1[X, p], p≤q;
(2) original numbers all produced by complex network are made a series of function biComputing produces a series of new numerals Function,
b1(X,p1),b2(X,p2),…,bm(X,pm), wherein biIt is polynomial function etc., then from this series digit letter Number is chosen digital by function g by the mode such as random1Structure password: k1=g1[b1(X,p1),b2(X,p2),…bm(X,pm), P], wherein g1It it is the coding function such as random, regular;
(3) password k1Also in certain of the digital B generated by complicated chaos net, function F (B) generates: k1=g1[F(B)];
(4) chaos cipher produced to meet certain password distribution, and such as noise profile etc., code power composes letter to be covered The power spectrum of breath;
(5) at information receiving end, clear crytpographic key k '1Producing method and information transmitting terminal encrypted code k1Producing method complete As Quan;
(6) from numeral complex network or its group of functions choose number be exponential code selector continuously choose digital with Produce password.
Further, select by identical or different mode from chaos number produced by information transmitting terminal complexity chaos net Take different modes and choose number, produce chaos cipher k by identical or different mode1,k2,…,ki..., multiple from information receiving terminal Chaos number produced by miscellaneous chaos net chooses chaos that is digital and that produce deciphering by the rule identical with information transmitting terminal Digital ... k 'i,…k′2,k′1, wherein k 'i-ki=0。
Further, the digital structure Chooser of password, the maker of password, the adding of information are chosen from complicated chaos net The driving function device of close device and network is all realized by digital integrated electronic circuit, including using hardware description language at logic chip or special Realize on integrated chip, or realize with computer program on signal processor.
Further, generate at chaos cipher and in chaos encryption module in plain text, comprise:
First depositor is for accepting and storing the chaos cipher k for the encryption of information M generated1,
Second depositor for acceptance and stores encrypted information M,
3rd depositor is used for accepting and store chaos encryption information C,
It is also digital for storing all or part calculating gained chaos net by a depositor,
At least one selector is used for from choosing from complicated chaos net digital for constructing password,
At least one encryption function maker, i.e. information encryption function arithmetical unit,
At least one generates chaos cipher k1Key derivation function arithmetical unit, for choosing from complicated chaos net Number becomes chaos cipher k1
Further, in the generation of information receiving end chaos clear crytpographic key and the deciphering module of ciphertext C, comprise:
First depositor for acceptance and stores the chaos cipher for decrypting ciphertext C generated,
Second depositor for acceptance and stores decrypted ciphertext C,
3rd depositor is used for accepting and store Chaotic Solution confidential information M,
It is also digital for storing all or part calculating gained chaos net by a depositor,
At least one selector is used for from choosing from complicated chaos net digital for clear crytpographic key,
At least one decryption function maker, both ciphertext decryption function arithmetical unit,
At least one generates chaos cipher k '1Key derivation function arithmetical unit, for choosing from complicated chaos net Number become chaos cipher k '1
Further, information sender and receiving party comprise m digital function b respectively1(X,p1),b2(X,p2),… bm(X,pm) generation module and corresponding function register.
Further, information sender and receiving party comprise respectively complicated chaos net driving function maker and Corresponding driving function depositor.
Further, selecting digital from digital chaos network can be in a random basis in the way of producing chaos cipher Choose from digital chaos network, it is also possible to be the modes such as rule, scale freedom, small-world network, chaos cipher generating function g1Can be the function such as coding and rule encoding immediately of network code selection, it is also possible to be that network code selection is first made such as letters such as multinomials Number computing, then encode.
Further, from digital chaos network, digital g in the way of producing chaos cipher is selected1It it is digital chaos network The function of produced all numbers.
The present invention is to produce complicated chaos net mixed of digital chaotic ciphers in a kind of complex digital chaotic secret system Ignorant encryption algorithm and technology.Use suitable encryption function computing encryption transmission information (bright at information transmitting terminal chaos cipher Literary composition M), this digital chaos adds confidential information (ciphertext C) channel and is transferred to information receiving end, and information receiving end uses inverse function computing Utilize Chaotic Synchronous the deciphering of ciphertext C to be obtained and transmit plaintext M '=M.The chaos cipher of information transmitting terminal is mixed by the complexity of transmitting terminal Ignorant network produces.The chaos clear crytpographic key of information receiving end is produced by the complicated chaos net of information receiving end and sends with information End Crypted password Chaotic Synchronous.The complicated chaos net of receiving terminal and transmitting terminal can by Coupled Variable, code selection and coding coupling or Digital coupling is formed, it is possible to be collectively forming by these couplings.
The complicated chaos net of receiving terminal and transmitting terminal has identical topology and dynamical structure.Use and jointly drive skill Art drives the complicated chaos net of receiving terminal and transmitting terminal to make them be in Chaotic Synchronous state, and driving function is the function of ciphertext. In the dynamics calculation of chaos net, all or part of dynamical variable in network can be by certain rule during calculating Rule encodes, and the numeral of some or all network dynamics variable represents that number can be at all-network dynamical variable or network The number that function generates is chosen by certain way.
The medicine have the advantages that this chaos cipher is by producing complex digital chaos cipher from complicated chaos net Disposal password, password space is much larger than password space based on traditional algorithm, and the deciphering of information is based on Chaotic Synchronous, especially Being that this inventive technique can obtain complexity, practicality and chaos cipher at a high speed, this inventive technique is compatible with modern information technologies Digital chaos secrecy technology, this digital chaos secrecy technology can be applicable in modern digital communication, as wired, wireless digital lead to Letter;Information stores;Computer internet etc..
Four, accompanying drawing explanation
Fig. 1 is full duplex bi-directional digital chaotic secret communication system figure;
Fig. 2 is half-duplex bidirectional digital chaotic secure communication system diagram
Fig. 3 is unidirectional digital chaotic secure communication system diagram;
Fig. 4 is directed digital signature chaotic secret communication system figure;
Fig. 5 is complicated chaos net and chaos encryption figure;
Fig. 6 is complicated chaos net and chaos deciphering figure;
Fig. 7 transmitting terminal and receiving terminal produce the complicated chaos net figure of chaos net;
Fig. 8 is full duplex two-way digital signature chaotic secret communication system figure;
Fig. 9 is half-duplex bidirectional digital signature chaotic secret communication system figure;
Figure 10 is multiple terminals unidirectional digital chaotic secure communication system diagram;
Figure 11 is another kind of multiple terminals unidirectional digital chaotic secure communication system diagram;
Figure 12 is by the complicated chaos net figure of 8 complicated chaos nets of son.
Five, detailed description of the invention
For this digital chaos secrecy technology of clearer description, then figure is discussed in detail digital chaos secrecy technology principle And method.
Fig. 1 is the full duplex bi-directional digital chaotic secret communication system of this inventive technique.Information sender and recipient are each Have two (identical or different) chaos nets be respectively used to chaos encryption and chaos deciphering, the encryption of a side and clear crytpographic key by Different chaos nets produce, but a pair that both sides are corresponding (such as in Fig. 1 14 and 17 and 15 and 16) encrypts and decipher chaos net and want There are identical topological structure and dynamical structure.Encryption function Fi(i=1,2) F is metiFi -1=I.Digital information M is by chaos cipher The ciphertext C channel encrypted through F functional operation (can contain digital multiplexer, manipulator, demodulator, digital demultiplexer and other number Word signal processor etc.) it is transferred to after receiving terminal through inverse function Fi -1Computing utilizes Chaotic Synchronous deciphering to obtain transmission information M.Right Telecommunication, the information processing to be carried out of reception information (is amplified, signal processing etc.).
Fig. 2 is the half-duplex bidirectional digital chaotic secure communication system of this inventive technique.With Fig. 1 full-duplex bi-directional communication system Unlike system, information sender and recipient are respectively arranged with a chaos net and i.e. decipher with being also used for chaos for chaos encryption, To double terminal communications, encryption function F meets FF-1=I, communicates to multiple terminals, encryption function FiMeet Fi 2=Fi -2=I。
Fig. 3 is unidirectional digital chaotic secure communication system.Can be used for storage and the extraction of chaos encryption information, identity is known Not.
Fig. 5 be in this inventive technique information transmitting terminal for produce chaos cipher (with add confidential information) complicated chaos net Network, wherein stain represents the chaos node (such as numeral chaos circuit, hardware or software realize) of network.Each node in network The chaos state produced is the most different, and in application, available suitable mode chooses the numeric digit warp that the complicated chaos net of numeral produces Password produces the chaos cipher needed for function g produces, information transmitting terminal and receiving terminal complex network and produces the mode of password, such as figure In 16 and 13(10 and 9), as.The node of chaos net is the most, and the mode producing password is the most.
Fig. 6 be in this inventive technique information receiving end for producing the complicated chaos net of chaos cipher (for decryption information) Network, the chaos net corresponding with transmitting terminal has identical topological structure and dynamical structure.Chaos net in Fig. 5 and Fig. 6 by Ciphertext signal C in channel 5 drives jointly, and in Fig. 1 and Fig. 2, loop 7 and 12 is driver circuit.
Fig. 7 is the complicated chaos net of information system transmitting terminal and receiving terminal, and two complex nonlinear networks have completely Identical kinetics topological structure, maximum Lyapunov exponent λ of two networksmaxShould be greater than 0 to ensure stable network chaos State.Two internetwork maximum transversal Lyapunov index λShould be less than 0 and stablize Chaotic Synchronous so that guarantee two is internetwork.At these Under the conditions of, produce between two networks and postpone the synchronization of chaos speckle figure, thus Crypted password and the clear crytpographic key of Chaotic Synchronous can be produced.
In figures 1-4, in channel, transmission is that digital chaos adds confidential information C, which ensure that the robustness of Chaotic Synchronous.
Figure 10 is multiple terminals unidirectional digital chaotic secure communication system, may be designed to full and half duplex bi-directional digital and mixes Ignorant secret signalling.
Figure 11 is multiple terminals directed digital signature chaotic secret communication system, similar with Fig. 8 and Fig. 9, may be designed to complete double Work and half-duplex bidirectional digital signature chaotic secret communication system.
Figure 12 is a module chaos net, is made up of 8 sub-chaos nets.It is placed in a certain chaotic secret communication terminal For producing different chaos ciphers.This function of module chaos net also can be by a non-module complexity chaos net (as just Advise the arbitrarily complicated structural networks such as network, small-world network, scale free net) replace.Therefore in Fig. 1, Fig. 4, Fig. 8 and Fig. 9 Multiple chaos nets of a certain terminal can replace with a complicated chaos net.
The detailed description of digital chaos encryption technology:
Fig. 1 describes the bi-directional digital chaotic secret communication system relevant to this inventive technique.A terminal sends digital information MA By chaos cipher k1Encrypted function F1Encryption becomes numeral ciphertext CA=F1(MA,k1), this ciphertext sends B to eventually by channel 5 End, B terminal is decrypted function F1 -1With password Chaotic Synchronous k '1=k1Deciphering obtains and transmits digital information M 'A=F1 -1(CA,k′1)= MA.B terminal can also be same method information security is sent to A terminal.To remote information transmission, channel 5 can comprise tune Device processed, demodulator, amplifier and signal processing system etc..In Fig. 1,14 and 17 is the complexity of information transmitting terminal and receiving terminal respectively Chaos net (16 and 15 are also) is used for producing encryption and deciphering chaos cipher, and chaos net 14 and 17 has identical topological sum Dynamical structure.The chaos net 14 of information transmitting terminal A has n node, and the dynamical variable of i-th node is xi, chaos net Network 14 dynamical variable is described by X: X ( t ) = [ x 1 ( t ) , x 2 ( t ) , . . . , x n ( t ) ] T , x i = ( x i 1 , x i 2 , . . . , x im i ) T
The network dynamics equation of chaos net 14 is:
x · i = f i ( x i , a i ) + Σ j = 1 n G ij H j ( x j ) + Σ j α ij h j [ D ( C A ) , x j ]
Or:
X · ( t ) = F ( X , a , G , α )
Wherein:
x · i = f i ( x i , a i ) , x i ∈ R m i , f i : R m i → R m i , H i : R m i → R m i
It is the isolated oscillator m of i-th network nodeiDimension Chaos dynamical equation (non-coupled equation), xiSome tables above Show xiTime differential, aiIt is the kinetic parameter of isolated Oscillator Equation, Hj(xj) coupling function between network node, GijIt is Internodal Coupling matrix element, hj[D(CA),xj] it is the coupling driving function of chaos net, driving function D (CA) it is CALetter Number, αijIt it is the coefficient of coup.All possible parameter { a of network 14i,GijijComposition continuous print parameter space:
ωX={{ai}:{Gij:i,j=1,2,...,n}:{αij:i,j=1,2,...,n}}
And the geometry of network is by matrix element G of n × n coupling matrix GijNumber and distribution (between the node of network 14 Connection number and connect distribution) and H (x) and h [D (CA), x] describe.Make G1Connection matrix for network 14, it may be assumed that
{G1}≡{G:{Gij=1:i,j=1,2,..,n}}
This be one by n × n matrix G1The space of matrices constituted.The driving matrix of network 14 is
1}≡{α:{αij=1;i,j=1,2,..,n}}
All n × n matrix G1And α1The geometry space of formation network:
Thus when n network node is selected, the kinetics space of network 14 is the parameter space of network and several The direct product of what structure space:
Equation below (replaces: x as above equationi→yi), for describing the chaos net of information receiving end B The kinetics of network 17.
Y ( t ) = [ y 1 ( t ) , y 2 ( t ) , . . . , y n ( t ) ] T , y i = ( y i 1 , y i 2 , . . . , y im i ) T
y · i = f i ( y i , a i ) + Σ j = 1 n G ij H j ( y j ) + Σ j α ij h j [ D ( C A ) , x j ]
Or Y · ( t ) = F ( Y , a , G , α )
Wherein y · i = f i ( y i , a i ) , y i ∈ R m i , f i : R m i → R m i , H i : R m i → R m i
The safety of chaotic secret communication is by the chaotic dynamics { f of network nodei(xi,ai), the opening up of complicated chaos net Flutter structure, the complicated dynamical structure of chaos net, the parameter ω (ω of network dynamics equationXAnd ωY) and the driving letter of network Number D (CA) determine that (another one safety factors is the mode being produced chaos cipher by chaos net, the introduction seen below.).? During actual configuration chaotic secret communication system, each communication terminal should be to protect for producing the network dynamics equation of chaos cipher Close, the person that so do not steals secret information is difficult to the information reconstruction network dynamics equation stolen from channel, the most just cannot produce in channel and use In encryption and the chaos cipher of deciphering.
In order to produce stable chaos cipher, network 14 and maximum Lyapunov exponent λ of network 17maxHave to be larger than zero:
λ max = lim t → ∞ 1 t ln ( | δX ( t ) | | δX ( 0 ) | ) = lim t → ∞ 1 t ln ( | δY ( t ) | | δY ( 0 ) | ) > 0
Wherein t is the time, and δ X (t) is the variation of X (t).Choose suitable network oscillator { fi: i=1,2 ..., n} and suitably Coupling function Hj(xj) and hj[D(CA),xj] and adjust network parameter
ωY={{ai};{Gij:i,j=1,2,...,n};{αij:i.j=1,2,...,n}}=ωX
Maximum Lyapunov exponent λ can be mademaxMore than more than zero:
λmax》0
Maximum transversal Lyapunov index λ in order to utilize Chaotic Synchronous to decipher, between network 14 and network 17It is necessarily less than Zero:
&lambda; &perp; = lim t &RightArrow; &infin; 1 t ln ( | X ( t - &tau; ) - Y ( t ) | | X ( 0 ) - Y ( 0 ) | ) < 0
This condition ensures that network 14 and network 17 are in Chaotic Synchronous state:
lim t &RightArrow; &infin; | X ( t - &tau; ) - Y ( t ) | = 0
Wherein τ is that chaotic signal X (t) is sent to B end network 17 required time by A end network 14.Choose suitable network Oscillator { fiAnd suitable coupling function Hj(xj) and hj[D(CA),xj] and adjust network parameter
Y={{ai};{Gij:i,j=1,2,...,n};{αij:i.j=1,2,...,n}}=ωX
Maximum transversal Lyapunov index λ can be madeLess than less than zero: λ《0
Chaotic Synchronous between actually two networks 14 and 17 is by jointly driving D (CA) by function hj[D(CA),xj] ensure, This can find out from the kinetics equation of two networks.The initial value X (0) and Y (0) of two network dynamics equations are random.Suitable Net structure can make
λmax》0,λ" 0 liang of condition is set up simultaneously, sees Fig. 7.Same calculating can be used for network 16 and 15.Actually used Time, can there be identical dynamical structure these two groups of networks (14,17) and (16,15), it is possible to have different dynamical structure.Actual During use, network 14 and 15 can be replaced with a complicated chaos net, and 16 and 17 by a same complicated chaos Network replaces.
Produced chaos cipher in information transmitting terminal by network 14 and have various ways, if network dynamics variable xijWith q position two System number represents: xij=bij qbij q-1...bij 1bij 0, the most N number of network dynamics member of equation can produce Nq two altogether in t and enter System number, (is such as randomly selected) in a certain way from this Nq binary numeral by selector 6 and chooses p (1 < p≤Nq) Individual binary numeral is through function g1Constitute chaos cipher k1
k1(t)=g1(X (t), p), 1 < p≤Nq
The mode as information transmitting terminal is taked to select numeral from chaos net 17 at information receiving end by selector 13 Chaotic signal is to produce the chaos cipher as information transmitting terminal:
k′1(t-τ)=g1(Y (t-τ), p), 1 < p≤Nq
Due to network 14 and network 17 Chaotic Synchronous, so information receiving end is in mixed with the chaos cipher of information transmitting terminal Ignorant synchronous state.
lim t &RightArrow; &infin; [ k 1 &prime; ( t - &tau; ) - k 1 ( t ) ] &RightArrow; 0
Thus legal information receives terminal and can become in plain text by ciphertext deciphering, t-τ herein is the deciphering moment.
In the technology of the present invention, chaos net produces the mode i.e. function g of chaos cipher1Be secrecy and can be the time (both different in the communication process periods can be with different g for the function of t1Function).It can be seen that transmit information safety by Chaos net kinetics equation dX/dt=F (X, a, G, α) and g1Function determines, it is logical that this is equivalent to conventional symmetrical AES secrecy Letter.In this symmetrical chaotic secret communication, the chaos net kinetics equation used by communicating pair and g1Function is the most about Fixed.
It practice, work as sufficiently large (tens the chaos nodes) of size and its power of complicated chaos net (14 and 17) When equation is underground, chaos encryption decryption function g1Can disclose, even if this is owing to identical chaos cipher is produced function g1, different chaos nets also produces different chaos cipher k1, and the person of stealing secret information is difficult to from the information reconstruction network dynamics stolen Equation, so knowing g1Function can not produce password k1With k '1.This asymmetric chaotic secret communication is digital signature secrecy Communication provides conveniently.
On the other hand, if the parameter space of chaos net
ωX={{ai};{Gij:i,j=1,2,...,n}:{αij:i.j=1,2,...,n}}
Sufficiently large (large scale chaos net), we also can disclose topology of networks, and the parameter of chaos net is empty Between and encryption and decryption function g1Underground.
The driving function h [D (C), X] of network is to password k1Impact the biggest it is known that network structure and decryption function, but Do not know D (CA) also cannot generate k1
But safest chaotic communication security scheme is chaos net kinetics equation, g1With D (CA) function is the most underground, Safely but Chaotic Security Communication Schemes easy to use is asymmetric Chaotic Security Communication Schemes both chaos net kinetics for next Equation is underground and g1Function is open, and thirdly security scheme is that topology of networks is open, and the parameter of chaos net is empty Between, function g1And D (CA) underground.The safety of these three Chaotic Security Communication Schemes is better than traditional algorithm cryptography scheme.
Transmitted digital information MAAt A end by password k1Through function F1Computing encryption is transformed into numeral ciphertext CA
CA=F′1(MA,k1)
Due to k1T () is stream cipher, MAIt is segmented encryption and the password k of every section1T () is the most different, because k1(ti)≠k1 (tj).Ciphertext CAChannel 5 is sent to information receiving end B, at B end portion D (CA) through loop 12 drive B end chaos net 17 with Produce Chaotic Synchronous password k '1(t).Numeral ciphertext CABy Chaotic Synchronous password k '1T () is through function F1 -1It is bright that computing is transformed into numeral Literary composition
M A &prime; = F 1 - 1 ( C A , k 1 &prime; ) = M A
But also can constructor F1Make
M′A=F1(CA,k′1)
In Fig. 1, loop 7 and 12 is the driving signal D (C of chaos net 14 and 17 respectivelyA) loop, drive signal D (CA) want Process through digital processing system (for frequency spectrum design, signal amplification and signal stabilization etc.), so that the driving signal D of side a and b (CA) there is stable and identical intensity, D (C simultaneouslyA) the frequency spectrum of frequency spectrum and network 14 and 17 should overlap, thus ensure A end net Network 14 and B end 17 is in Chaotic Synchronous state.
If digital information M transmittedADifference, then CAAlso different, thus transmit information M every timeAProduced password k1(k '1) Also different, so chaos cipher k1With k '1It is disposable stream cipher, and Password Length and transmitted information MALength is the same.
User cipher D can be set by changing the kinetic parameter of network 14 and 17 in this chaotic secret communicationA1With DB1, as made following parameter transformation
&omega; X = { a 1 , a 2 , . . . ; { G ij } ; { &alpha; ij } } &DoubleRightArrow; &omega; X = { { a i 1 + &delta; i 1 } ; { G ij } ; { &alpha; ij } }
&omega; Y = { a 1 , a 2 , . . . ; { G ij } ; { &alpha; ij } } &DoubleRightArrow; &omega; Y = { { a j 1 + &Element; i 1 } ; { G ij } ; { &alpha; ij } }
A end subscriber can be by &delta; = { &delta; i 1 , &delta; i 2 , . . . }
As A end, user cipher D is setA1Foundation: when A end does not inputs password, δ ≠ 0
Network 14 and 17 is asynchronous, and B end cannot utilize Chaotic Synchronous to decipher.During A end input password, δ=0
Same B end subscriber can be by &Element; = { &Element; i 1 , &Element; i 2 , . . . }
As arranging user cipher DB1Foundation, when B end does not inputs password, ∈ ≠ 0
Network 14 and 17 is asynchronous, and B end cannot utilize Chaotic Synchronous to decipher, during B end input password, and ∈=0
It can be seen that only when A and B two ends all input password, ciphertext CA(CB) decrypted could become plaintext MA (MB).
In this case, to ensure during planned network 14 and 17 that following two formulas are set up.
lim t &RightArrow; &infin; | X ( t - &tau; ) - Y ( t ) | &NotEqual; 0 , lim t &RightArrow; &infin; | D A 1 [ X ( t - &tau; ) ] - D B 1 [ Y ( t ) ] | = 0
The two equation ensure that the synchronization of chaos cipher:
lim t &RightArrow; &infin; | D A 1 [ k 1 ( t - &tau; ) ] - D B 1 [ k 1 &prime; ( t ) ] | = 0
Equally, B end can be by digital information MBThrough function F2Chaos encryption becomes numeral ciphertext CBAnd by ciphertext by channel 5 Being sent to A end, A end is through function F2 -1Utilize Chaotic Synchronous by ciphertext CBIt is transformed into numeral plaintext MB.The chaotic secret communication of B → A Process is just the same with the chaotic secret communication process of A → B.
If A end to communicate information to other legal information recipient, such as E end, then E end must have phase complete with A end network 14 With network (dynamical structure is identical), A → E(E → A) chaotic secret communication process and A → B(B → A) identical.With upper Principle that face is same and method, can set up local chaotic secret communication net.
The two-way chaotic secret communication system of full duplex shown by above figure 1 can be mixed by the half-duplex bidirectional shown by Fig. 2 Ignorant secret signalling replaces.To double terminal half-duplex bidirectional chaotic secret communications, encryption function F and decryption function F-1Meet
FF-1=I or F2=F-1F-1=I
And to multiple terminals (m terminal) half-duplex bidirectional chaotic secret communication, encryption function F and decryption function F-1Meet:
F2=F-1F-1=I
Fig. 3 is the unidirectional chaotic secret communication system of this inventive technique, can be used for storage and the reading of ciphertext, in this respect Under, memorizer is a part for channel 5.Information MAThe password k encrypted function F encryption produced by network 14 becomes numeral ciphertext CA, CAChannel is stored in memorizer, reads C from memorizer channelAThen the password k ' that produced by network 17 is also decrypted function F-1Deciphering becomes numeral plaintext MA, this process can simply be expressed as:
MA→F(MA, k)=CA→ memorizer → F-1(MA, k ') and=M 'A=MA
Also can be by numeral plaintext MADirectly channel is stored in memorizer, and at the information outlets chaos encryption of memorizer, closes Method user can decipher numeral ciphertext C by chaosADeciphering becomes numeral plaintext MA, this process can simply be expressed as:
MA→ memorizer → F (MA, k)=CA→F-1(MA, k ') and=M 'A=MA
In Fig. 3, user can arrange password and also can be not provided with password, if arranging password, and user cipher DAAnd DBMethod to set up It is the same with Fig. 1 system.
Fig. 3 is unidirectional chaotic secret communication system, can be used for: identification (authentication function);E-commerce system, electronics Cash system, electronic voting system, e-bidding system and electronic lottery systems etc..
Fig. 4 is the digital signature chaotic secret system of this inventive technique.Compared with Fig. 3, Fig. 4 is many one layer of chaos net 18 With 19, network 18 and 19 has identical topological structure and chaotic dynamics structure, and the chaos net 18 and 19 of this layer is with upper Topological structure and the chaotic dynamics structure of the chaos net 14 and 17 of a layer are identical or different.Information M is transmitted at A endABy The digital chaotic ciphers k that chaos net 18 producesSEncrypted function FSComputing is transformed into signature file MAS:
MAs=F′s(MA,ks)
MASThe digital chaotic ciphers k encrypted function F computing produced by chaos net 14 is transformed into the signature of chaos encryption File CAS:
CAs=F(MAs,k)
Digital signature file C of this chaos encryptionASChannel 5 is sent to B terminal.It is mixed that B terminal utilizes that network 17 produces Ignorant password k ' and Chaotic Synchronous are decrypted function F-1The C received is deciphered in computingASBecome M 'AS:
M′As=F(CAs,k′)
This signature file M 'ASThrough FS -1Computing also utilizes Chaotic Synchronous and the chaos cipher k ' of network 19 generationSIt is transformed into not The digital document M ' of signatureA
M′A=Fs(M′As,k′s)=MA
Fig. 4 system, for the file of chaos encryption is sent to B terminal from A terminal, is similar to Fig. 1 and 2, it is also possible to utilize Full duplex (see figure 8) or the two-way chaotic secret communication system of half-duplex (see figure 9) are by the digital signature file of chaos encryption by B eventually End is sent to A terminal.B terminal is to digital signature chaotic secret system and the A terminal of A terminal to the digital signature chaos of B terminal Secrecy system can identical also can differ.By increasing communication terminal, it is possible to carry out multiple terminals digital signature chaotic secret communication. Communication network is in communication with each other for a pair terminal room for signature chaos net (18 in such as Fig. 4 and 19) with another to communicating The topological structure for the chaos net of signature of terminal room is identical with chaotic dynamics structure.
It practice, be connected with channel communication terminal only needs a complicated chaos net, and in communication network The dynamical structure of its complicated chaos net of terminal mutually carrying out chaotic secret communication should be equally.The chaos that same terminal is different Crypted password kiDifferent production methods, the most different g can be used by same chaos netiFunction produces, each giFunction A corresponding chaos cipher selector.So in Fig. 1, Fig. 4, Fig. 8 and Fig. 9, A terminal and B terminal the most only need a complex network , see Figure 10.Communication network mutually carries out the terminal kinetics knot except its complicated chaos net of chaotic secret communication Structure equally outside, the password of its correspondence produces function g also should be the same with chaos net driving function D (C), and encrypts reconciliation accordingly Close function also should inverse function relation each other.
Figure 11 is that a communication terminal only one of which complexity chaos net is for producing the multiple terminals of different chaos ciphers Digital signature chaotic secret communication system (network).Between A and B in this communication network as a example by digital signature secret communication, A is eventually Hold information M of transmissionADigital signature password ks AiWith corresponding encryption function Fs AiClear crytpographic key k with B terminals BjAnd correspondence Encryption function [Fs Bj]-1Unidirectional or full-duplex communication should be met relation:
k Bj S = k Ai S , [ F Bj s ] - 1 F Ai s = I
Or k Bj S = k Ai S , F Bj s F Ai s = I , [ F Bj s ] - 1 [ F Ai s ] - 1 = I
And half-duplex two-way communication should be met relation:
k Bj S = k Ai S , F Bj s F Ai s = I , [ F Bj s ] - 1 [ F Ai s ] - 1 = I
Equally, A terminal digital signature information MASCrypted password kAiWith corresponding encryption function FAiWith B terminal Clear crytpographic key kBjWith corresponding decryption function [FBj]-1Unidirectional or full-duplex communication should be met relation:
kBj=kAi,[FBj]-1FAi=I
Or kBj=kAi,FBjFAi=I,[FBj]-1[FAi]-1=I
And half-duplex two-way communication should be met relation:
kBj=kAi,FBjFAi=I,[FBj]-1[FAi]-1=I
Simple for design, any two terminals such as A of communication networkiTerminal and AjAll encrypted signature decryption function of terminal Can be taken as the same with information encrypting and decrypting function:
F Bj s = F Ai s = F S , i , j = 1,2 , . . . , l
FBj=FAi=F,i,j=1,2,...,l
Or F Bj s = F Ai s = F Bj = F Ai = F , i , j = 1,2 , . . . , l
From description above it can be seen that a certain chaotic secret communication terminal being connected with channel this invention can have multilamellar Chaos net (>=2 layers), has two-layer chaos net in digital signature chaotic secret communication system as shown in Fig. 4,8,9, a certain mixed Ignorant secret communication terminal same layer also can have multiple chaos net (>=2), the two-way chaotic secret communication of full duplex as shown in Figure 1 System has two.Owing to these chaos nets have connection, thus these chaos sub-networks constitute a module chaos net. This module chaos net can be described with a chaos net equation.So while a certain chaotic secret communication terminal may have multiple Chaos sub-network is for producing different cipher function gi(i=1,2,3 ...), actually can regard a module chaos net as Network, is shown in Figure 12.Multiple chaos cipher function g can be constructed from this module chaos neti,i=1,2,3,….Due to one arbitrarily The complicated chaos net of structure, such as regular structure network, small-world network, scale free net, random structure network etc., it is possible to Construct multiple chaos cipher function gi, i=1,2,3 ..., therefore we are discussing multiple chaos cipher function gi,i=1,2,3,… Generation time, do not repartition general complicated chaos net and module complexity chaos net.Figure 10,11 chaotic secret communication system profits By this thought of this inventive technique.
In this inventive technique, the chaos net shown in Fig. 5 and Fig. 6 can be implemented in software, it is possible to hardware realizes.Real at hardware Now, both available digital circuit realiration, it is also possible to analog circuit realizes.Choosing of scheme depends on applied environment.Chaos net Digital circuit time by hardware description language (such as Verilog HDL or VHDL etc.) write PLD or design Special IC forms digital chaos network, and is encrypted by hardware description language as far as possible.
Digital chaos network can be realized by computer software, it is also possible to high-level language realizes on the chips such as DSP.
The isolated chaotic dynamics of n node of chaos net 14 to stablize the (maximum of each isolated Oscillator Equation Lyapunov index is greater than 0), and the most different (node Chaos dynamical equation is different), at least want part of nodes Different, so can produce complexity space-time chaos speckle figure, and then produce more be reasonably distributed chaos cipher k1State.k1Close Code to choose mode the most, information MATo crack difficulty the biggest.All k1Mode of choosing constitute a discrete space:
K={g1(X, p), p=1,2 ... Nq;{g1i,i=1,2,...}}
The chaos cipher space produced by chaos net 14 is:
After n chaos a period of time (node) { f (x) } is selected, a certain chaos state of network 14 a little determining by this space, Choosing of this point to ensure: 1, the maximum Lyapunov exponent of network 14 is greater than 0 to ensure that network 14 has stable chaos net Network kinetics;2, the maximum transversal Lyapunov index of network 14 is less than 0 to ensure that network 14 and network 17 have stable mixing Ignorant speckle figure synchronizes;3, matrix α and choosing of function h (x) are wanted properly to ensure that network 14 and network 17 are in ciphertext CADrive lower mixed Ignorant synchronization.
In Fig. 1, A terminal chaos cipher selector 6 is at t1Binary numeral that moment produces from digital chaos network 14 (as 1011001010 ... choose m binary numeral by certain way in) and be loaded into depositor formation chaos cipher k1(t1):
k1(t1)=g1(X(t1),p)
This password and binary numeral information M being loaded into another depositorAEncrypted function F computing becomes numeral ciphertext CA (t1), ciphertext CAChannel 5 sends legal information receiving terminal B to.
A terminal chaos cipher selector 6 is at t2Moment presses same from the binary numeral that digital chaos network 14 produces Mode choose binary numeral and be loaded into depositor formed chaos cipher k1(t2)
k1(t2)=g1(X(t2),p)
Generally kl(t1)≠k1(t2)
This password and binary numeral information M being loaded into another depositorAEncrypted function F computing becomes numeral ciphertext CA (t2), ciphertext CAChannel 5 sends legal information receiving terminal B, repeatedly this ciphering process, information M toAIt is transformed into numeral ciphertext CA
It can be seen that k1(ti)≠k1(tj), this chaos cipher is stream cipher.To different encrypted information MA, network 14 Chaos state different, thus this chaos cipher k1Being disposal password, compared with traditional algorithm cipher, confidentiality is higher. The Crypted password k of difference message segment when encryption1T () also can be chosen by different modes, i.e. g1Function differs in different message segments Sample.
It can be seen that the chaos encryption of information and common encryption are the same, also it is the sectional encryption of information, and generally Encrypting different, in chaos encryption, every section of Crypted password is different k1(ti)≠k1(tj)。
This chaos cipher k flexibly1Generating mode add the person of stealing secret information and crack ciphertext CADifficulty.
In the present invention, another kind of simple structure codon usage function g1Mode be tectonic network dynamical variable X (t) Group of functions P={Pj(X), j=1,2 ..., from the binary numeral of group of functions, then choose binary code structure in a certain way Make password k1=g1(P(X),p).Structure P as a example by polynomial function:
{Pa({xi}),Pb({xi}),Pc({xi}),...}
P &alpha; ( { x i } ) = &Sigma; i = 1 N a i x i + &Sigma; i , j = 1 N &alpha; ij x i x j + &Sigma; n 1 n 2 n 3 . . . &Sigma; ijk . . . N &alpha; ijk . . . ( n 1 , n 2 , . . . ) x i n 1 x j n 2 x k n 3 . . . + &CenterDot; &CenterDot; &CenterDot;
{n1,n2,n3,...}∈integers
{ai,bi,aij,bij,dijk...,…}∈R1
Wherein (underground)
{{ai,bi,aij,bij,dijk...,…},{n1,n2,n3,...}}
Constitute a parameter space.
Underground from digital polynomial group P() { Pa({xi}),Pb({xi}),Pc({xi}),...}
Produced binary numeral is pressed any-mode (such as random fashion, certain regular fashion etc.) and chooses digital through letter Number g1Structure chaos cipher k1=g1(P,p).Group of functions P to be easy to calculate, and it takies resources of chip and to lack, chaos cipher k1Product Raw speed wants height.
Above for complicated chaos net 14 and binary system chaos cipher k1Digital circuit also can by computer and The digital display circuits such as DSP utilize software to realize.Obviously
k1(t1)=g1(P(tl),p)
Comprise k1(t2)=gl(X(t2),p)
Digital information used in the present invention and chaos digital password are not limited to binary numeral, it is possible to be other numeral letter Breath and chaos digital password.Binary digit cipher-text information CAConventional chaos encryption information can be solved (main with long-distance transmissions If simulation chaos encryption etc., in channel, transmission is analog encryption information) can not the difficult problem of long-distance transmissions, this all one's life this The more important of bright technology.
The safety of this digital chaos secrecy technology depends on:
(1), the geometry of network,
(2), choosing of network node, fω={fi(xi):i=1,2,...,n};
(3), the kinetic parameter of network, ωX={{ai};{Gij};{αij}};
(4), k1Mode of choosing, K={g1(X,p),p=1,2,...Nq;{g1i,i=1,2,...}}
(5), the structure of chaos net driving function, H, h [D (CA),X]
If the geometry of network and network node choose it is known that i.e.
And fω={fi(xi):i=1,2,...,n}
It is known that our estimation to obtain one group of specific kinetic parameter ωx={{ai};{Gij};{αijAnd the number that determines Word chaos cipher k1, how many points are at least calculated in password space.Network dynamics parameter space is continuous print, and we want pin The every bit in the chaos in network dynamics parameter space and Chaotic Synchronous region is calculated network dynamics equation, the most this Amount of calculation is huge.For the ease of estimation, choose adjacent parameter point and make synchronization error and the chaos wave amplitude order of magnitude Equally, it is assumed that chaos in parameter space and Chaotic Synchronous region be the length of side be the regular polygon (actual area is much larger than this) of 1, Then to calculate
Nω=102Q
The network dynamics equation of individual point, Q is the number of network dynamics parameter.If Q=40, calculating 10 per second8Individual Point, the most at least needs 1065Year.
Assuming that network dynamics variable is represented by q bit, chaos cipher directly takes from network dynamics variable, then Total
N K = qN ( qN - 1 ) qN - 1 qN - 2 &ap; ( qN ) qN
Individual chaos cipher k1Selection scheme.Therefore do not steal secret information person to obtain chaos cipher k1, be from (qN)qNIndividual k1In seek Look for a specific k1.If N=20, q=32, then (qN)qN=(640)640≈25966≈101796.10 are found if per second13Individual close Key k1, classic algorithm then needs about 101775Year.Especially because the sensitivity that network dynamics is to its parameter, (qN)qNIndividual key k1 In uncertain containing the specific key k used by chaos encryption1.If considering choosing and network of network chaotic oscillator further Space structure, it can be seen that the person of stealing secret information substantially can not crack chaos encryption information.
Embodiment: chaos encryption and the deciphering of digital information are described now by an example.A end is connected with channel 5 Be used for produce chaos cipher k1Network 14 be made up of two nodes, retouched by following two isolated node kinetics equation respectively Write,
The dynamical variable of node 1 is by 3-n dimensional vector n x1=(x11,x12,x13)TDescribe, the isolated kinetics equation of node 1 For:
dx 11 dt = - a 1 x 11 - a 2 x 12
dx 12 dt = a 3 x 11 + a 4 x 11 x 13
dx 13 dt = - a 5 x 13 - a 6 x 11 x 12 - a 7
The dynamical variable of node 2 is by 3-n dimensional vector n x2=(x21,x22,x23)TDescribe, the isolated kinetics equation of node 2 For:
dx 21 dt = - a 8 x 21 - a 9 x 22
dx 22 dt = a 10 x 21 + a 11 x 21 x 23 + a 12 x 22
dx 23 dt = - a 13 x 23 - a 14 ( x 21 ) 2 - a 15
Two equations are all class Lorenz equations, pass through coupling terms
G1(x11-x21)
Be coupled together formation network, and this network is by 6 dynamical variable X=(x1,x2)=(x1 1,x1 2,x1 3,x2 1,x2 2,x2 3)T Describe, meet network dynamics equation:
dx 11 dt = - a 1 x 11 - a 2 x 12
dx 12 dt = a 3 x 11 + a 4 x 11 x 13 + &alpha; [ D ( C A ) ] + x 21 - x 11 ]
dx 13 dt = - a 5 x 13 - a 6 x 11 x 13 - a 7
dx 21 dt = - a 8 x 21 - a 9 x 22
dx 22 dt = a 10 x 21 + a 11 x 21 x 23 + a 12 x 22 + G 1 ( x 11 - x 21 )
dx 23 dt = - a 13 x 23 - a 14 ( x 21 ) 2 - a 15
Coupling matrix is:
G = 0 0 G 21 G 22 = G 21 0 0 1 - 1
Coupling function is
H1(x1)=E1x1,H2(x2)=E2x2
E 1 = E 2 = E = 1 0 0 0 0 0 0 0 0
Driving function h and the corresponding coupling matrix of network be:
&alpha; = &alpha; 11 &alpha; 12 0 0 = &alpha; 12 - 1 1 0 0
h1[D(CA),x1]=Ex1+CA
h2[D(CA),x2]=Ex2+2CA
17 network dynamics parameters can be taken as:
ω=({ai};{Gij};{αij})=(a1,a2,...,a15;G1;α)
=(1,1,2.5,1.2,0.28,1.2,0.5,1,1,2.5,1.2,1,0.28,1.2,0.5;1.6;2.5)
In network equation, item
α[D(CA)+x21-x11]
It is numeral ciphertext chaotic signal CAThe function S driving item to network 14 network dynamics equation.B end produces chaos Password k1, the kinetics equation of network 17 and network parameter identical with A end.Under selected network parameter, network Maximum Lyapunov exponent and two internetwork horizontal Lyapunov indexes are respectively λmax> 0, λ< 0.If xiAnd yiTwo enter Number processed is expressed as
x11=bnbn-1...b1b0,x12=cncn-1...c1c0,x21=dndn-1...d1d0
x22=enen-1...e1e0,y11=BnBn-1...B1B0,y12=CnCn-1...C1C0
y21=DnDn-1...D1D0,y22=EnEn-1...E1E0
Then A end encryption and key password k1It is taken as:
k1=g1(x11,x12,x21,x22)=cj1ejkcjmbj1dj2...ej2bjldj1cj2djpej1
Encryption function F is taken as digital chaotic ciphers k1With transmission digital information MAXOR:
CA=F(MA,k1)=MA⊕k1
B terminal number word clear crytpographic key k1, it is taken as:
k′1=g1(y11,y12,y21,y22)=Cj1EjkCjmBj1Dj2Bj2...Ej2BjlDj1Cj2DjpEj1
Decryption function F-1It is taken as digital chaotic ciphers k1, with transmission numeral cipher-text information CAXOR, because of chaos with Step, so k1⊕k′1=0, ciphertext becomes in plain text through Chaotic Synchronous deciphering:
M A &prime; = F - 1 ( C A , k 1 &prime; ) = C A &CirclePlus; k 1 &prime; = M A
We can also be to information M with different password kiWith different encryption function FiEncryption continuously, then ciphertext is
C=bjFj(bj-1...b3F3(b2F2(b1F1(M,k1),k2),k3)...kj)
Recipient deciphers by contrary order and contrary mode
M &prime; = F 1 - 1 ( b 1 - 1 F 2 - 1 ( b 2 - 1 F 3 - 1 ( b 3 - 1 . . . b j - 1 - 1 F j - 1 ( b j - 1 C , k j &prime; ) . . . , k 3 &prime; ) , k 2 &prime; ) , k 1 &prime; ) = M
As information M is encrypted by continuous three times, then ciphertext is
C=b3F3(b2F2(b1F1(M,k1),k2),k3)
Decrypting process is
M &prime; = F 1 - 1 ( b 1 - 1 F 2 - 1 ( b 2 - 1 F 3 - 1 ( b 3 - 1 C , k 3 &prime; ) , k 2 &prime; ) , k 1 &prime; ) = M
This Chaos Encryption Technology also can be used in combination with conventional, asymmetrical and symmetric cryptosystem.
In digital chaotic secure communication, computer program to be used (rudimentary or high-level language) is by above-mentioned and described channel phase Complicated chaos net equation digitized even, or will be produced by the analog circuit described by above-mentioned complicated chaos net kinetics equation Raw chaotic signal analog-digital converter is transformed into digital chaos signal,
Introduction to this inventive technique above be only part describe not be the whole of this inventive technique, to arbitrarily complicated knot The chaos net of structure use distributed digital coupling and distributed digital calculate by produce chaos digital and by certain way from based on Calculating and choose chaos number in chaos net gained number, thus number generates password by certain way and adds secret letter by certain way Cease and Chaotic Synchronous decryption information, and the information transmitting terminal of communication system and information receiving end all use the coding function of ciphertext to make Driving for chaos net broadly falls into this inventive technique category.The technology of this invention and method scope are by following right application institute Describing rather than described by introduction above, all changes of equal value with right application content are considered to be included in following right Among requirement.

Claims (8)

1. the production method of digital chaotic ciphers in chaotic secret communication system, is characterized in that comprising the steps:
1) information transmitting terminal A and information receiving end B have the channel communicated, and channel contains digital multiplexer, manipulator, demodulation Device, digital demultiplexer and digital signal processor;
2) the digital chaos network for producing chaos number being connected with channel, from digital produced by this digital chaos network In to choose the chaos of certain length digital, through the key derivation function g of chaotically coding1It is transformed into chaos cipher k1(t), k1(t)= g1(X, p), wherein X is that digital chaos produced by digital chaos network is digital, and p is that t is from mixed selected by digital chaos network Ignorant digital length;Digital information M (t) that information transmitting terminal A will be transmitted in the channel is by chaos cipher k1(t) encrypted function FiEncryption becomes ciphertext C (t) and transmits in described channel: C (t)=Fi[M(t),k1(t)];
Information transmitting terminal A and receiving terminal B are respectively arranged with digital chaos network, are respectively used to chaos encryption and chaos deciphering, and a side adds Close or clear crytpographic key is produced by different chaos nets;Encryption function Fi(i=1,2) F is metiFi -1=I;Digital information M (t) is by mixing Ignorant password encrypted function FiCiphertext C (t) channel of computing encryption is transferred to after receiving terminal B through decryption function Fi -1Computing profit Obtain with Chaotic Synchronous deciphering and transmit digital information M (t);To telecommunication, reception information carries out information processing;
Information receiving end B receives ciphertext C (t) from described channel, then by ciphertext C (t) by information receiving end B chaos cipher k′1T () is through information receiving end B chaos decryption function Fi -1Deciphering: M ' (t)=F-1 i[C(t),k′1(t)]=M (t)
Information receiving end B chaos cipher k '1T () is produced system by the chaos cipher of information receiving end digital chaos network and produces, should Chaos cipher produces system by producing number the digital chaos network being connected with described channel and key derivation function g1Constitute, g1The mode identical with transmitting terminal is become chaos cipher from the number that digital chaos network is chosen:
k′1(t-τ)=g1[Y(t-τ),p]
Wherein Y is numeric digit produced by information receiving end chaos net, and p is that t is from chaos selected by digital chaos network Digital length;And the chaos cipher k ' of information receiving end1Chaos cipher k with information transmitting terminal1Chaotic Synchronous:
lim t &RightArrow; &infin; &lsqb; k 1 &prime; ( t - &tau; ) - k 1 ( t ) &rsqb; &RightArrow; 0
The numeral that the digital chaos network that information transmitting terminal A is connected with described channel is connected with described channel with information receiving end B Chaos net has the feature that
1) there is identical topological sum dynamical structure, driven by common signal and the two is in Chaotic Synchronous state, it is ensured that two nets Under conditions of network speckle figure chaotic dynamics synchronizes, digital chaos network includes complicated chaos net, and complicated chaos net is any Topological structure, including regular Network, random network, small-world network, scale free net and module network;
2) information transmitting terminal A is for producing the digital complicated chaos net kinetics equation of chaos digital by differential dynamics equation Describe, iteration kinetics equation describe or jointly described by differential dynamics equation and iteration kinetics equation;
The complicated chaos net of transmitting-receiving two uses identical method to carry out calculating to obtain Chaotic Synchronous numeric digit;By mixed The generation of ignorant password and chaos encryption in plain text or deciphering module produce from digital chaos network or deciphering chaos cipher:
(1) chaos cipher k1T the length of () is one produced by digital network, all original digital B have Nq to multidigit, Wherein N is complicated chaos net member of equation number, and q is the digitized figure place of equation variable;If only utilizing original number, then chaos Password k1(t) up to k1(t)=Nq;Generally, by random or regular fashion from the chaos number that chaos net produces Choose the digital structure password k of somes p1(t)=g1[X, p], p≤q;
(2) original numbers all produced by complex network are made a series of function biComputing produces a series of new digital function, b1(X,p1),b2(X,p2),…,bm(X,pm), wherein biIt is polynomial function, then by random from this series digit function Mode is chosen digital by function g1Structure password: k1(t)=g1[b1(X,p1),b2(X,p2),…bm(X,pm), p], wherein g1 It it is random or rule encoding function;
(3) chaos cipher k1The function F (B) of t digital B that () is also generated by complicated chaos net generates: k1(t)=g1[F (B)];
(4) the chaos cipher noise profile to be met produced, code power composes the power spectrum of information to be covered;
(5) at information receiving end, the chaos cipher k ' of decrypting end1The producing method of (t) and the chaos cipher k of information transmitting terminal1 T the producing method of () is identical;
(6) choosing number from numeral complex network or its group of functions is that exponential code selector continuously chooses number to produce Password.
The production method of digital chaotic ciphers in chaotic secret communication system the most according to claim 1, it is characterized in that from Chaos number produced by information transmitting terminal complexity chaos net chooses number by identical or different mode, by identical or different Mode produces chaos cipher k1(t),k2(t),…,ki(t) ..., close from chaos produced by information receiving end complexity chaos net Chaos cipher that is digital and that produce deciphering is chosen by the rule identical with information transmitting terminal ... k ' in Mai(t),…k′2(t),k′1 (t), wherein k 'i(t)-ki(t)=0.
The production method of digital chaotic ciphers in chaotic secret communication system the most according to claim 1, it is characterized in that from Complicated chaos net chooses the digital structure Chooser of password, the maker of password, the encryption equipment of information and the driving letter of network Number device is all realized by digital integrated electronic circuit, realizes on logic chip or special integrated chip including with hardware description language, or Signal processor realizes with computer program.
In chaotic secret communication system the most according to claim 1, the production method of digital chaotic ciphers, is characterized in that Chaos cipher generates and in chaos encryption module in plain text, comprises:
First depositor is for receiving and storing the chaos cipher k encrypted for digital information M (t) generated1(t),
Second depositor for reception and stores encrypted digital information M (t),
3rd depositor is used for receiving and storing chaos encryption digital information M (t),
It is also digital for storing all or part calculating gained chaos net by a depositor,
At least one selector is used for from choosing from complicated chaos net digital for constructing password,
At least one encryption function maker, i.e. information encryption function arithmetical unit,
At least one generates chaos cipher k1Key derivation function arithmetical unit, for the number will chosen from complicated chaos net Become chaos cipher k1(t)。
In chaotic secret communication system the most according to claim 1, the production method of digital chaotic ciphers, is characterized in that letter In the generation of breath receiving terminal chaos clear crytpographic key and the deciphering module of ciphertext C (t), comprise:
First depositor for reception and stores the chaos cipher for decrypting ciphertext C (t) generated,
Second depositor for reception and stores decrypted ciphertext C (t),
3rd depositor is used for receiving and store chaos deciphering digital information M (t),
It is also digital for storing all or part calculating gained chaos net by a depositor,
At least one selector is used for from choosing from complicated chaos net digital for clear crytpographic key,
At least one decryption function maker, both ciphertext decryption function arithmetical unit,
At least one generates chaos cipher k '1T the key derivation function arithmetical unit of (), for choosing from complicated chaos net Number becomes chaos cipher k '1(t)。
6., according to the production method of digital chaotic ciphers in the chaotic secret communication system one of claim 1-5 Suo Shu, it is special Levy and be information transmitting terminal and information receiving end comprises m digital function b respectively1(X,p1),b2(X,p2),…bm(X,pm) generation Module and corresponding function register.
7., according to the production method of digital chaotic ciphers in the chaotic secret communication system one of claim 1-5 Suo Shu, it is special Levy and be information transmitting terminal and information receiving end comprises the driving function maker of complicated chaos net respectively and drives letter accordingly Number depositor.
8., according to the production method of digital chaotic ciphers in the chaotic secret communication system one of claim 1-5 Suo Shu, it is special Levy the mode being to select number to produce chaos cipher from digital chaos network to choose from digital chaos network in a random basis Or rule, scale are free, small-world network mode is chosen, chaos cipher generating function g1It is coding immediately and the rule of network code selection Then coding function, or network code selection is first made polynomial function computing, then encode.
CN201310168034.7A 2013-05-08 2013-05-08 The production method of digital chaotic ciphers in chaotic secret communication system Active CN103346875B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310168034.7A CN103346875B (en) 2013-05-08 2013-05-08 The production method of digital chaotic ciphers in chaotic secret communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310168034.7A CN103346875B (en) 2013-05-08 2013-05-08 The production method of digital chaotic ciphers in chaotic secret communication system

Publications (2)

Publication Number Publication Date
CN103346875A CN103346875A (en) 2013-10-09
CN103346875B true CN103346875B (en) 2016-10-26

Family

ID=49281651

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310168034.7A Active CN103346875B (en) 2013-05-08 2013-05-08 The production method of digital chaotic ciphers in chaotic secret communication system

Country Status (1)

Country Link
CN (1) CN103346875B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103716149A (en) * 2014-01-15 2014-04-09 东南大学 High-speed random number generating system based on chaos network
CN104935425B (en) * 2015-06-17 2019-01-18 贵州诚谨正信息系统工程监理有限公司 A kind of cryptographic calculations method based on nonlinear theory
CN106385312A (en) * 2016-12-13 2017-02-08 陈伟 Digital chaotic encryption method based on chaotic number spectrum
CN107391978B (en) * 2017-07-06 2020-01-14 厦门市美亚柏科信息股份有限公司 Dictionary expansion method and computer-readable storage medium
CN109104544B (en) * 2018-08-07 2020-09-22 东北大学 Chaotic image encryption method based on complex network synchronization
CN112217628B (en) * 2020-10-10 2022-10-11 黄山学院 Chaotic encryption method for communication signals
CN113014396B (en) * 2021-03-01 2022-07-22 重庆邮电大学 Ultra-lightweight encryption method suitable for WBAN data real-time encryption transmission

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216868A (en) * 2007-01-05 2008-07-09 李树德 A method and system with the application of chaos cipher stream encryption
CN102064934A (en) * 2010-06-12 2011-05-18 深圳市九洲电器有限公司 Encryption and decryption method based on chaos ciphers

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050271207A1 (en) * 2004-06-05 2005-12-08 Helmut Frey Method and system for chaotic digital signature, encryption, and authentication

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216868A (en) * 2007-01-05 2008-07-09 李树德 A method and system with the application of chaos cipher stream encryption
CN102064934A (en) * 2010-06-12 2011-05-18 深圳市九洲电器有限公司 Encryption and decryption method based on chaos ciphers

Also Published As

Publication number Publication date
CN103346875A (en) 2013-10-09

Similar Documents

Publication Publication Date Title
CN103346875B (en) The production method of digital chaotic ciphers in chaotic secret communication system
CN1777097B (en) Enciphered data issuing method, enciphering device and deciphering device
Huang Image encryption algorithm using chaotic Chebyshev generator
CN101977112B (en) Public key cipher encrypting and decrypting method based on neural network chaotic attractor
KR19990082665A (en) Common Key Communication Method
CN101374043A (en) Cipher key negotiating method, enciphering/deciphering method and signature/verification method
CN103490883B (en) A kind of multi-variable public key ciphering/decryption system and encrypting/decrypting method
CN107078906A (en) Public key encryp
CN101321058B (en) Method and system for encoding and decoding digital message
JP2008513811A (en) Calculation conversion method and system
CN104519071A (en) Group encryption and decryption method and system with selection and exclusion functions
CN103220130B (en) The encryption of digital chaotic secure communication and decryption method
US20020159588A1 (en) Cryptography with unconditional security for the internet, commercial intranets, and data storage
CN101783728B (en) Public key encryption method for ergodic matrix over hidden field
CN101582170B (en) Remote sensing image encryption method based on elliptic curve cryptosystem
CN109344627A (en) A kind of novel Shannon perfection time slot scrambling
CN103297221B (en) Based on the chaotic secret communication system of digital chaos encryption algorithm
CN101321060B (en) Method and system for encoding and decoding digital message
CN102246456A (en) System and method for countering side-channel attacks against encryption based on cyclic groups
Sloane Error-correcting codes and cryptography
CN103716162A (en) Identity-based safe generalized signcryption method under standard model
CN114257402A (en) Encryption algorithm determination method and device, computer equipment and storage medium
CN107317667A (en) Method for early warning and prior-warning device that a kind of identity document is lost
Taka Secure Communication by combined Diffe-Hellman key exchange Based AES Encryption and Arabic Text Steganography.
Ikhwan et al. Implementation of image file security using the advanced encryption standard method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant