CN103346875B - The production method of digital chaotic ciphers in chaotic secret communication system - Google Patents
The production method of digital chaotic ciphers in chaotic secret communication system Download PDFInfo
- Publication number
- CN103346875B CN103346875B CN201310168034.7A CN201310168034A CN103346875B CN 103346875 B CN103346875 B CN 103346875B CN 201310168034 A CN201310168034 A CN 201310168034A CN 103346875 B CN103346875 B CN 103346875B
- Authority
- CN
- China
- Prior art keywords
- chaos
- digital
- network
- net
- chaotic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The production method of digital chaotic ciphers in chaotic secret communication system, digital chaotic secure communication system includes 1), the channel that communicates of information transmitting terminal A and information receiving end B, 2) the digital chaos network for producing chaos digital number being connected with channel, by the digital key derivation function g through chaotically coding of the chaos choosing certain length from number produced by this digital chaos network1It is transformed into chaos cipher k1(t), k1(t)=g1(X,p);The complicated chaos net of transmitting-receiving two uses identical method to carry out calculating to obtain Chaotic Synchronous numeric digit;Generated by chaos cipher with the following method and chaos encryption in plain text or deciphering module produces from digital chaos network or deciphering chaos cipher: password k1Length be one to multidigit, from the chaos number that chaos net produces, choose the digital structure password k of somes p by random or regular fashion1=g1[X, p], p≤q;Original numbers all produced by complex network are made a series of function biComputing produces one.
Description
One, technical field:
The present invention relates to ELECTRONIC INFORMATION SECURITY technical field, especially relate to secret signalling and method.
Two, background technology:
In recent years, secret communication based on Chaotic Synchronous causes international very big research interest.Chaos is protected by people
Close communication has carried out substantial amounts of theory and experimentation, and has carried out high-speed remote in commercial fibres communication network from (120km)
Experiment.In Chaotic Security Communication Schemes, transmission information is covered by chaotic signal at transmitting terminal, and utilizes chaos same at receiving terminal
Chaotic signal is removed and deciphers by step.Owing to chaotic dynamics is the quickest to the initial condition of system and the kinetic parameter of system
Sense so that the reconstruction of chaotic dynamics and reproduce extremely difficult, thus the person of stealing secret information is difficult to deciphering and steals secret information signal, and Chaotic Synchronous skill
Art but can make legal information recipient remove chaotic signal and decipher.But theory up to the present and experimentation exist
Following problem:
(1), in communication, chaotic signal used mostly is Low-dimensional Chaotic Systems (single chaos laser or single chaos circuit)
Producing, this makes the person of stealing secret information rebuild chaotic dynamics possible with postponing the methods such as coordinate and then decode.Thus generation higher-dimension
Stochastic Chaos signal in the channel utilization are required.
(2), in current chaotic secret research, in channel, transmission is chaos ripple, because chaos ripple is to external worlds such as noises
Factor and sensitivity thereof, so it is the most unresolved to utilize Chaotic Synchronous to carry out information decryption technology in remote information is transmitted.Chaos
The digitized of signal is the effective scheme solving this problem.
(3), utilize digitized chaotic signal that digital information is encrypted and utilizes the guarantor that Chaotic Synchronous technology is deciphered
Close communication plan and technology also do not occur.Particularly compatible with modern digital information technology and obtain the digital chaos secrecy of application
Technology have not been reported.
(4), effectively produce complicated and practical digital chaotic ciphers method and technology have not been reported.
Be presently mainly with traditional algorithm produce password information is encrypted, mainly have symmetric encipherment algorithm (as
DES, AES etc.) and rivest, shamir, adelman (such as RSA, ECC etc.).But owing to traditional algorithm password is not disposal password, thus
Be cracked is very risky, actually has some traditional algorithm passwords and is cracked.
Three, summary of the invention:
The present invention seeks to, propose a kind of chaotic secret communication system based on digital chaos encryption algorithm, including one
Complex digital chaotic secret system produces chaotically coding algorithm and the technology of the complicated chaos net of digital chaotic ciphers.This
Bright by complicated chaos net generation complex digital chaos cipher, this chaos cipher is disposal password, and password space is much larger than
Password space based on traditional algorithm, the deciphering of information is based on Chaotic Synchronous.
The technical scheme is that, digital chaotic secure communication system based on digital chaos encryption algorithm, including:
1), the channel that communicates of information transmitting terminal A and information receiving end B,
2), one be connected with channel for producing the digital chaos network that chaos digital is digital, from this digital chaos net
By the digital key derivation function g through chaotically coding of the chaos choosing certain length in number produced by network1It is transformed into chaos
Password k1(t), k1(t)=g1(X,p)
Wherein X is numeric digit produced by digital chaos network, and p is that t is from digital long selected by digital chaos network
Degree;Information M that information transmitting terminal A will be transmitted in the channel is by password k1Encrypted function F encryption becomes ciphertext C with described
Channel transmits: C (t)=F [M (t), k1(t)]
Information receiving end B receives ciphertext C from described channel, then by ciphertext C by chaos cipher k '1Decipher through chaos
Function F-1Deciphering: M ' (t)=F-1[C(t),k′1(t)]=M(t)
Chaos cipher k '1Being produced system by information receiving end chaos cipher to produce, this system for generating password is by producing number
And the digital chaos network that is connected with described channel and key derivation function g1Constitute, g1By the mode identical with receiving terminal from
The number that digital chaos network is chosen becomes chaos cipher k '1(t-τ)=g1[Y(t-τ),p]
Wherein Y is numeric digit produced by information receiving end chaos net, and p is that t is from selected by complicated chaos net
Digital length.And the chaos cipher k ' of information receiving end1Chaos cipher k with information transmitting terminal1Chaotic Synchronous:
Digital chaos network refers to the digital chaos network of complexity.
Decoding method can use differential dynamics equation or the ring-type iteration of unidirectional couplings (OCRM L) non-linear
System produces chaotic signal, and chaotic signal is carried out truncation and the chaos pseudo random sequence that produces or classics
Logistic maps as chaotic signal generation model.
The full duplex bi-directional digital chaotic secret communication system of the present invention.Information sender and recipient are respectively arranged with two (phases
Same or different) chaos net is respectively used to chaos encryption and chaos is deciphered, and the encryption of a side and clear crytpographic key are by different chaos
Network produces, but a pair that both sides are corresponding (such as in Fig. 1 14 and 17 and 15 and 16) encrypts and decipher chaos net and to have identical
Topological structure and dynamical structure.Encryption function Fi(i=1,2) F is metiFi -1=I.Digital information M is transported through F function by chaos cipher
The ciphertext C channel calculating encryption (can contain digital multiplexer, manipulator, demodulator, digital demultiplexer and other Digital Signal Processing
Device etc.) it is transferred to after receiving terminal through inverse function Fi -1Computing utilizes Chaotic Synchronous deciphering to obtain transmission information M.To telecommunication,
The information processing to be carried out of reception information (is amplified, signal processing etc.).
The digital chaos network that information transmitting terminal A is connected with described channel is connected with described channel with information receiving end B
Digital chaos network has the feature that
(1), there is identical topological sum dynamical structure, driven by common signal and the two is in Chaotic Synchronous state, number
Word chaos net can be made up of chaotic oscillator on single or multiple networks, and chaotic oscillator (node) i chooses chaos net to be made
Form complicated speckle figure chaotic dynamics, both space-time chaos kinetics.In the condition ensureing that two network speckle figure chaotic dynamicss synchronize
Under, complicated chaos net is randomly topologically structured structure, such as regular Network, random network, small-world network, scale free net
With module network etc.,
(2), information transmitting terminal A is for producing the digital complicated chaos net kinetics equation of chaos digital by differential driving force
Equation is described
Or described by iteration kinetics equation
Or jointly described by differential dynamics equation and iteration kinetics equation,
Wherein:
xiAbove a little represent xiTime differential, aiAnd blIt is the kinetic parameter of isolated Oscillator Equation, HjAnd Wj
Coupling function between network node, GijAnd UijIt is internodal Coupling matrix element, hjAnd wjIt is the driving function of chaos net, drives
Dynamic function D (CA) it is to transmit ciphertext CAFunction, αijAnd βijBeing the coefficient of coup, number n >=1 of network chaos node, information connects
The chaos net kinetics equation of receiving end B is identical with the chaos net kinetics equation of information transmitting terminal A;
(3), the digital chaos network that information transmitting terminal A and information receiving end B are connected with described channel is provided with above-mentioned side
The digitized module of journey or the chaotic signal that will be produced by the analog circuit described by above-mentioned complicated chaos net kinetics equation
The generation module of digital chaos signal it is transformed into analog-digital converter,
(4) the complicated chaos net of numeral that, information transmitting terminal A is connected with described channel in (3) and information receiving end B with
The digital chaos network that described channel is connected is digital and electronic chaos net or simulation electronic chaos net, digital and electronic chaos
Network is realized by logic chip (such as FPGA etc.) is upper, it is possible to upper real at digital signal processor (such as DSP etc.) by certain language
Existing, also can be realized by computer program, additionally may be made as special digital chip;Simulation electronic chaos net can turn through analog-to-digital
Parallel operation is transformed into digital chaos network, or is turned through analog-digital converter by many chaotic signals that simulation electronic chaos net produces
Become digital chaos signal,
(5), the coupling between any two node i of digital chaos network, j can be two variable direct-couplings, it is also possible to chooses
Each node variable xiPart digital with variable xjPart number couple, can all adopt in the coupling of chaos net
Take this digital coupling, it is also possible to part takes this digital coupling;
(6), in (5), can be to xiAnd xjThe number chosen couples after encoding again, and chaos net can all or portion
Divide and use this coding coupling;
Further, in (5) and (6), xiAnd xjRepresent digital in all numbers that chaos net generates by certain
Mode is chosen, and as randomly selected mode etc., therefore the coupling between complicated chaos net variable is all numbers that network is generated
Between coupling according to certain rules, chaos net can completely or partially use this code selection and coding coupling.
Further, the number that complicated chaos net can be generated by it is coupled to form by certain coupled modes, as with
Machine coupling, the free coupled modes of scale etc., the i.e. number of a certain variable of chaos net can partly or entirely become selected from network others
The number of amount, therefore number is the elementary cell of complicated chaos net coupling, and digital coupling is a kind of brand-new network coupling side
Formula, chaos net can completely or partially use digital coupling.
Further, chaos net can be coupled by number, code selection and coding coupling and Coupled Variable be collectively forming.
Further, the parameter of the complicated chaos net kinetics equation being connected with channel is the function of time.
Further, the common driving function D (C) of the digital chaos network of information sender and receiving party ensures to send out
The side of sending and two network Chaotic Synchronous of recipient;The common driving function D (C) of chaos net is the coding function that ciphertext is digital,
Different common driving function D (C) provides different chaos net kinetics computings, also will obtain different chaos cipher k;Altogether
It is the function of time with driving function, i.e. in the different information encryption periods with different common driving functions.
Further, the chaos net for generating numeric digit that information sender is connected with channel with receiving party
Driving function D (C) be used for driving the part or all of variable of chaos net, see the kinetics equation of above-mentioned chaos net, also
The part number that can choose D (C) drives the part or all of variable of chaos net, and the part of D (C) is digital and a certain to be become by driving
The coupling of amount is to be recompiled by the part number driving variable with this by the part number of D (C), this coding or its certain function
It is used for driving this variable.
Further, in the dynamics calculation of chaos net, all chaos net dynamical variables or partial power
After each step of variable or a few step Numerical calculate, variable is re-started coding, then carry out next step or under the calculating in several portions,
This coding calculates and chooses variable is arbitrary, and variable recompiles the function that rule can be the time.
Further, some in the kinetics calculating process of chaos net calculates step according to certain rules to subnetwork
Dynamical variable or overall network dynamical variable press certain way coding, and wherein the number of some dynamical variable can be by one
Set pattern rule is chosen by certain way from all numbers that network dynamics variable is generated, the number of some dynamical variable
Within the specific limits, this distributed chaotically coding being called chaos net calculates method and distributed to length (vector length) definable
Chaotically coding coupled method.Certain way refers to random fashion or regular fashion, or worldlet mode etc..
Further, to the Partial Variable during chaos net dynamics calculation or all variable some calculate step or
All calculate step and make certain functional operation, as recompiled the logical operationss etc. such as XOR between computing, different variable, it is possible to should
Some function of function and introduction makees certain functional operation, such as logical operations etc..
Further, the dynamic (dynamical) calculating of chaos net can use parallel algorithm and other fast algorithm, chaos net
Parameter and dynamical variable can use integer type or Real-valued data, and these data can use the different system tables such as binary system
Showing, the complicated chaos net of information transmitting terminal uses identical algorithm with the complicated chaos net of information receiving end.
Further, gained chaos net is calculated from calculating all digital of start time to code fetch moment or part number
Can store in memory in case used by code fetch.In can calculating chaos net, gained chaos digital number makees certain function fortune
Calculate.
Further, the driving function D (C) being used for generating digital chaos network to ensure these two network chaos received
Synchronize.The common driving function D (C) of chaos net is certain digital permutation and combination of numeral ciphertext C or part number ciphertext C
Driving function D (C), i.e. D (C) be the digital coding function of ciphertext, different common driving function D (C) is different by being given
Chaos net kinetics, also will obtain different chaos cipher k, and common driving function can be the function of time, i.e. in difference
The information encryption period with different common driving functions.
Further, the chaos net for generating numeric digit that information sender is connected with channel with receiving party
Driving function D (C) can be used to drive the part or all of variable of chaos net, it is possible to the part number choosing D (C) drives mixed
The part or all of variable of ignorant network, the part of D (C) is digital and a certain is that the part of D (C) is digital by coupling of driving variable
Being recompiled by the part number driving variable with this, this coding or its certain function are used for driving this variable.
The production method of digital chaotic ciphers in chaotic secret communication system, is characterized in that based on digital chaos encryption algorithm
Chaotic secret communication system in: the digital chaos network that information transmitting terminal A is connected with described channel and information receiving end B and institute
The digital chaos network stating channel connected has the feature that
1) there is identical topological sum dynamical structure, driven by common signal and the two is in Chaotic Synchronous state, it is ensured that
Under conditions of two network speckle figure chaotic dynamicss synchronize, digital chaos network includes that complicated chaos net, complicated chaos net are
Randomly topologically structured structure, including regular Network, random network, small-world network, scale free net and module network;
2) information transmitting terminal A is for producing the digital complicated chaos net kinetics equation of chaos digital by differential dynamics
Equation is described, iteration kinetics equation is described or jointly described by differential dynamics equation and iteration kinetics equation;
Transmitting-receiving two-end complexity chaos net uses identical method to carry out calculating to obtain Chaotic Synchronous numeric digit;
Generated by chaos cipher with the following method and chaos encryption or deciphering module in plain text produces from digital chaos network or deciphering
Chaos cipher:
(1) password k1Length be one produced by digital network, all original digital B have Nq to multidigit, its
Middle N is complicated chaos net member of equation number, and q is the digitized figure place of equation variable;If only utilizing original number, then password k1
Up to k1=Nq;Generally, from the chaos number that chaos net produces, a fixed number is chosen by the mode such as random, regular
The digital structure password k of amount p1=g1[X, p], p≤q;
(2) original numbers all produced by complex network are made a series of function biComputing produces a series of new numerals
Function,
b1(X,p1),b2(X,p2),…,bm(X,pm), wherein biIt is polynomial function etc., then from this series digit letter
Number is chosen digital by function g by the mode such as random1Structure password: k1=g1[b1(X,p1),b2(X,p2),…bm(X,pm),
P], wherein g1It it is the coding function such as random, regular;
(3) password k1Also in certain of the digital B generated by complicated chaos net, function F (B) generates: k1=g1[F(B)];
(4) chaos cipher produced to meet certain password distribution, and such as noise profile etc., code power composes letter to be covered
The power spectrum of breath;
(5) at information receiving end, clear crytpographic key k '1Producing method and information transmitting terminal encrypted code k1Producing method complete
As Quan;
(6) from numeral complex network or its group of functions choose number be exponential code selector continuously choose digital with
Produce password.
Further, select by identical or different mode from chaos number produced by information transmitting terminal complexity chaos net
Take different modes and choose number, produce chaos cipher k by identical or different mode1,k2,…,ki..., multiple from information receiving terminal
Chaos number produced by miscellaneous chaos net chooses chaos that is digital and that produce deciphering by the rule identical with information transmitting terminal
Digital ... k 'i,…k′2,k′1, wherein k 'i-ki=0。
Further, the digital structure Chooser of password, the maker of password, the adding of information are chosen from complicated chaos net
The driving function device of close device and network is all realized by digital integrated electronic circuit, including using hardware description language at logic chip or special
Realize on integrated chip, or realize with computer program on signal processor.
Further, generate at chaos cipher and in chaos encryption module in plain text, comprise:
First depositor is for accepting and storing the chaos cipher k for the encryption of information M generated1,
Second depositor for acceptance and stores encrypted information M,
3rd depositor is used for accepting and store chaos encryption information C,
It is also digital for storing all or part calculating gained chaos net by a depositor,
At least one selector is used for from choosing from complicated chaos net digital for constructing password,
At least one encryption function maker, i.e. information encryption function arithmetical unit,
At least one generates chaos cipher k1Key derivation function arithmetical unit, for choosing from complicated chaos net
Number becomes chaos cipher k1。
Further, in the generation of information receiving end chaos clear crytpographic key and the deciphering module of ciphertext C, comprise:
First depositor for acceptance and stores the chaos cipher for decrypting ciphertext C generated,
Second depositor for acceptance and stores decrypted ciphertext C,
3rd depositor is used for accepting and store Chaotic Solution confidential information M,
It is also digital for storing all or part calculating gained chaos net by a depositor,
At least one selector is used for from choosing from complicated chaos net digital for clear crytpographic key,
At least one decryption function maker, both ciphertext decryption function arithmetical unit,
At least one generates chaos cipher k '1Key derivation function arithmetical unit, for choosing from complicated chaos net
Number become chaos cipher k '1。
Further, information sender and receiving party comprise m digital function b respectively1(X,p1),b2(X,p2),…
bm(X,pm) generation module and corresponding function register.
Further, information sender and receiving party comprise respectively complicated chaos net driving function maker and
Corresponding driving function depositor.
Further, selecting digital from digital chaos network can be in a random basis in the way of producing chaos cipher
Choose from digital chaos network, it is also possible to be the modes such as rule, scale freedom, small-world network, chaos cipher generating function
g1Can be the function such as coding and rule encoding immediately of network code selection, it is also possible to be that network code selection is first made such as letters such as multinomials
Number computing, then encode.
Further, from digital chaos network, digital g in the way of producing chaos cipher is selected1It it is digital chaos network
The function of produced all numbers.
The present invention is to produce complicated chaos net mixed of digital chaotic ciphers in a kind of complex digital chaotic secret system
Ignorant encryption algorithm and technology.Use suitable encryption function computing encryption transmission information (bright at information transmitting terminal chaos cipher
Literary composition M), this digital chaos adds confidential information (ciphertext C) channel and is transferred to information receiving end, and information receiving end uses inverse function computing
Utilize Chaotic Synchronous the deciphering of ciphertext C to be obtained and transmit plaintext M '=M.The chaos cipher of information transmitting terminal is mixed by the complexity of transmitting terminal
Ignorant network produces.The chaos clear crytpographic key of information receiving end is produced by the complicated chaos net of information receiving end and sends with information
End Crypted password Chaotic Synchronous.The complicated chaos net of receiving terminal and transmitting terminal can by Coupled Variable, code selection and coding coupling or
Digital coupling is formed, it is possible to be collectively forming by these couplings.
The complicated chaos net of receiving terminal and transmitting terminal has identical topology and dynamical structure.Use and jointly drive skill
Art drives the complicated chaos net of receiving terminal and transmitting terminal to make them be in Chaotic Synchronous state, and driving function is the function of ciphertext.
In the dynamics calculation of chaos net, all or part of dynamical variable in network can be by certain rule during calculating
Rule encodes, and the numeral of some or all network dynamics variable represents that number can be at all-network dynamical variable or network
The number that function generates is chosen by certain way.
The medicine have the advantages that this chaos cipher is by producing complex digital chaos cipher from complicated chaos net
Disposal password, password space is much larger than password space based on traditional algorithm, and the deciphering of information is based on Chaotic Synchronous, especially
Being that this inventive technique can obtain complexity, practicality and chaos cipher at a high speed, this inventive technique is compatible with modern information technologies
Digital chaos secrecy technology, this digital chaos secrecy technology can be applicable in modern digital communication, as wired, wireless digital lead to
Letter;Information stores;Computer internet etc..
Four, accompanying drawing explanation
Fig. 1 is full duplex bi-directional digital chaotic secret communication system figure;
Fig. 2 is half-duplex bidirectional digital chaotic secure communication system diagram
Fig. 3 is unidirectional digital chaotic secure communication system diagram;
Fig. 4 is directed digital signature chaotic secret communication system figure;
Fig. 5 is complicated chaos net and chaos encryption figure;
Fig. 6 is complicated chaos net and chaos deciphering figure;
Fig. 7 transmitting terminal and receiving terminal produce the complicated chaos net figure of chaos net;
Fig. 8 is full duplex two-way digital signature chaotic secret communication system figure;
Fig. 9 is half-duplex bidirectional digital signature chaotic secret communication system figure;
Figure 10 is multiple terminals unidirectional digital chaotic secure communication system diagram;
Figure 11 is another kind of multiple terminals unidirectional digital chaotic secure communication system diagram;
Figure 12 is by the complicated chaos net figure of 8 complicated chaos nets of son.
Five, detailed description of the invention
For this digital chaos secrecy technology of clearer description, then figure is discussed in detail digital chaos secrecy technology principle
And method.
Fig. 1 is the full duplex bi-directional digital chaotic secret communication system of this inventive technique.Information sender and recipient are each
Have two (identical or different) chaos nets be respectively used to chaos encryption and chaos deciphering, the encryption of a side and clear crytpographic key by
Different chaos nets produce, but a pair that both sides are corresponding (such as in Fig. 1 14 and 17 and 15 and 16) encrypts and decipher chaos net and want
There are identical topological structure and dynamical structure.Encryption function Fi(i=1,2) F is metiFi -1=I.Digital information M is by chaos cipher
The ciphertext C channel encrypted through F functional operation (can contain digital multiplexer, manipulator, demodulator, digital demultiplexer and other number
Word signal processor etc.) it is transferred to after receiving terminal through inverse function Fi -1Computing utilizes Chaotic Synchronous deciphering to obtain transmission information M.Right
Telecommunication, the information processing to be carried out of reception information (is amplified, signal processing etc.).
Fig. 2 is the half-duplex bidirectional digital chaotic secure communication system of this inventive technique.With Fig. 1 full-duplex bi-directional communication system
Unlike system, information sender and recipient are respectively arranged with a chaos net and i.e. decipher with being also used for chaos for chaos encryption,
To double terminal communications, encryption function F meets FF-1=I, communicates to multiple terminals, encryption function FiMeet Fi 2=Fi -2=I。
Fig. 3 is unidirectional digital chaotic secure communication system.Can be used for storage and the extraction of chaos encryption information, identity is known
Not.
Fig. 5 be in this inventive technique information transmitting terminal for produce chaos cipher (with add confidential information) complicated chaos net
Network, wherein stain represents the chaos node (such as numeral chaos circuit, hardware or software realize) of network.Each node in network
The chaos state produced is the most different, and in application, available suitable mode chooses the numeric digit warp that the complicated chaos net of numeral produces
Password produces the chaos cipher needed for function g produces, information transmitting terminal and receiving terminal complex network and produces the mode of password, such as figure
In 16 and 13(10 and 9), as.The node of chaos net is the most, and the mode producing password is the most.
Fig. 6 be in this inventive technique information receiving end for producing the complicated chaos net of chaos cipher (for decryption information)
Network, the chaos net corresponding with transmitting terminal has identical topological structure and dynamical structure.Chaos net in Fig. 5 and Fig. 6 by
Ciphertext signal C in channel 5 drives jointly, and in Fig. 1 and Fig. 2, loop 7 and 12 is driver circuit.
Fig. 7 is the complicated chaos net of information system transmitting terminal and receiving terminal, and two complex nonlinear networks have completely
Identical kinetics topological structure, maximum Lyapunov exponent λ of two networksmaxShould be greater than 0 to ensure stable network chaos
State.Two internetwork maximum transversal Lyapunov index λ⊥Should be less than 0 and stablize Chaotic Synchronous so that guarantee two is internetwork.At these
Under the conditions of, produce between two networks and postpone the synchronization of chaos speckle figure, thus Crypted password and the clear crytpographic key of Chaotic Synchronous can be produced.
In figures 1-4, in channel, transmission is that digital chaos adds confidential information C, which ensure that the robustness of Chaotic Synchronous.
Figure 10 is multiple terminals unidirectional digital chaotic secure communication system, may be designed to full and half duplex bi-directional digital and mixes
Ignorant secret signalling.
Figure 11 is multiple terminals directed digital signature chaotic secret communication system, similar with Fig. 8 and Fig. 9, may be designed to complete double
Work and half-duplex bidirectional digital signature chaotic secret communication system.
Figure 12 is a module chaos net, is made up of 8 sub-chaos nets.It is placed in a certain chaotic secret communication terminal
For producing different chaos ciphers.This function of module chaos net also can be by a non-module complexity chaos net (as just
Advise the arbitrarily complicated structural networks such as network, small-world network, scale free net) replace.Therefore in Fig. 1, Fig. 4, Fig. 8 and Fig. 9
Multiple chaos nets of a certain terminal can replace with a complicated chaos net.
The detailed description of digital chaos encryption technology:
Fig. 1 describes the bi-directional digital chaotic secret communication system relevant to this inventive technique.A terminal sends digital information MA
By chaos cipher k1Encrypted function F1Encryption becomes numeral ciphertext CA=F1(MA,k1), this ciphertext sends B to eventually by channel 5
End, B terminal is decrypted function F1 -1With password Chaotic Synchronous k '1=k1Deciphering obtains and transmits digital information M 'A=F1 -1(CA,k′1)=
MA.B terminal can also be same method information security is sent to A terminal.To remote information transmission, channel 5 can comprise tune
Device processed, demodulator, amplifier and signal processing system etc..In Fig. 1,14 and 17 is the complexity of information transmitting terminal and receiving terminal respectively
Chaos net (16 and 15 are also) is used for producing encryption and deciphering chaos cipher, and chaos net 14 and 17 has identical topological sum
Dynamical structure.The chaos net 14 of information transmitting terminal A has n node, and the dynamical variable of i-th node is xi, chaos net
Network 14 dynamical variable is described by X:
The network dynamics equation of chaos net 14 is:
Or:
Wherein:
It is the isolated oscillator m of i-th network nodeiDimension Chaos dynamical equation (non-coupled equation), xiSome tables above
Show xiTime differential, aiIt is the kinetic parameter of isolated Oscillator Equation, Hj(xj) coupling function between network node, GijIt is
Internodal Coupling matrix element, hj[D(CA),xj] it is the coupling driving function of chaos net, driving function D (CA) it is CALetter
Number, αijIt it is the coefficient of coup.All possible parameter { a of network 14i,Gij,αijComposition continuous print parameter space:
ωX={{ai}:{Gij:i,j=1,2,...,n}:{αij:i,j=1,2,...,n}}
And the geometry of network is by matrix element G of n × n coupling matrix GijNumber and distribution (between the node of network 14
Connection number and connect distribution) and H (x) and h [D (CA), x] describe.Make G1Connection matrix for network 14, it may be assumed that
{G1}≡{G:{Gij=1:i,j=1,2,..,n}}
This be one by n × n matrix G1The space of matrices constituted.The driving matrix of network 14 is
{α1}≡{α:{αij=1;i,j=1,2,..,n}}
All n × n matrix G1And α1The geometry space of formation network:
Thus when n network node is selected, the kinetics space of network 14 is the parameter space of network and several
The direct product of what structure space:
Equation below (replaces: x as above equationi→yi), for describing the chaos net of information receiving end B
The kinetics of network 17.
Or
Wherein
The safety of chaotic secret communication is by the chaotic dynamics { f of network nodei(xi,ai), the opening up of complicated chaos net
Flutter structure, the complicated dynamical structure of chaos net, the parameter ω (ω of network dynamics equationXAnd ωY) and the driving letter of network
Number D (CA) determine that (another one safety factors is the mode being produced chaos cipher by chaos net, the introduction seen below.).?
During actual configuration chaotic secret communication system, each communication terminal should be to protect for producing the network dynamics equation of chaos cipher
Close, the person that so do not steals secret information is difficult to the information reconstruction network dynamics equation stolen from channel, the most just cannot produce in channel and use
In encryption and the chaos cipher of deciphering.
In order to produce stable chaos cipher, network 14 and maximum Lyapunov exponent λ of network 17maxHave to be larger than zero:
Wherein t is the time, and δ X (t) is the variation of X (t).Choose suitable network oscillator { fi: i=1,2 ..., n} and suitably
Coupling function Hj(xj) and hj[D(CA),xj] and adjust network parameter
ωY={{ai};{Gij:i,j=1,2,...,n};{αij:i.j=1,2,...,n}}=ωX
Maximum Lyapunov exponent λ can be mademaxMore than more than zero:
λmax》0
Maximum transversal Lyapunov index λ in order to utilize Chaotic Synchronous to decipher, between network 14 and network 17⊥It is necessarily less than
Zero:
This condition ensures that network 14 and network 17 are in Chaotic Synchronous state:
Wherein τ is that chaotic signal X (t) is sent to B end network 17 required time by A end network 14.Choose suitable network
Oscillator { fiAnd suitable coupling function Hj(xj) and hj[D(CA),xj] and adjust network parameter
Y={{ai};{Gij:i,j=1,2,...,n};{αij:i.j=1,2,...,n}}=ωX
Maximum transversal Lyapunov index λ can be made⊥Less than less than zero: λ⊥《0
Chaotic Synchronous between actually two networks 14 and 17 is by jointly driving D (CA) by function hj[D(CA),xj] ensure,
This can find out from the kinetics equation of two networks.The initial value X (0) and Y (0) of two network dynamics equations are random.Suitable
Net structure can make
λmax》0,λ⊥" 0 liang of condition is set up simultaneously, sees Fig. 7.Same calculating can be used for network 16 and 15.Actually used
Time, can there be identical dynamical structure these two groups of networks (14,17) and (16,15), it is possible to have different dynamical structure.Actual
During use, network 14 and 15 can be replaced with a complicated chaos net, and 16 and 17 by a same complicated chaos
Network replaces.
Produced chaos cipher in information transmitting terminal by network 14 and have various ways, if network dynamics variable xijWith q position two
System number represents: xij=bij qbij q-1...bij 1bij 0, the most N number of network dynamics member of equation can produce Nq two altogether in t and enter
System number, (is such as randomly selected) in a certain way from this Nq binary numeral by selector 6 and chooses p (1 < p≤Nq)
Individual binary numeral is through function g1Constitute chaos cipher k1
k1(t)=g1(X (t), p), 1 < p≤Nq
The mode as information transmitting terminal is taked to select numeral from chaos net 17 at information receiving end by selector 13
Chaotic signal is to produce the chaos cipher as information transmitting terminal:
k′1(t-τ)=g1(Y (t-τ), p), 1 < p≤Nq
Due to network 14 and network 17 Chaotic Synchronous, so information receiving end is in mixed with the chaos cipher of information transmitting terminal
Ignorant synchronous state.
Thus legal information receives terminal and can become in plain text by ciphertext deciphering, t-τ herein is the deciphering moment.
In the technology of the present invention, chaos net produces the mode i.e. function g of chaos cipher1Be secrecy and can be the time
(both different in the communication process periods can be with different g for the function of t1Function).It can be seen that transmit information safety by
Chaos net kinetics equation dX/dt=F (X, a, G, α) and g1Function determines, it is logical that this is equivalent to conventional symmetrical AES secrecy
Letter.In this symmetrical chaotic secret communication, the chaos net kinetics equation used by communicating pair and g1Function is the most about
Fixed.
It practice, work as sufficiently large (tens the chaos nodes) of size and its power of complicated chaos net (14 and 17)
When equation is underground, chaos encryption decryption function g1Can disclose, even if this is owing to identical chaos cipher is produced function
g1, different chaos nets also produces different chaos cipher k1, and the person of stealing secret information is difficult to from the information reconstruction network dynamics stolen
Equation, so knowing g1Function can not produce password k1With k '1.This asymmetric chaotic secret communication is digital signature secrecy
Communication provides conveniently.
On the other hand, if the parameter space of chaos net
ωX={{ai};{Gij:i,j=1,2,...,n}:{αij:i.j=1,2,...,n}}
Sufficiently large (large scale chaos net), we also can disclose topology of networks, and the parameter of chaos net is empty
Between and encryption and decryption function g1Underground.
The driving function h [D (C), X] of network is to password k1Impact the biggest it is known that network structure and decryption function, but
Do not know D (CA) also cannot generate k1。
But safest chaotic communication security scheme is chaos net kinetics equation, g1With D (CA) function is the most underground,
Safely but Chaotic Security Communication Schemes easy to use is asymmetric Chaotic Security Communication Schemes both chaos net kinetics for next
Equation is underground and g1Function is open, and thirdly security scheme is that topology of networks is open, and the parameter of chaos net is empty
Between, function g1And D (CA) underground.The safety of these three Chaotic Security Communication Schemes is better than traditional algorithm cryptography scheme.
Transmitted digital information MAAt A end by password k1Through function F1Computing encryption is transformed into numeral ciphertext CA
CA=F′1(MA,k1)
Due to k1T () is stream cipher, MAIt is segmented encryption and the password k of every section1T () is the most different, because k1(ti)≠k1
(tj).Ciphertext CAChannel 5 is sent to information receiving end B, at B end portion D (CA) through loop 12 drive B end chaos net 17 with
Produce Chaotic Synchronous password k '1(t).Numeral ciphertext CABy Chaotic Synchronous password k '1T () is through function F1 -1It is bright that computing is transformed into numeral
Literary composition
But also can constructor F1Make
M′A=F1(CA,k′1)
In Fig. 1, loop 7 and 12 is the driving signal D (C of chaos net 14 and 17 respectivelyA) loop, drive signal D (CA) want
Process through digital processing system (for frequency spectrum design, signal amplification and signal stabilization etc.), so that the driving signal D of side a and b
(CA) there is stable and identical intensity, D (C simultaneouslyA) the frequency spectrum of frequency spectrum and network 14 and 17 should overlap, thus ensure A end net
Network 14 and B end 17 is in Chaotic Synchronous state.
If digital information M transmittedADifference, then CAAlso different, thus transmit information M every timeAProduced password k1(k '1)
Also different, so chaos cipher k1With k '1It is disposable stream cipher, and Password Length and transmitted information MALength is the same.
User cipher D can be set by changing the kinetic parameter of network 14 and 17 in this chaotic secret communicationA1With
DB1, as made following parameter transformation
A end subscriber can be by
As A end, user cipher D is setA1Foundation: when A end does not inputs password, δ ≠ 0
Network 14 and 17 is asynchronous, and B end cannot utilize Chaotic Synchronous to decipher.During A end input password, δ=0
Same B end subscriber can be by
As arranging user cipher DB1Foundation, when B end does not inputs password, ∈ ≠ 0
Network 14 and 17 is asynchronous, and B end cannot utilize Chaotic Synchronous to decipher, during B end input password, and ∈=0
It can be seen that only when A and B two ends all input password, ciphertext CA(CB) decrypted could become plaintext MA
(MB).
In this case, to ensure during planned network 14 and 17 that following two formulas are set up.
The two equation ensure that the synchronization of chaos cipher:
Equally, B end can be by digital information MBThrough function F2Chaos encryption becomes numeral ciphertext CBAnd by ciphertext by channel 5
Being sent to A end, A end is through function F2 -1Utilize Chaotic Synchronous by ciphertext CBIt is transformed into numeral plaintext MB.The chaotic secret communication of B → A
Process is just the same with the chaotic secret communication process of A → B.
If A end to communicate information to other legal information recipient, such as E end, then E end must have phase complete with A end network 14
With network (dynamical structure is identical), A → E(E → A) chaotic secret communication process and A → B(B → A) identical.With upper
Principle that face is same and method, can set up local chaotic secret communication net.
The two-way chaotic secret communication system of full duplex shown by above figure 1 can be mixed by the half-duplex bidirectional shown by Fig. 2
Ignorant secret signalling replaces.To double terminal half-duplex bidirectional chaotic secret communications, encryption function F and decryption function F-1Meet
FF-1=I or F2=F-1F-1=I
And to multiple terminals (m terminal) half-duplex bidirectional chaotic secret communication, encryption function F and decryption function F-1Meet:
F2=F-1F-1=I
Fig. 3 is the unidirectional chaotic secret communication system of this inventive technique, can be used for storage and the reading of ciphertext, in this respect
Under, memorizer is a part for channel 5.Information MAThe password k encrypted function F encryption produced by network 14 becomes numeral ciphertext
CA, CAChannel is stored in memorizer, reads C from memorizer channelAThen the password k ' that produced by network 17 is also decrypted function
F-1Deciphering becomes numeral plaintext MA, this process can simply be expressed as:
MA→F(MA, k)=CA→ memorizer → F-1(MA, k ') and=M 'A=MA
Also can be by numeral plaintext MADirectly channel is stored in memorizer, and at the information outlets chaos encryption of memorizer, closes
Method user can decipher numeral ciphertext C by chaosADeciphering becomes numeral plaintext MA, this process can simply be expressed as:
MA→ memorizer → F (MA, k)=CA→F-1(MA, k ') and=M 'A=MA
In Fig. 3, user can arrange password and also can be not provided with password, if arranging password, and user cipher DAAnd DBMethod to set up
It is the same with Fig. 1 system.
Fig. 3 is unidirectional chaotic secret communication system, can be used for: identification (authentication function);E-commerce system, electronics
Cash system, electronic voting system, e-bidding system and electronic lottery systems etc..
Fig. 4 is the digital signature chaotic secret system of this inventive technique.Compared with Fig. 3, Fig. 4 is many one layer of chaos net 18
With 19, network 18 and 19 has identical topological structure and chaotic dynamics structure, and the chaos net 18 and 19 of this layer is with upper
Topological structure and the chaotic dynamics structure of the chaos net 14 and 17 of a layer are identical or different.Information M is transmitted at A endABy
The digital chaotic ciphers k that chaos net 18 producesSEncrypted function FSComputing is transformed into signature file MAS:
MAs=F′s(MA,ks)
MASThe digital chaotic ciphers k encrypted function F computing produced by chaos net 14 is transformed into the signature of chaos encryption
File CAS:
CAs=F(MAs,k)
Digital signature file C of this chaos encryptionASChannel 5 is sent to B terminal.It is mixed that B terminal utilizes that network 17 produces
Ignorant password k ' and Chaotic Synchronous are decrypted function F-1The C received is deciphered in computingASBecome M 'AS:
M′As=F(CAs,k′)
This signature file M 'ASThrough FS -1Computing also utilizes Chaotic Synchronous and the chaos cipher k ' of network 19 generationSIt is transformed into not
The digital document M ' of signatureA
M′A=Fs(M′As,k′s)=MA
Fig. 4 system, for the file of chaos encryption is sent to B terminal from A terminal, is similar to Fig. 1 and 2, it is also possible to utilize
Full duplex (see figure 8) or the two-way chaotic secret communication system of half-duplex (see figure 9) are by the digital signature file of chaos encryption by B eventually
End is sent to A terminal.B terminal is to digital signature chaotic secret system and the A terminal of A terminal to the digital signature chaos of B terminal
Secrecy system can identical also can differ.By increasing communication terminal, it is possible to carry out multiple terminals digital signature chaotic secret communication.
Communication network is in communication with each other for a pair terminal room for signature chaos net (18 in such as Fig. 4 and 19) with another to communicating
The topological structure for the chaos net of signature of terminal room is identical with chaotic dynamics structure.
It practice, be connected with channel communication terminal only needs a complicated chaos net, and in communication network
The dynamical structure of its complicated chaos net of terminal mutually carrying out chaotic secret communication should be equally.The chaos that same terminal is different
Crypted password kiDifferent production methods, the most different g can be used by same chaos netiFunction produces, each giFunction
A corresponding chaos cipher selector.So in Fig. 1, Fig. 4, Fig. 8 and Fig. 9, A terminal and B terminal the most only need a complex network
, see Figure 10.Communication network mutually carries out the terminal kinetics knot except its complicated chaos net of chaotic secret communication
Structure equally outside, the password of its correspondence produces function g also should be the same with chaos net driving function D (C), and encrypts reconciliation accordingly
Close function also should inverse function relation each other.
Figure 11 is that a communication terminal only one of which complexity chaos net is for producing the multiple terminals of different chaos ciphers
Digital signature chaotic secret communication system (network).Between A and B in this communication network as a example by digital signature secret communication, A is eventually
Hold information M of transmissionADigital signature password ks AiWith corresponding encryption function Fs AiClear crytpographic key k with B terminals BjAnd correspondence
Encryption function [Fs Bj]-1Unidirectional or full-duplex communication should be met relation:
Or
And half-duplex two-way communication should be met relation:
Equally, A terminal digital signature information MASCrypted password kAiWith corresponding encryption function FAiWith B terminal
Clear crytpographic key kBjWith corresponding decryption function [FBj]-1Unidirectional or full-duplex communication should be met relation:
kBj=kAi,[FBj]-1FAi=I
Or kBj=kAi,FBjFAi=I,[FBj]-1[FAi]-1=I
And half-duplex two-way communication should be met relation:
kBj=kAi,FBjFAi=I,[FBj]-1[FAi]-1=I
Simple for design, any two terminals such as A of communication networkiTerminal and AjAll encrypted signature decryption function of terminal
Can be taken as the same with information encrypting and decrypting function:
FBj=FAi=F,i,j=1,2,...,l
Or
From description above it can be seen that a certain chaotic secret communication terminal being connected with channel this invention can have multilamellar
Chaos net (>=2 layers), has two-layer chaos net in digital signature chaotic secret communication system as shown in Fig. 4,8,9, a certain mixed
Ignorant secret communication terminal same layer also can have multiple chaos net (>=2), the two-way chaotic secret communication of full duplex as shown in Figure 1
System has two.Owing to these chaos nets have connection, thus these chaos sub-networks constitute a module chaos net.
This module chaos net can be described with a chaos net equation.So while a certain chaotic secret communication terminal may have multiple
Chaos sub-network is for producing different cipher function gi(i=1,2,3 ...), actually can regard a module chaos net as
Network, is shown in Figure 12.Multiple chaos cipher function g can be constructed from this module chaos neti,i=1,2,3,….Due to one arbitrarily
The complicated chaos net of structure, such as regular structure network, small-world network, scale free net, random structure network etc., it is possible to
Construct multiple chaos cipher function gi, i=1,2,3 ..., therefore we are discussing multiple chaos cipher function gi,i=1,2,3,…
Generation time, do not repartition general complicated chaos net and module complexity chaos net.Figure 10,11 chaotic secret communication system profits
By this thought of this inventive technique.
In this inventive technique, the chaos net shown in Fig. 5 and Fig. 6 can be implemented in software, it is possible to hardware realizes.Real at hardware
Now, both available digital circuit realiration, it is also possible to analog circuit realizes.Choosing of scheme depends on applied environment.Chaos net
Digital circuit time by hardware description language (such as Verilog HDL or VHDL etc.) write PLD or design
Special IC forms digital chaos network, and is encrypted by hardware description language as far as possible.
Digital chaos network can be realized by computer software, it is also possible to high-level language realizes on the chips such as DSP.
The isolated chaotic dynamics of n node of chaos net 14 to stablize the (maximum of each isolated Oscillator Equation
Lyapunov index is greater than 0), and the most different (node Chaos dynamical equation is different), at least want part of nodes
Different, so can produce complexity space-time chaos speckle figure, and then produce more be reasonably distributed chaos cipher k1State.k1Close
Code to choose mode the most, information MATo crack difficulty the biggest.All k1Mode of choosing constitute a discrete space:
K={g1(X, p), p=1,2 ... Nq;{g1i,i=1,2,...}}
The chaos cipher space produced by chaos net 14 is:
After n chaos a period of time (node) { f (x) } is selected, a certain chaos state of network 14 a little determining by this space,
Choosing of this point to ensure: 1, the maximum Lyapunov exponent of network 14 is greater than 0 to ensure that network 14 has stable chaos net
Network kinetics;2, the maximum transversal Lyapunov index of network 14 is less than 0 to ensure that network 14 and network 17 have stable mixing
Ignorant speckle figure synchronizes;3, matrix α and choosing of function h (x) are wanted properly to ensure that network 14 and network 17 are in ciphertext CADrive lower mixed
Ignorant synchronization.
In Fig. 1, A terminal chaos cipher selector 6 is at t1Binary numeral that moment produces from digital chaos network 14 (as
1011001010 ... choose m binary numeral by certain way in) and be loaded into depositor formation chaos cipher k1(t1):
k1(t1)=g1(X(t1),p)
This password and binary numeral information M being loaded into another depositorAEncrypted function F computing becomes numeral ciphertext CA
(t1), ciphertext CAChannel 5 sends legal information receiving terminal B to.
A terminal chaos cipher selector 6 is at t2Moment presses same from the binary numeral that digital chaos network 14 produces
Mode choose binary numeral and be loaded into depositor formed chaos cipher k1(t2)
k1(t2)=g1(X(t2),p)
Generally kl(t1)≠k1(t2)
This password and binary numeral information M being loaded into another depositorAEncrypted function F computing becomes numeral ciphertext CA
(t2), ciphertext CAChannel 5 sends legal information receiving terminal B, repeatedly this ciphering process, information M toAIt is transformed into numeral ciphertext
CA。
It can be seen that k1(ti)≠k1(tj), this chaos cipher is stream cipher.To different encrypted information MA, network 14
Chaos state different, thus this chaos cipher k1Being disposal password, compared with traditional algorithm cipher, confidentiality is higher.
The Crypted password k of difference message segment when encryption1T () also can be chosen by different modes, i.e. g1Function differs in different message segments
Sample.
It can be seen that the chaos encryption of information and common encryption are the same, also it is the sectional encryption of information, and generally
Encrypting different, in chaos encryption, every section of Crypted password is different k1(ti)≠k1(tj)。
This chaos cipher k flexibly1Generating mode add the person of stealing secret information and crack ciphertext CADifficulty.
In the present invention, another kind of simple structure codon usage function g1Mode be tectonic network dynamical variable X (t)
Group of functions P={Pj(X), j=1,2 ..., from the binary numeral of group of functions, then choose binary code structure in a certain way
Make password k1=g1(P(X),p).Structure P as a example by polynomial function:
{Pa({xi}),Pb({xi}),Pc({xi}),...}
{n1,n2,n3,...}∈integers
{ai,bi,aij,bij,dijk...,…}∈R1
Wherein (underground)
{{ai,bi,aij,bij,dijk...,…},{n1,n2,n3,...}}
Constitute a parameter space.
Underground from digital polynomial group P() { Pa({xi}),Pb({xi}),Pc({xi}),...}
Produced binary numeral is pressed any-mode (such as random fashion, certain regular fashion etc.) and chooses digital through letter
Number g1Structure chaos cipher k1=g1(P,p).Group of functions P to be easy to calculate, and it takies resources of chip and to lack, chaos cipher k1Product
Raw speed wants height.
Above for complicated chaos net 14 and binary system chaos cipher k1Digital circuit also can by computer and
The digital display circuits such as DSP utilize software to realize.Obviously
k1(t1)=g1(P(tl),p)
Comprise k1(t2)=gl(X(t2),p)
Digital information used in the present invention and chaos digital password are not limited to binary numeral, it is possible to be other numeral letter
Breath and chaos digital password.Binary digit cipher-text information CAConventional chaos encryption information can be solved (main with long-distance transmissions
If simulation chaos encryption etc., in channel, transmission is analog encryption information) can not the difficult problem of long-distance transmissions, this all one's life this
The more important of bright technology.
The safety of this digital chaos secrecy technology depends on:
(1), the geometry of network,
(2), choosing of network node, fω={fi(xi):i=1,2,...,n};
(3), the kinetic parameter of network, ωX={{ai};{Gij};{αij}};
(4), k1Mode of choosing, K={g1(X,p),p=1,2,...Nq;{g1i,i=1,2,...}}
(5), the structure of chaos net driving function, H, h [D (CA),X]
If the geometry of network and network node choose it is known that i.e.
And fω={fi(xi):i=1,2,...,n}
It is known that our estimation to obtain one group of specific kinetic parameter ωx={{ai};{Gij};{αijAnd the number that determines
Word chaos cipher k1, how many points are at least calculated in password space.Network dynamics parameter space is continuous print, and we want pin
The every bit in the chaos in network dynamics parameter space and Chaotic Synchronous region is calculated network dynamics equation, the most this
Amount of calculation is huge.For the ease of estimation, choose adjacent parameter point and make synchronization error and the chaos wave amplitude order of magnitude
Equally, it is assumed that chaos in parameter space and Chaotic Synchronous region be the length of side be the regular polygon (actual area is much larger than this) of 1,
Then to calculate
Nω=102Q
The network dynamics equation of individual point, Q is the number of network dynamics parameter.If Q=40, calculating 10 per second8Individual
Point, the most at least needs 1065Year.
Assuming that network dynamics variable is represented by q bit, chaos cipher directly takes from network dynamics variable, then
Total
Individual chaos cipher k1Selection scheme.Therefore do not steal secret information person to obtain chaos cipher k1, be from (qN)qNIndividual k1In seek
Look for a specific k1.If N=20, q=32, then (qN)qN=(640)640≈25966≈101796.10 are found if per second13Individual close
Key k1, classic algorithm then needs about 101775Year.Especially because the sensitivity that network dynamics is to its parameter, (qN)qNIndividual key k1
In uncertain containing the specific key k used by chaos encryption1.If considering choosing and network of network chaotic oscillator further
Space structure, it can be seen that the person of stealing secret information substantially can not crack chaos encryption information.
Embodiment: chaos encryption and the deciphering of digital information are described now by an example.A end is connected with channel 5
Be used for produce chaos cipher k1Network 14 be made up of two nodes, retouched by following two isolated node kinetics equation respectively
Write,
The dynamical variable of node 1 is by 3-n dimensional vector n x1=(x11,x12,x13)TDescribe, the isolated kinetics equation of node 1
For:
The dynamical variable of node 2 is by 3-n dimensional vector n x2=(x21,x22,x23)TDescribe, the isolated kinetics equation of node 2
For:
Two equations are all class Lorenz equations, pass through coupling terms
G1(x11-x21)
Be coupled together formation network, and this network is by 6 dynamical variable X=(x1,x2)=(x1 1,x1 2,x1 3,x2 1,x2 2,x2 3)T
Describe, meet network dynamics equation:
Coupling matrix is:
Coupling function is
H1(x1)=E1x1,H2(x2)=E2x2
Driving function h and the corresponding coupling matrix of network be:
h1[D(CA),x1]=Ex1+CA
h2[D(CA),x2]=Ex2+2CA
17 network dynamics parameters can be taken as:
ω=({ai};{Gij};{αij})=(a1,a2,...,a15;G1;α)
=(1,1,2.5,1.2,0.28,1.2,0.5,1,1,2.5,1.2,1,0.28,1.2,0.5;1.6;2.5)
In network equation, item
α[D(CA)+x21-x11]
It is numeral ciphertext chaotic signal CAThe function S driving item to network 14 network dynamics equation.B end produces chaos
Password k1, the kinetics equation of network 17 and network parameter identical with A end.Under selected network parameter, network
Maximum Lyapunov exponent and two internetwork horizontal Lyapunov indexes are respectively λmax> 0, λ⊥< 0.If xiAnd yiTwo enter
Number processed is expressed as
x11=bnbn-1...b1b0,x12=cncn-1...c1c0,x21=dndn-1...d1d0
x22=enen-1...e1e0,y11=BnBn-1...B1B0,y12=CnCn-1...C1C0
y21=DnDn-1...D1D0,y22=EnEn-1...E1E0
Then A end encryption and key password k1It is taken as:
k1=g1(x11,x12,x21,x22)=cj1ejkcjmbj1dj2...ej2bjldj1cj2djpej1
Encryption function F is taken as digital chaotic ciphers k1With transmission digital information MAXOR:
CA=F(MA,k1)=MA⊕k1
B terminal number word clear crytpographic key k1, it is taken as:
k′1=g1(y11,y12,y21,y22)=Cj1EjkCjmBj1Dj2Bj2...Ej2BjlDj1Cj2DjpEj1
Decryption function F-1It is taken as digital chaotic ciphers k1, with transmission numeral cipher-text information CAXOR, because of chaos with
Step, so k1⊕k′1=0, ciphertext becomes in plain text through Chaotic Synchronous deciphering:
We can also be to information M with different password kiWith different encryption function FiEncryption continuously, then ciphertext is
C=bjFj(bj-1...b3F3(b2F2(b1F1(M,k1),k2),k3)...kj)
Recipient deciphers by contrary order and contrary mode
As information M is encrypted by continuous three times, then ciphertext is
C=b3F3(b2F2(b1F1(M,k1),k2),k3)
Decrypting process is
This Chaos Encryption Technology also can be used in combination with conventional, asymmetrical and symmetric cryptosystem.
In digital chaotic secure communication, computer program to be used (rudimentary or high-level language) is by above-mentioned and described channel phase
Complicated chaos net equation digitized even, or will be produced by the analog circuit described by above-mentioned complicated chaos net kinetics equation
Raw chaotic signal analog-digital converter is transformed into digital chaos signal,
Introduction to this inventive technique above be only part describe not be the whole of this inventive technique, to arbitrarily complicated knot
The chaos net of structure use distributed digital coupling and distributed digital calculate by produce chaos digital and by certain way from based on
Calculating and choose chaos number in chaos net gained number, thus number generates password by certain way and adds secret letter by certain way
Cease and Chaotic Synchronous decryption information, and the information transmitting terminal of communication system and information receiving end all use the coding function of ciphertext to make
Driving for chaos net broadly falls into this inventive technique category.The technology of this invention and method scope are by following right application institute
Describing rather than described by introduction above, all changes of equal value with right application content are considered to be included in following right
Among requirement.
Claims (8)
1. the production method of digital chaotic ciphers in chaotic secret communication system, is characterized in that comprising the steps:
1) information transmitting terminal A and information receiving end B have the channel communicated, and channel contains digital multiplexer, manipulator, demodulation
Device, digital demultiplexer and digital signal processor;
2) the digital chaos network for producing chaos number being connected with channel, from digital produced by this digital chaos network
In to choose the chaos of certain length digital, through the key derivation function g of chaotically coding1It is transformed into chaos cipher k1(t), k1(t)=
g1(X, p), wherein X is that digital chaos produced by digital chaos network is digital, and p is that t is from mixed selected by digital chaos network
Ignorant digital length;Digital information M (t) that information transmitting terminal A will be transmitted in the channel is by chaos cipher k1(t) encrypted function
FiEncryption becomes ciphertext C (t) and transmits in described channel: C (t)=Fi[M(t),k1(t)];
Information transmitting terminal A and receiving terminal B are respectively arranged with digital chaos network, are respectively used to chaos encryption and chaos deciphering, and a side adds
Close or clear crytpographic key is produced by different chaos nets;Encryption function Fi(i=1,2) F is metiFi -1=I;Digital information M (t) is by mixing
Ignorant password encrypted function FiCiphertext C (t) channel of computing encryption is transferred to after receiving terminal B through decryption function Fi -1Computing profit
Obtain with Chaotic Synchronous deciphering and transmit digital information M (t);To telecommunication, reception information carries out information processing;
Information receiving end B receives ciphertext C (t) from described channel, then by ciphertext C (t) by information receiving end B chaos cipher
k′1T () is through information receiving end B chaos decryption function Fi -1Deciphering: M ' (t)=F-1 i[C(t),k′1(t)]=M (t)
Information receiving end B chaos cipher k '1T () is produced system by the chaos cipher of information receiving end digital chaos network and produces, should
Chaos cipher produces system by producing number the digital chaos network being connected with described channel and key derivation function g1Constitute,
g1The mode identical with transmitting terminal is become chaos cipher from the number that digital chaos network is chosen:
k′1(t-τ)=g1[Y(t-τ),p]
Wherein Y is numeric digit produced by information receiving end chaos net, and p is that t is from chaos selected by digital chaos network
Digital length;And the chaos cipher k ' of information receiving end1Chaos cipher k with information transmitting terminal1Chaotic Synchronous:
The numeral that the digital chaos network that information transmitting terminal A is connected with described channel is connected with described channel with information receiving end B
Chaos net has the feature that
1) there is identical topological sum dynamical structure, driven by common signal and the two is in Chaotic Synchronous state, it is ensured that two nets
Under conditions of network speckle figure chaotic dynamics synchronizes, digital chaos network includes complicated chaos net, and complicated chaos net is any
Topological structure, including regular Network, random network, small-world network, scale free net and module network;
2) information transmitting terminal A is for producing the digital complicated chaos net kinetics equation of chaos digital by differential dynamics equation
Describe, iteration kinetics equation describe or jointly described by differential dynamics equation and iteration kinetics equation;
The complicated chaos net of transmitting-receiving two uses identical method to carry out calculating to obtain Chaotic Synchronous numeric digit;By mixed
The generation of ignorant password and chaos encryption in plain text or deciphering module produce from digital chaos network or deciphering chaos cipher:
(1) chaos cipher k1T the length of () is one produced by digital network, all original digital B have Nq to multidigit,
Wherein N is complicated chaos net member of equation number, and q is the digitized figure place of equation variable;If only utilizing original number, then chaos
Password k1(t) up to k1(t)=Nq;Generally, by random or regular fashion from the chaos number that chaos net produces
Choose the digital structure password k of somes p1(t)=g1[X, p], p≤q;
(2) original numbers all produced by complex network are made a series of function biComputing produces a series of new digital function,
b1(X,p1),b2(X,p2),…,bm(X,pm), wherein biIt is polynomial function, then by random from this series digit function
Mode is chosen digital by function g1Structure password: k1(t)=g1[b1(X,p1),b2(X,p2),…bm(X,pm), p], wherein g1
It it is random or rule encoding function;
(3) chaos cipher k1The function F (B) of t digital B that () is also generated by complicated chaos net generates: k1(t)=g1[F
(B)];
(4) the chaos cipher noise profile to be met produced, code power composes the power spectrum of information to be covered;
(5) at information receiving end, the chaos cipher k ' of decrypting end1The producing method of (t) and the chaos cipher k of information transmitting terminal1
T the producing method of () is identical;
(6) choosing number from numeral complex network or its group of functions is that exponential code selector continuously chooses number to produce
Password.
The production method of digital chaotic ciphers in chaotic secret communication system the most according to claim 1, it is characterized in that from
Chaos number produced by information transmitting terminal complexity chaos net chooses number by identical or different mode, by identical or different
Mode produces chaos cipher k1(t),k2(t),…,ki(t) ..., close from chaos produced by information receiving end complexity chaos net
Chaos cipher that is digital and that produce deciphering is chosen by the rule identical with information transmitting terminal ... k ' in Mai(t),…k′2(t),k′1
(t), wherein k 'i(t)-ki(t)=0.
The production method of digital chaotic ciphers in chaotic secret communication system the most according to claim 1, it is characterized in that from
Complicated chaos net chooses the digital structure Chooser of password, the maker of password, the encryption equipment of information and the driving letter of network
Number device is all realized by digital integrated electronic circuit, realizes on logic chip or special integrated chip including with hardware description language, or
Signal processor realizes with computer program.
In chaotic secret communication system the most according to claim 1, the production method of digital chaotic ciphers, is characterized in that
Chaos cipher generates and in chaos encryption module in plain text, comprises:
First depositor is for receiving and storing the chaos cipher k encrypted for digital information M (t) generated1(t),
Second depositor for reception and stores encrypted digital information M (t),
3rd depositor is used for receiving and storing chaos encryption digital information M (t),
It is also digital for storing all or part calculating gained chaos net by a depositor,
At least one selector is used for from choosing from complicated chaos net digital for constructing password,
At least one encryption function maker, i.e. information encryption function arithmetical unit,
At least one generates chaos cipher k1Key derivation function arithmetical unit, for the number will chosen from complicated chaos net
Become chaos cipher k1(t)。
In chaotic secret communication system the most according to claim 1, the production method of digital chaotic ciphers, is characterized in that letter
In the generation of breath receiving terminal chaos clear crytpographic key and the deciphering module of ciphertext C (t), comprise:
First depositor for reception and stores the chaos cipher for decrypting ciphertext C (t) generated,
Second depositor for reception and stores decrypted ciphertext C (t),
3rd depositor is used for receiving and store chaos deciphering digital information M (t),
It is also digital for storing all or part calculating gained chaos net by a depositor,
At least one selector is used for from choosing from complicated chaos net digital for clear crytpographic key,
At least one decryption function maker, both ciphertext decryption function arithmetical unit,
At least one generates chaos cipher k '1T the key derivation function arithmetical unit of (), for choosing from complicated chaos net
Number becomes chaos cipher k '1(t)。
6., according to the production method of digital chaotic ciphers in the chaotic secret communication system one of claim 1-5 Suo Shu, it is special
Levy and be information transmitting terminal and information receiving end comprises m digital function b respectively1(X,p1),b2(X,p2),…bm(X,pm) generation
Module and corresponding function register.
7., according to the production method of digital chaotic ciphers in the chaotic secret communication system one of claim 1-5 Suo Shu, it is special
Levy and be information transmitting terminal and information receiving end comprises the driving function maker of complicated chaos net respectively and drives letter accordingly
Number depositor.
8., according to the production method of digital chaotic ciphers in the chaotic secret communication system one of claim 1-5 Suo Shu, it is special
Levy the mode being to select number to produce chaos cipher from digital chaos network to choose from digital chaos network in a random basis
Or rule, scale are free, small-world network mode is chosen, chaos cipher generating function g1It is coding immediately and the rule of network code selection
Then coding function, or network code selection is first made polynomial function computing, then encode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310168034.7A CN103346875B (en) | 2013-05-08 | 2013-05-08 | The production method of digital chaotic ciphers in chaotic secret communication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310168034.7A CN103346875B (en) | 2013-05-08 | 2013-05-08 | The production method of digital chaotic ciphers in chaotic secret communication system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103346875A CN103346875A (en) | 2013-10-09 |
CN103346875B true CN103346875B (en) | 2016-10-26 |
Family
ID=49281651
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310168034.7A Active CN103346875B (en) | 2013-05-08 | 2013-05-08 | The production method of digital chaotic ciphers in chaotic secret communication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103346875B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103716149A (en) * | 2014-01-15 | 2014-04-09 | 东南大学 | High-speed random number generating system based on chaos network |
CN104935425B (en) * | 2015-06-17 | 2019-01-18 | 贵州诚谨正信息系统工程监理有限公司 | A kind of cryptographic calculations method based on nonlinear theory |
CN106385312A (en) * | 2016-12-13 | 2017-02-08 | 陈伟 | Digital chaotic encryption method based on chaotic number spectrum |
CN107391978B (en) * | 2017-07-06 | 2020-01-14 | 厦门市美亚柏科信息股份有限公司 | Dictionary expansion method and computer-readable storage medium |
CN109104544B (en) * | 2018-08-07 | 2020-09-22 | 东北大学 | Chaotic image encryption method based on complex network synchronization |
CN112217628B (en) * | 2020-10-10 | 2022-10-11 | 黄山学院 | Chaotic encryption method for communication signals |
CN113014396B (en) * | 2021-03-01 | 2022-07-22 | 重庆邮电大学 | Ultra-lightweight encryption method suitable for WBAN data real-time encryption transmission |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101216868A (en) * | 2007-01-05 | 2008-07-09 | 李树德 | A method and system with the application of chaos cipher stream encryption |
CN102064934A (en) * | 2010-06-12 | 2011-05-18 | 深圳市九洲电器有限公司 | Encryption and decryption method based on chaos ciphers |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050271207A1 (en) * | 2004-06-05 | 2005-12-08 | Helmut Frey | Method and system for chaotic digital signature, encryption, and authentication |
-
2013
- 2013-05-08 CN CN201310168034.7A patent/CN103346875B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101216868A (en) * | 2007-01-05 | 2008-07-09 | 李树德 | A method and system with the application of chaos cipher stream encryption |
CN102064934A (en) * | 2010-06-12 | 2011-05-18 | 深圳市九洲电器有限公司 | Encryption and decryption method based on chaos ciphers |
Also Published As
Publication number | Publication date |
---|---|
CN103346875A (en) | 2013-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103346875B (en) | The production method of digital chaotic ciphers in chaotic secret communication system | |
CN1777097B (en) | Enciphered data issuing method, enciphering device and deciphering device | |
Huang | Image encryption algorithm using chaotic Chebyshev generator | |
CN101977112B (en) | Public key cipher encrypting and decrypting method based on neural network chaotic attractor | |
KR19990082665A (en) | Common Key Communication Method | |
CN101374043A (en) | Cipher key negotiating method, enciphering/deciphering method and signature/verification method | |
CN103490883B (en) | A kind of multi-variable public key ciphering/decryption system and encrypting/decrypting method | |
CN107078906A (en) | Public key encryp | |
CN101321058B (en) | Method and system for encoding and decoding digital message | |
JP2008513811A (en) | Calculation conversion method and system | |
CN104519071A (en) | Group encryption and decryption method and system with selection and exclusion functions | |
CN103220130B (en) | The encryption of digital chaotic secure communication and decryption method | |
US20020159588A1 (en) | Cryptography with unconditional security for the internet, commercial intranets, and data storage | |
CN101783728B (en) | Public key encryption method for ergodic matrix over hidden field | |
CN101582170B (en) | Remote sensing image encryption method based on elliptic curve cryptosystem | |
CN109344627A (en) | A kind of novel Shannon perfection time slot scrambling | |
CN103297221B (en) | Based on the chaotic secret communication system of digital chaos encryption algorithm | |
CN101321060B (en) | Method and system for encoding and decoding digital message | |
CN102246456A (en) | System and method for countering side-channel attacks against encryption based on cyclic groups | |
Sloane | Error-correcting codes and cryptography | |
CN103716162A (en) | Identity-based safe generalized signcryption method under standard model | |
CN114257402A (en) | Encryption algorithm determination method and device, computer equipment and storage medium | |
CN107317667A (en) | Method for early warning and prior-warning device that a kind of identity document is lost | |
Taka | Secure Communication by combined Diffe-Hellman key exchange Based AES Encryption and Arabic Text Steganography. | |
Ikhwan et al. | Implementation of image file security using the advanced encryption standard method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |