CN103825699B - To the Parallel Chaos encryption method storing file in cloud computing environment - Google Patents

To the Parallel Chaos encryption method storing file in cloud computing environment Download PDF

Info

Publication number
CN103825699B
CN103825699B CN201410049833.7A CN201410049833A CN103825699B CN 103825699 B CN103825699 B CN 103825699B CN 201410049833 A CN201410049833 A CN 201410049833A CN 103825699 B CN103825699 B CN 103825699B
Authority
CN
China
Prior art keywords
sequence
encryption
rho
circleplus
chaos
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410049833.7A
Other languages
Chinese (zh)
Other versions
CN103825699A (en
Inventor
杨庚
王欣宇
张欣晨
闵兆娥
屠袁飞
腾玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Original Assignee
Nanjing Post and Telecommunication University
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201410049833.7A priority Critical patent/CN103825699B/en
Publication of CN103825699A publication Critical patent/CN103825699A/en
Application granted granted Critical
Publication of CN103825699B publication Critical patent/CN103825699B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The encryption being data file to the Parallel Chaos encryption method of storage file in cloud computing environment provides a kind of lightweight encryption that can be parallel, belongs to information security field.Utilize cloud computing environment can parallel computation mechanism, such as MapReduce parallel computing, in conjunction with chaos encrypting method, by clear data is carried out block encryption, finally realize the encryption to whole file, and upload in the storage system of cloud computing environment.Method contains the calculating of encryption system initial value, encryption key sequence calculates and three steps of data encryption.In encryption system initializes, method uses three-dimensional Lorenz chaos system and Chen chaos system to generate the initial value for encryption and interference value;During calculating encryption key sequence, based on the initial value calculated and interference value, by Henon chaotic maps and the interative computation of 2 dimension Logistic chaotic maps, generate the key sequence for data encryption;In data encryption process, carry out computing by key sequence with plaintext, finally realize the encryption to clear data.

Description

To the Parallel Chaos encryption method storing file in cloud computing environment
Technical field
The present invention is directed to cloud computing environment needs the data file security problem of storage, it is proposed that one is applicable to cloud meter Calculating the parallel mixed chaos encipherment scheme of environment, its thinking is: the owner of data file will be stored in the literary composition in cloud environment Part is first encrypted, then uploads in the memory space rented, for user, it is achieved the confidentiality requirement to data.This Invention relates to chaos calculating, parallel computing and cloud computing technology, belongs to information security field.
Background technology
Big data security arts is the hot issue received much concern in recent years.On the one hand, data owner will be a large amount of Data be stored in cloud computing environment, for user access.But these mass data have a lot of sensitive data needs Ensure its confidentiality, such as the privacy information such as positional information, personal identification etc., how to realize data file in this kind of memory module Information encryption, it is achieved safely, effectively, simple data access control be cloud computing move towards actual application needs solution ask Topic.On the other hand, owing to file data quantity is big, need to build a kind of fast encryption scheme for big data, and at cloud meter Calculate in environment it is necessary to solve how can to utilize the cloud computing environment can the feature of parallel computation, it is achieved big data fast parallel Encryption.The present invention be aiming at file data confidentiality and can concurrency, it is proposed that a kind of cloud computing environment that can be applicable to Parallel mixed chaos encryption technology, the program can be effectively improved the enciphering rate of big data quantity.
Method contains the calculating of encryption system initial value, encryption key sequence calculates and three steps of data encryption.In encryption In system initialization, method uses three-dimensional Lorenz chaos system and Chen chaos system to generate the initial value for encryption and interference Value;During calculating encryption key sequence, based on the initial value calculated and interference value, by Henon chaotic maps and 2 dimensions The interative computation of Logistic chaotic maps, generates the key sequence for data encryption;In data encryption process, by close Key sequence carries out computing with plaintext, finally realizes the encryption to clear data.
Owing to using the computings such as block encryption, make the method for proposition can utilize the concurrent technique in cloud computing environment, real Existing encryption method can parallel computation.
Summary of the invention
Goal of the invention: it is an object of the invention to provide the Parallel Chaos encryption side to storage file in a kind of cloud computing environment Method, logical
Cross and combine the concurrent technique of cloud computing environment and Chaos Encryption Technology realizes a kind of parallel Chaotic Encryption, with Improve the encryption/decryption speed of big data quantity.
Technical scheme: the present invention for achieving the above object, adopts the following technical scheme that
Step one: data file piecemeal
Note data file a length of L the most in plain text, will be divided into n block in plain text, and the size of each piece is li, i≤n, and require li It is the integral multiple of 4 bytes, is designated as li=4N;Before so, n-1 block is isometric data block, and n-th piece is remainder data, it may be assumed that
li=4N (i < n)
(1)
li=L-(n-1) 4N (i=n)
Step 2: application nonlinear chaotic system generates initiation sequence and interference sequence
For each piecemeal, at the beginning of being produced by three-dimensional continuous chaotic system Lorenz chaotic maps and Chen chaotic maps Value sequence and interference value sequence, method is as follows:
Lorenz chaotic maps equation is:
dx 1 dt = p ( x 2 - x 1 ) dx 2 dt = - x 1 x 3 + r x 1 - x 2 dx 3 dt = x 2 x 1 - t x 3 - - - ( 2 )
Chen chaos system equation is:
dx 4 dt = a ( x 5 - x 4 ) dx 5 dt = ( c - a ) x 4 - x 4 x 6 + cx 5 dx 6 dt = x 4 x 5 - b x 6 - - - ( 3 )
Wherein χ=(x1,x2,x3,x4,x5,x6) it is chaos sequence to be generated, p, r, t and a, b, c are that system is to be given Parameter, utilizes 4 rank runge kutta methods to solve chaos system equation (2) and (3), and each iteration generates three random sequences respectively Value, i.e. 6 chaos sequence value χ=(x1,x2,x3,x4,x5,x6);In order to be calculated this chaos sequence value, first obtain in plain text Side-play amount θ of block first character jointi, the primary iteration number of times taking Lorenz system is N0, the primary iteration number of times of Chen system is M0, the iterations of note Lorenz system is ρL, the iterations of Chen system is ρC, then have:
ρ L = θ i N + N 0 , ρ C = θ i N + M 0 - - - ( 4 )
The corresponding chaos sequence of the most each piecemeal is
χρ=(x1L),x2L),x3L),x4C),x5C),x6C)) (5)
Sequence in order to make two systems produce has coupling, the random sequence pair Lorenz system obtained produced With Chen system produce random sequence to carrying out XOR:
x 4 ( ρ C ) = x 4 ( ρ C ) ⊕ x 1 ( ρ L ) x 5 ( ρ C ) = x 5 ( ρ C ) ⊕ x 2 ( ρ L ) x 6 ( ρ C ) = x 6 ( ρ C ) ⊕ x 3 ( ρ L ) - - - ( 6 )
Meter chaos sequence χρFor first value sequence χ p I = ( x 1 ( ρ L ) , x 2 ( ρ L ) , x 3 ( ρ L ) , x 4 ( ρ C ) ) And interference sequence χ ρ d = ( x 5 ( ρ C ) , x 6 ( ρ C ) ) ;
Step 3: calculate the chaos sequence of encryption key with first value sequence
By first value sequenceIn (x1L),x2L)) fractional part as H é non chaotic maps iteration initial value, (x3L),x4L)) fractional part produces the key sequence of encryption as the initial value of Logistic Map iteration, recurrence ωρ=(ω1(ρ),ω2(ρ),ω3(ρ),ω4(ρ)), wherein (ω1(ρ),ω2(ρ)) by the H é non system equation iteration of formula (7) Produce:
x n + 1 = y n + 1 - a x n 2 y n + 1 = bx n - - - ( 7 )
3(ρ),ω4(ρ)) produced by the Coupled Logistic chaotic map system equation iteration of formula (8):
x n + 1 = μ 1 x n ( 1 - x n ) + γ 1 y n 2 y n + 1 = μ 2 y n ( 1 - y n ) + γ 2 ( x n 2 + x n y n ) - - - ( 8 )
Parameter value in mapping is: 2.75 < μ1< 3.4,2.7 < μ2< 3.45 and 0.15 < γ1< 0.21,0.13 < γ2< 0.15.
Step 4: reconstruct encryption key sequence
After obtaining encryption key sequence, due to its value produced can not with in plain text carry out xor operation, so need by Encryption key sequence is changed according to following formula:
Sequence in order to make two systems produce has coupling, carries out calculated as below:
ω 3 ( ρ ) = ω 1 ( ρ ) ⊕ ω 3 ( ρ ) ω 4 ( ρ ) = ω 2 ( ρ ) ⊕ ω 4 ( ρ ) - - - ( 10 )
Step 5: data encryption
After generating encryption key sequence, will carry out the encryption of clear text file, cryptographic operation is to take 4 successively in plaintext The ASCII character M that individual byte length data block is corresponding, carries out XOR (XOR) operation with encryption key sequence and obtains intermediate object program, so After carry out secondary xor operation with interference sequence again and obtain final ciphertext C:
C 4 k + 1 = ( M 4 k + 1 ⊕ ω 1 ( k + 1 ) ) ⊕ x 5 ( k + 1 ) C 4 k + 2 = ( M 4 k + 2 ⊕ ω 2 ( k + 1 ) ) ⊕ x 6 ( k + 1 ) C 4 k + 3 = ( M 4 k + 3 ⊕ ω 3 ( k + 1 ) ) ⊕ x 5 ( k + 1 ) C 4 k + 4 = ( M 4 k + 4 ⊕ ω 4 ( k + 1 ) ) ⊕ x 6 ( k + 1 ) - - - ( 11 )
Wherein k represents the sequence number of data block, C4k+1, C4k+2, C4k+3, C4k+4Be respectively in data block corresponding to the 1st, 2,3 and The encrypted cipher text of 4 bytes.In the encryption method that method proposes, key space includes initial value χ (0)=(x of key sequence1 (0),x2(0),x3(0),x4(0),x5(0),x6(0)), the primary iteration times N of Lorenz and Chen system0And M0, and two Parameter p of individual chaos system, r, t and a, b, c.
Beneficial effect: the parallel mixed chaos encipherment scheme that the present invention designs solves in cloud computing actual application Two problems to be solved, one is data owner's confidentiality requirements to data file, by adding the packet of clear text file Close, upload and be stored in cloud environment, it is ensured that the sensitive information of data owner is protected;Two is to calculate for big data high-speed Requirement, uses block encryption etc. to see parallel computing technique, makes the ciphering process of data file may utilize in cloud computing environment Parallel computing, it is achieved the high-speed parallel of large data files encryption is calculated, finally meets big data in cloud computing environment Secure high-speed access.
Accompanying drawing explanation
Fig. 1 is the flow process of encipherment scheme.
Detailed description of the invention
Enforcement to technical scheme below is described in further detail:
Step one: data file piecemeal
If the file that length of the plaintext is 15 bytes, i.e. L=15.Being divided into 4 pieces, the greatest length of each piece is 4 bytes, Then there is N=1.First 3 pieces is isometric 4 byte data blocks, and the 4th piece is 3 bytes of remainder data, it may be assumed that
li=4N=4 (i=1,2,3)
(12)
li=L-(n-1) 4N=15-(4-1) 4=3 (i=4)
Step 2: application nonlinear chaotic system generates initiation sequence and interference sequence
For each piecemeal, at the beginning of being produced by three-dimensional continuous chaotic system Lorenz chaotic maps and Chen chaotic maps Value sequence and interference value sequence.Method is as follows:
Lorenz chaotic maps equation is:
dx 1 dt = p ( x 2 - x 1 ) dx 2 dt = - x 1 x 3 + r x 1 - x 2 dx 3 dt = x 2 x 1 - t x 3 - - - ( 13 )
Wherein p=10, r=28, t=8/3.Chen chaos system equation is:
dx 4 dt = a ( x 5 - x 4 ) dx 5 dt = ( c - a ) x 4 - x 4 x 6 + cx 5 dx 6 dt = x 4 x 5 - b x 6 - - - ( 14 )
Wherein χ=(x1,x2,x3,x4,x5,x6) it is chaos sequence to be generated, a=35, b=3, c=28.Utilize 4 rank dragons Ge Kutafa solves chaos system equation (13) and (14), and each iteration generates three stochastic ordering train values, i.e. 6 chaos sequences respectively Train value χ=(x1,x2,x3,x4,x5,x6).In order to be calculated this chaos sequence value, according to the division of data block, can calculate Go out side-play amount θ of each Plaintext block first character joint1234, divide according to data block and have θ1=0, θ2=4, θ3=8, θ4= 12.The primary iteration number of times taking Lorenz system is N0The primary iteration number of times of=2000, Chen system is M0=3000.Then two The iterations of system is respectively as follows:
ρ L ( 1 ) = 0 4 + 2000 = 2000 ρ C ( 1 ) = 0 4 + 3000 = 3000 ρ L ( 2 ) = 4 4 + 2000 = 2001 ρ C ( 2 ) = 4 4 + 3000 = 3001 ρ L ( 3 ) = 8 4 + 2000 = 2002 ρ C ( 3 ) = 8 4 + 3000 = 3002 ρ L ( 4 ) = 12 4 + 2000 = 2003 ρ C ( 4 ) = 12 4 + 3000 = 3003 - - - ( 15 )
Taking initial value is x1(0)=1,x2(0)=2,x3(0)=3,x4(0)=4,x5(0)=5,x6(0)=6, then it is calculated each The corresponding chaos sequence of piecemeal is:
χρ=(x1L),x2L),x3L),x4C),x5C),x6C))
χρ(1)=(x1(2000),x2(2000),x3(2000),x4(3000),x5(3000),x6(3000))
=(17.875805137193584,23.577775139444757,35.317757483789414,
6.717742409639023,7.835244360075882,10.201089575432276)
χρ(2)=(x1(2001),x2(2001),x3(2001),x4(3001),x5(3001),x6(3001))
=(18.17831668337063,22.534873609894326,37.37817682181235,
6.782891166690998,7.8362000710961714,10.394920549118666)
χρ(3)=(x1(2002),x2(2002),x3(2002),x4(3002),x5(3002),x6(3002))
=(18.395763937117206,21.26573786112585,39.3236292734919,
6.844042435179011,7.828307249610151,10.589251029269274)
χρ(4)=(x1(2003),x2(2003),x3(2003),x4(3003),x5(3003),x6(3003))
=(18.546007636272776,18.12250541456983,42.723826295121185,
6.953205127666364,7.785230347792439,10.977112780831336)
Step 3: calculate the chaos sequence of encryption key with first value sequence
By chaos sequence χρIt is divided into just value sequence χ p I = ( x 1 ( ρ L ) , x 2 ( ρ L ) , x 3 ( ρ L ) , x 4 ( ρ C ) ) , And interference sequenceBy first value sequenceFractional part will reflect as H é non chaotic maps and 2D-Logistic The initial value penetrated, carries out recurrence and produces ciphering sequence ωρ=(ω1(ρ),ω2(ρ),ω3(ρ),ω4(ρ)), wherein (ω1(ρ), ω2(ρ)) produced by the H é non system iterative equation of formula (16):
x n + 1 = y n + 1 - a x n 2 y n + 1 = bx n - - - ( 16 )
Parameter in formula (16) is a=1.4, b=0.3.Sequential value (ω3(ρ),ω4(ρ)) by the two dimension of formula (17) Logistic chaotic mapping system iterative equation produces:
x n + 1 = μ 1 x n ( 1 - x n ) + γ 1 y n 2 y n + 1 = μ 2 y n ( 1 - y n ) + γ 2 ( x n 2 + x n y n ) - - - ( 17 )
Wherein parameter is μ1=2.93, μ2=3.17, γ1=0.197, γ2=0.139.Produce the corresponding encryption with 4 piecemeals Key sequence ωρ=(ω1(ρ),ω2(ρ),ω3(ρ),ω4(ρ)):
ω (1)=(0.503926645776215,0.26274154115807524,0.7310172809052533, 0.5911631451546245)
ω(2)=(1.490358034498705,0.053495005011188465,0.635768102381588, 0.610385893368047)
ω(3)=(1.0464571296343332,0.1187291811351617,0.5208502734446377, 0.6470227289937563)
ω(4)=(1.407740930215608,0.15611128793982337,0.39125888333654657, 0.6995879558829032)
Step 4: reconstruct encryption key sequence
After obtaining encryption key sequence, due to its value produced can not with in plain text carry out xor operation, so need by Encryption key sequence is changed according to formula (18):
Sequence in order to make two systems produce has coupling, calculates:
ω 3 ( ρ ) = ω 1 ( ρ ) ⊕ ω 3 ( ρ ) ω 4 ( ρ ) = ω 2 ( ρ ) ⊕ ω 4 ( ρ ) - - - ( 19 )
The chaos encryption sequence obtained through conversion is:
ωi(1)=(56,114,83,76)xi(1)=(54,39)
ωi(2)=(7,100,101,63)xi(2)=(31,100)
ωi(3)=(54,123,25,47)xi(3)=(126,70)
ωi(4)=(7,35,39,18)xi(4)=(13,124)
Step 5: data encryption
After generating encryption key sequence, the encryption of clear text file will be carried out.If the ASC of the plaintext of 15 bytes II yard M is respectively (97,98,99,100,101,102,103,104,105,106,107,108,109,110,111), and cryptographic operation is In plaintext, take 4 ASCII character M corresponding to byte length data block successively, carry out XOR (XOR) operation with encryption key sequence Obtain intermediate object program, carry out secondary xor operation with interference sequence the most again and obtain final ciphertext C:
C 4 k + 1 = ( M 4 k + 1 ⊕ ω 1 ( k + 1 ) ) ⊕ x 5 ( k + 1 ) C 4 k + 2 = ( M 4 k + 2 ⊕ ω 2 ( k + 1 ) ) ⊕ x 6 ( k + 1 ) C 4 k + 3 = ( M 4 k + 3 ⊕ ω 3 ( k + 1 ) ) ⊕ x 5 ( k + 1 ) C 4 k + 4 = ( M 4 k + 4 ⊕ ω 4 ( k + 1 ) ) ⊕ x 6 ( k + 1 ) - - - ( 20 )
Wherein k represents the sequence number of data block, C4k+1, C4k+2, C4k+3, C4k+4Be respectively in data block corresponding to the 1st, 2,3 and The encrypted cipher text of 4 bytes.Concrete encrypted result is:
C 1 = ( M 1 ⊕ ω 1 ( 1 ) ) ⊕ x 5 ( 1 ) = 97 ⊕ 56 ⊕ 54 = 111 C 2 = ( M 2 ⊕ ω 2 ( 1 ) ) ⊕ x 6 ( 1 ) = 98 ⊕ 114 ⊕ 54 = 38 C 3 = ( M 3 ⊕ ω 3 ( 1 ) ) ⊕ x 5 ( 1 ) = 99 ⊕ 83 ⊕ 39 = 23 C 4 = ( M 4 ⊕ ω 4 ( 1 ) ) ⊕ x 6 ( 1 ) = 100 ⊕ 76 ⊕ 39 = 15
C 5 = ( M 5 ⊕ ω 1 ( 2 ) ) ⊕ x 5 ( 2 ) = 101 ⊕ 7 ⊕ 31 = 125 C 6 = ( M 6 ⊕ ω 2 ( 2 ) ) ⊕ x 6 ( 2 ) = 102 ⊕ 100 ⊕ 31 = 29 C 7 = ( M 7 ⊕ ω 3 ( 2 ) ) ⊕ x 5 ( 2 ) 2 = 103 ⊕ 101 ⊕ 100 = 102 C 8 = ( M 8 ⊕ ω 4 ( 2 ) ) ⊕ x 6 ( 2 ) = 104 ⊕ 63 ⊕ 100 = 51
C 9 = ( M 9 ⊕ ω 1 ( 3 ) ) ⊕ x 5 ( 3 ) = 105 ⊕ 54 ⊕ 126 = 33 C 10 = ( M 10 ⊕ ω 2 ( 3 ) ) ⊕ x 6 ( 3 ) = 106 ⊕ 123 ⊕ 126 = 111 C 11 = ( M 11 ⊕ ω 3 ( 3 ) ) ⊕ x 5 ( 3 ) = 107 ⊕ 25 ⊕ 70 = 52 C 12 = ( M 12 ⊕ ω 4 ( 3 ) ) ⊕ x 6 ( 3 ) = 108 ⊕ 47 ⊕ 70 = 5
C 13 = ( M 13 ⊕ ω 1 ( 4 ) ) ⊕ x 5 ( 4 ) = 109 ⊕ 7 ⊕ 13 = 103 C 14 = ( M 14 ⊕ ω 2 ( 4 ) ) ⊕ x 6 ( 4 ) = 110 ⊕ 35 ⊕ 13 = 64 C 15 = ( M 15 ⊕ ω 3 ( 4 ) ) ⊕ x 5 ( 4 ) = 111 ⊕ 39 ⊕ 124 = 52
It is M=(97,98,99,100,101,102,103,104,105,106,107,108,109,110,111) i.e. in plain text, Ciphertext is C=(111,38,23,15,125,29,102,51,33,111,52,5,103,64,52).

Claims (1)

1. to the Parallel Chaos encryption method storing file in a cloud computing environment, it is characterised in that the method includes following step Rapid:
Step one: data file piecemeal
Note data file a length of L the most in plain text, will be divided into n block in plain text, and the size of each piece is li, i≤n, and require liIt is 4 The integral multiple of byte, is designated as li=4N;Before so, n-1 block is isometric data block, and n-th piece is remainder data, it may be assumed that
l i = 4 N ( i < n ) l i = L - ( n - 1 ) &CenterDot; 4 N ( i = n ) - - - ( 1 )
Step 2: application nonlinear chaotic system generates initiation sequence and interference sequence
For each piecemeal, produce initial value sequence by three-dimensional continuous chaotic system Lorenz chaotic maps and Chen chaotic maps Row and interference value sequence, method is as follows:
Lorenz chaotic maps equation is:
dx 1 d t = p ( x 2 - x 1 ) dx 2 d t = - x 1 x 3 + rx 1 - x 2 dx 3 d t = x 2 x 1 - tx 3 - - - ( 2 )
Chen chaos system equation is:
dx 4 d t = a ( x 5 - x 4 ) dx 5 d t = ( c - a ) x 4 - x 4 x 6 + cx 5 dx 6 d t = x 4 x 5 - bx 6 - - - ( 3 )
Wherein χ=(x1,x2,x3,x4,x5,x6) it is chaos sequence to be generated, p, r, t and a, b, c are the ginseng that system is to be given Number, utilizes 4 rank runge kutta methods to solve chaos system equation (2) and (3), and each iteration generates three stochastic ordering train values respectively, I.e. 6 chaos sequence value χ=(x1,x2,x3,x4,x5,x6);In order to be calculated this chaos sequence value, first obtain Plaintext block Side-play amount θ of first character jointi, the primary iteration number of times taking Lorenz system is N0, the primary iteration number of times of Chen system is M0, the iterations of note Lorenz system is ρL, the iterations of Chen system is ρC, then have:
&rho; L = &theta; i N + N 0 &rho; C = &theta; i N + M 0 - - - ( 4 ) The corresponding chaos sequence of the most each piecemeal is
χρ=(x1L),x2L),x3L),x4C),x5C),x6C)) (5)
Sequence in order to make two systems produce has coupling, the random sequence that the Lorenz system obtained is produced to The random sequence that Chen system produces is to carrying out XOR:
x 4 ( &rho; C ) = x 4 ( &rho; C ) &CirclePlus; x 1 ( &rho; L ) x 5 ( &rho; C ) = x 5 ( &rho; C ) &CirclePlus; x 2 ( &rho; L ) x 6 ( &rho; C ) = x 6 ( &rho; C ) &CirclePlus; x 3 ( &rho; L ) - - - ( 6 )
Meter chaos sequence χρFor first value sequenceAnd interference sequence
Step 3: calculate the chaos sequence of encryption key with first value sequence
By first value sequenceIn (x1L),x2L)) fractional part is as the initial value of H é non chaotic maps iteration, (x3L),x4C)) fractional part produces the key sequence of encryption as the initial value of Coupled Logistic chaotic map iteration, recurrence Row ωρ=(ω1(ρ),ω2(ρ),ω3(ρ),ω4(ρ)), wherein (ω1(ρ),ω2(ρ)) by the H é non system equation of formula (7) Iteration produces:
x n + 1 = y n + 1 - a x n 2 y n + 1 = bx n - - - ( 7 )
3(ρ),ω4(ρ)) produced by the Coupled Logistic chaotic map system equation iteration of formula (8):
x n + 1 = &mu; 1 x n ( 1 - x n ) + &gamma; 1 y n 2 y n + 1 = &mu; 2 y n ( 1 - y n ) + &gamma; 2 ( x n 2 + x n y n ) - - - ( 8 )
Parameter value in mapping is: 2.75 < μ1< 3.4,2.7 < μ2< 3.45 and 0.15 < γ1< 0.21,0.13 < γ2< 0.15;
Step 4: reconstruct encryption key sequence
After obtaining encryption key sequence, owing to its value produced can not carry out xor operation with plaintext, so needing to encrypt Key sequence is changed according to following formula:
Sequence in order to make two systems produce has coupling, carries out calculated as below:
&omega; 3 ( &rho; ) = &omega; 1 ( &rho; ) &CirclePlus; &omega; 3 ( &rho; ) &omega; 4 ( &rho; ) = &omega; 2 ( &rho; ) &CirclePlus; &omega; 4 ( &rho; ) - - - ( 10 )
Step 5: data encryption
After generating encryption key sequence, will carry out the encryption of clear text file, cryptographic operation is to take 4 words successively in plaintext The ASCII character M that joint length data block is corresponding, carries out XOR (XOR) operation with encryption key sequence and obtains intermediate object program, the most again Carry out secondary xor operation with interference sequence and obtain final ciphertext C:
C 4 k + 1 = ( M 4 k + 1 &CircleTimes; &omega; 1 ( k + 1 ) ) &CirclePlus; x 5 ( k + 1 ) C 4 k + 2 = ( M 4 k + 2 &CircleTimes; &omega; 2 ( k + 1 ) ) &CirclePlus; x 6 ( k + 1 ) C 4 k + 3 = ( M 4 k + 3 &CircleTimes; &omega; 3 ( k + 1 ) ) &CirclePlus; x 5 ( k + 1 ) C 4 k + 4 = ( M 4 k + 4 &CircleTimes; &omega; 4 ( k + 1 ) ) &CirclePlus; x 6 ( k + 1 ) - - - ( 11 )
Wherein k represents the sequence number of data block, C4k+1, C4k+2, C4k+3, C4k+4It is respectively in data block corresponding to the 1st, 2,3 and 4 words The encrypted cipher text of joint;In the encryption method that method proposes, key space includes initial value χ (0)=(x of key sequence1(0), x2(0),x3(0),x4(0),x5(0),x6(0)), the primary iteration times N of Lorenz and Chen system0And M0, and two mix Parameter p of ignorant system, r, t and a, b, c.
CN201410049833.7A 2014-02-13 To the Parallel Chaos encryption method storing file in cloud computing environment Active CN103825699B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410049833.7A CN103825699B (en) 2014-02-13 To the Parallel Chaos encryption method storing file in cloud computing environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410049833.7A CN103825699B (en) 2014-02-13 To the Parallel Chaos encryption method storing file in cloud computing environment

Publications (2)

Publication Number Publication Date
CN103825699A CN103825699A (en) 2014-05-28
CN103825699B true CN103825699B (en) 2016-11-30

Family

ID=

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719908A (en) * 2009-11-26 2010-06-02 大连大学 Image encryption method based on chaos theory and DNA splice model
CN102904717A (en) * 2012-10-13 2013-01-30 华南理工大学 Chaos synchronization encrypting/decrypting method and device using data compression encoding

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719908A (en) * 2009-11-26 2010-06-02 大连大学 Image encryption method based on chaos theory and DNA splice model
CN102904717A (en) * 2012-10-13 2013-01-30 华南理工大学 Chaos synchronization encrypting/decrypting method and device using data compression encoding

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《一个基于混沌映射的图像加密并行算法》;周庆,胡月,廖晓峰;《计算机工程与应用》;20070430;第22卷(第43期);全文 *

Similar Documents

Publication Publication Date Title
CN104202145A (en) Plaintext or ciphertext selection based side channel power analysis attack method on round function output of SM4 cipher algorithm
CN102546157B (en) Random mixed encryption system for resisting energy analysis and implementation method thereof
CN107005415A (en) For encrypting/decrypting the block encryption method of message and realize the encryption device of this method
CN104009835A (en) File encrypting and decrypting method allowing parallel computing to be conducted in cloud storage system
CN104065474B (en) Novel low-resource efficient lightweight Surge block cipher implementation method
CN103716157A (en) Grouped multiple-key encryption method and grouped multiple-key encryption device
CN107491317A (en) A kind of symmetrical encryption and decryption method and systems of AES for accelerating platform based on isomery
JP6575532B2 (en) Encryption device, decryption device, encryption processing system, encryption method, decryption method, encryption program, and decryption program
CN103152362B (en) Based on the large data files encrypted transmission method of cloud computing
CN107566113A (en) The symmetrical encipher-decipher methods of 3DES, system and computer-readable recording medium
CN103916248A (en) Fully homomorphic encryption public key space compression method
CN104396182A (en) Method of encrypting data
CN105959107A (en) Novel and highly secure lightweight SFN block cipher implementation method
CN103905182A (en) Anti-attack method based on middle data storage position dynamic change and circuit implementation
CN104852798A (en) Data encryption and decryption system and method thereof
CN101321058A (en) Method and system for encoding and decoding digital message
CN103595524B (en) A kind of encipher-decipher method of bit loss encryption-bit filling decryption based on stream cipher
CN105117653B (en) A kind of near infrared spectrum data encryption method
CN103812658A (en) Stream cipher based secure communication protocol
CN101969374B (en) Method for realizing confusing layer in block cipher algorithm
CN101582170B (en) Remote sensing image encryption method based on elliptic curve cryptosystem
CN103825699B (en) To the Parallel Chaos encryption method storing file in cloud computing environment
CN107707352B (en) A kind of embedded encryption method
CN102523085A (en) Data encryption method, data encrypting device and smart card
CN106921486A (en) The method and apparatus of data encryption

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant