CN104579693B - Based on the high order second order logistic embedded encryption methods mapped and device - Google Patents

Based on the high order second order logistic embedded encryption methods mapped and device Download PDF

Info

Publication number
CN104579693B
CN104579693B CN201510066179.5A CN201510066179A CN104579693B CN 104579693 B CN104579693 B CN 104579693B CN 201510066179 A CN201510066179 A CN 201510066179A CN 104579693 B CN104579693 B CN 104579693B
Authority
CN
China
Prior art keywords
plaintext
block
logistic
data
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510066179.5A
Other languages
Chinese (zh)
Other versions
CN104579693A (en
Inventor
廖志贤
吴世贵
黄国现
谭祖印
雷善历
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guilin Lihua Electronic Technology Co ltd
Original Assignee
Guangxi Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangxi Normal University filed Critical Guangxi Normal University
Priority to CN201510066179.5A priority Critical patent/CN104579693B/en
Priority to CN201710919542.2A priority patent/CN107733642A/en
Priority to CN201710917058.6A priority patent/CN107835070B/en
Priority to CN201710919612.4A priority patent/CN107707352B/en
Priority to CN201710919545.6A priority patent/CN107707351A/en
Publication of CN104579693A publication Critical patent/CN104579693A/en
Application granted granted Critical
Publication of CN104579693B publication Critical patent/CN104579693B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a kind of embedded encryption method based on high order second order logistic mappings and device, and its power supply module provides power supply for the device modules;The be-encrypted data of data AD sampling modules sampling input, is provided with the initial value of change in plain text for key drive module;Key drive module receives the sampled data of data AD sampling modules and produces the key become with sampled data and be transmitted to microcontroller encrypting module;Be-encrypted data and key are carried out chaos encryption and spread out of encryption data to product by microcontroller encrypting module;Embedded interface driver module provides the interface with product.The present invention maps core with logistic, carries out high order second order encryption embedded mode, realizes that the high order processing of encryption successive ignition produces complicated changeable key, the device can be embedded into various electronic products, improve the safety of electronic product.

Description

Based on the high order second order logistic embedded encryption methods mapped and device
Technical field
The invention belongs to field of information security technology, and in particular to one kind is based on high order second order logistic (logic) mappings Embedded encryption method and device.
Background technology
General logistic mapping encryptings method is mainly the initial value x by mapping0Produced with u (algorithm secret key) Two binary system series AsjAnd Dj, and by the two binary system series AsjAnd DjRegard the sub-key of this cryptographic system as and add to realize Close.However, the analysis of logistic mapping encryptings method and discovery series AjAnd DjIt is to be determined by logistic mappings are complete , and in plain text and the factor such as ciphertext is unrelated.So, when attacker obtains the A of any plaintextjAnd DjAfterwards, it is possible to use this AjWith DjDirectly attack has used the ciphertext that same key is encrypted, and this not only can make information security there is hidden danger, will also turn into safety Leak.It can be seen that, it is it cannot be guaranteed that information security only by the simple logistic encryption methods mapped.
In order to improve information security, currently used increasingly complex logistic mapping encrypting methods include space The stream encryption of division, the stream encryption of multiple logistic mappings and second order logistic mapping encryptings etc..However, these complexity Logistic mapping encrypting methods, although more iterations can ensure information security to a certain extent, but in reality During existing information transfer, key more preferably can not change at any time, reliability reduction, and the effect of safe information transmission is not reached still.
The content of the invention
The technical problems to be solved by the invention are that the key in the presence of existing logistic mapping encryptings method is simple With the immutable grade deficiency of key there is provided a kind of based on the high order second order logistic embedded encryption methods mapped and device.
To solve the above problems, the present invention is achieved by the following technical solutions:
A kind of embedded encryption method mapped based on high order second order logistic, is comprised the following steps:
Step 1, a logistic mapping is selected as the producing method of sub-key system, and the logistic is mapped In the certain number of times of each mapping difference iteration;
Step 2, plaintext is then divided into some pieces with binary system;
Step 3, on the basis of the iteration obtained by step 1, then certain number of times is carried out to each mapping in logistic mappings Iteration obtain A and D two parts;
Step 4, each Plaintext block obtained by step 2 is entered after shiftrows respectively, obtains corresponding intermediate ciphertext;
Step 5, the intermediate ciphertext obtained by step 3 gained A and step 4 is subjected to XOR;
Step 6, judge whether that all Plaintext blocks have been encrypted to finish;If finishing, terminate;Otherwise, return to step 3 after Continuous encryption.
In above-mentioned steps 1, selected logistic is mapped as
In formula,Ith mapping n follow-up value of iteration is represented, u is set point value, and u ∈ (1.64,2),It is with u The numerical value of type double precision, a=1,2,3......, b=1,2,3......, and a, b complexity that is used according to user of value Degree and processor computing capability are chosen.
Because step 1 is the starting point of key, it is ensured that the complexity of initial key, and step 3 in order to home key It is different and obtain the iteration that A, D two parts are just done, so main iteration is in step 1, so to logistic mappings in step 1 In each mapping carry out each mapping that the number of times of iteration first is more than in being mapped in step 3 logistic and carry out iteration again Number of times.
In above-mentioned steps 4, it is to the detailed process that each Plaintext block enters shiftrows:
Step 4.1, Plaintext block is divided into m plaintext sub-block;Wherein m is the positive integer more than 1;
Step 4.2, each plaintext sub-block ring shift left or is moved to right after S simultaneously respectively, each plaintext sub-block of acquisition Displacement plaintext sub-block;
Step 4.3, the order of the plaintext sub-block by each displacement plaintext sub-block as corresponding to it, which merges, obtains displacement in plain text Block;
Step 4.4, Plaintext block ring shift left will be shifted or moved to right after m × S, intermediate ciphertext is obtained.
In above-mentioned steps 4.2 and step 4.4, the direction of displacement of each plaintext sub-block is consistent, and plaintext sub-block and Plaintext block Direction of displacement it is also consistent.I.e. when each plaintext sub-block is equal ring shift left S, Plaintext block circulates also corresponding ring shift left m × S;When each plaintext sub-block is equal ring shift right S, Plaintext block circulation also corresponding ring shift right m × S.
The embedded encryption device of high order second order logistic mappings based on above-mentioned embedded encryption method, including power supply Power module, data AD sampling modules, key drive module, microcontroller encrypting module and embedded interface driver module;Wherein Power supply module, power supply is provided for the device modules;Data AD sampling modules, sample input be-encrypted data, be Key drive module is provided with the initial value of change in plain text;Key drive module, receives the hits of data AD sampling modules According to and produce the key that becomes with sampled data and be transmitted to microcontroller encrypting module;Microcontroller encrypting module, to be encrypted Data and key carry out chaos encryption and spread out of encryption data to product;There is provided connect with product for embedded interface driver module Mouthful.
Compared with prior art, instant invention overcomes key in traditional logistic mapping encryptings method is simple and key not Variable the shortcomings of, core is mapped with logistic, carrying out high order second order using stm32F407 encrypts embedded mode, realizes encryption The processing of successive ignition high order produces complicated changeable key, and the device can be embedded into various electronic products, improve electronic product Safety.
Brief description of the drawings
Fig. 1 is the encryption flow figure of the present invention.
Fig. 2 is the general arrangement structure chart of the present invention.
Fig. 3 is the logistic mapping bifurcation graphs of the present invention.
Fig. 4 is the second order High Degree Logistic-Like Map figure of the present invention.
Embodiment
A kind of embedded encryption method mapped based on high order second order logistic, as shown in figure 1, comprising the following steps:
Step 1, a logistic mapping is selected as the producing method of sub-key series:
In formula:Represent ith mapping n follow-up value of iteration.U is setting value, and u ∈ (1.64,2).It is with u The numerical value of type double precision, a=1,2,3......, b=1,2, the 3...... (complexities that a, b value are used according to user Chosen with processor computing capability).In order to eliminate the influence of instantaneous value, in a preferred embodiment of the invention, by reflecting in formula (1) Iteration 200 times respectively are penetrated, x is obtained200To produce the starting point of key.
Step 2, plaintext is divided into a series of packet that length are 256 bits, last packet is if curtailment Zero padding.
Step 3, each mapping in formula (1) is distinguished into iteration 40 times again.If the iteration j value of ith mapping is(two enter Form processed is:WhereinRepresentN-th of binary system).From The middle numerical value extracted in the 2nd, 3 binary digit, obtains the series of 18 bitBy 20 iteration and The serial D difference for extracting the series A for obtaining 256 bits and 32 bits is as follows:
A=H1,2H1,3H2,2H2,3H3,2H3,3……H16,2H16,3
D=H17,2H17,3H18,2H18,3H19,2H19,3H20,2H20,3
In formula,
Step 4, shiftrows are entered to Plaintext block.
First, by Plaintext block pk(k=1,2 ...) is divided into four pieces of 64 bits:Pk1、Pk2、Pk3And Pk4Circulate respectively left Move S1、S2、S3And S4Position, wherein S1=(H17,2H17,3)mod64,S2=(H18,2H18,3)mod64,S3=(H19,2H19,3)mod64 And S4=(H20,2H20,3)mod64。
Then, by Pk1、Pk2、Pk3And Pk4Merging obtains Pk, then by Pk, ring shift left S obtains intermediate ciphertext C,k.Its In, S=(H17,2H17,3+H18,2H18,3+H19,2H19,3+H20,2H20,3)mod64。
Step 5, by A and C,kXor operation is carried out, encrypted cipher text is obtained:
Step 6, if Ck(i) it is ciphertext CkIn i-th of byte value, calculate E1~E4It is as follows:
Step 7, if all encryption is finished Plaintext block, terminate;Otherwise to various iteration E respectively in formula (1)1~E4, then Go to step 3 iteration 40 times.
This encryption method by initial key high order iteration 200 times, reaches the complexity of key first;Then plaintext is entered with two System is divided into some pieces, is that encryption is prepared below;By the key of iteration before, further iteration obtains A and D two parts again, then By a portion XOR is carried out with the plaintext Jing Guo shift operation.Such as Fig. 1, E1~E4The module being basically completed is encrypted, so Further judge whether that all plaintexts are encrypted complete afterwards, encrypted if not returning again to continuation.In iteration each time Key be all it is different reach time variation, reach encryption information security purpose.
Realize the above method based on high order second order logistic map embedded encryption device, as shown in Fig. 2 its by Power supply module and the data AD sampling modules being connected with power supply module, key drive module, microcontroller encryption Module and embedded interface driver module composition.One input of microcontroller encrypting module and the input of data AD sampling modules Be-encrypted data is inputted simultaneously.The output end of data AD sampling modules connects microcontroller encrypting module through key drive module Another input.The output end of microcontroller encrypting module is connected with the input of embedded interface driver module, and embedded interface drives The output end output encryption data of dynamic model block.Power supply module is mainly that the device modules provide power supply.Data AD is adopted Egf block is used for the be-encrypted data inputted of sampling, and is provided for key drive module with the initial value of change in plain text.Key drives Dynamic model block, which receives the sampled data of data AD sampling modules and produces the key become with sampled data and be transmitted to microcontroller, to be added Close module.Be-encrypted data and key are carried out chaos encryption and spread out of encryption data to product by microcontroller encrypting module. Embedded interface driver module provides the interface with product.
As shown in figure 3, being the logistic mapping bifurcation graphs of the present invention, when taking parameter a=2, during b=3, this figure is ginseng Number u, from the bifurcation graphs of 0 to 2.0 changes, is as seen from the figure, in the range of 1.64-2.0 chaotic motion, can be used for encryption.When it is determined that U value and the value for changing a, b, can all produce different value, so that encryption is better.
It is that u takes 1.649 iteration to develop in figure as shown in figure 4, being the second order High Degree Logistic-Like Map figure of the present invention Figure.As can be seen from the figure the data that interative computation comes out are chaos, when we can change in the full mapping ranges of Fig. 3 U value, has more selectivity to encryption, preferably improves security.

Claims (3)

1. the embedded encryption method mapped based on high order second order logistic, it is characterized in that, comprise the following steps:
Step 1, a logistic mapping is selected as the producing method of sub-key system, and by logistic mappings The certain number of times of each mapping difference iteration;
Step 2, plaintext is then divided into some pieces with binary system;
Step 3, on the basis of the iteration obtained by step 1, then changing for certain number of times is carried out to each mapping in logistic mappings In generation, obtains A and D two parts;
Step 4, each Plaintext block obtained by step 2 is entered after shiftrows respectively, obtains corresponding intermediate ciphertext;
Step 4.1, Plaintext block is divided into m plaintext sub-block;Wherein m is the positive integer more than 1;
Step 4.2, each plaintext sub-block ring shift left or is moved to right after S simultaneously respectively, the shifting of each plaintext sub-block of acquisition Position plaintext sub-block;
Step 4.3, the order of the plaintext sub-block by each displacement plaintext sub-block as corresponding to it, which merges, obtains shifting Plaintext block;
Step 4.4, Plaintext block ring shift left will be shifted or moved to right after m × S, intermediate ciphertext is obtained;
In above-mentioned steps 4.2 and step 4.4, the direction of displacement of each plaintext sub-block is consistent, and plaintext sub-block and displacement Plaintext block Direction of displacement it is also consistent;
Step 5, the intermediate ciphertext obtained by step 3 gained A and step 4 is subjected to XOR;
Step 6, judge whether that all Plaintext blocks have been encrypted to finish;If finishing, terminate;Otherwise, return to step 3 continues to add It is close.
2. the embedded encryption method according to claim 1 mapped based on high order second order logistic, it is characterized in that, step The number of times that each mapping in being mapped in rapid 1 logistic carries out iteration first is more than in step 3 in logistic mappings Each mapping carries out the number of times of iteration again.
3. the embedded encryption device of the high order second order logistic mappings based on embedded encryption method described in claim 1, It is characterized in that:Including power supply module, data AD sampling modules, key drive module, microcontroller encrypting module and embedding Incoming interface drive module;Wherein
Power supply module, power supply is provided for the device modules;
Data AD sampling modules, sample input be-encrypted data, for key drive module provides with plain text and change it is initial Value;
Key drive module, receives the sampled data of data AD sampling modules and produces the key become with sampled data and be transmitted to Microcontroller encrypting module;
Be-encrypted data and key, are carried out chaos encryption and spread out of encryption data to product by microcontroller encrypting module;
There is provided the interface with product for embedded interface driver module.
CN201510066179.5A 2015-02-09 2015-02-09 Based on the high order second order logistic embedded encryption methods mapped and device Expired - Fee Related CN104579693B (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CN201510066179.5A CN104579693B (en) 2015-02-09 2015-02-09 Based on the high order second order logistic embedded encryption methods mapped and device
CN201710919542.2A CN107733642A (en) 2015-02-09 2015-02-09 Embedded encryption method based on high order second order logistic mappings
CN201710917058.6A CN107835070B (en) 2015-02-09 2015-02-09 Simple embedded encryption method
CN201710919612.4A CN107707352B (en) 2015-02-09 2015-02-09 A kind of embedded encryption method
CN201710919545.6A CN107707351A (en) 2015-02-09 2015-02-09 Embedded encryption method based on logistic mappings

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510066179.5A CN104579693B (en) 2015-02-09 2015-02-09 Based on the high order second order logistic embedded encryption methods mapped and device

Related Child Applications (4)

Application Number Title Priority Date Filing Date
CN201710919612.4A Division CN107707352B (en) 2015-02-09 2015-02-09 A kind of embedded encryption method
CN201710917058.6A Division CN107835070B (en) 2015-02-09 2015-02-09 Simple embedded encryption method
CN201710919542.2A Division CN107733642A (en) 2015-02-09 2015-02-09 Embedded encryption method based on high order second order logistic mappings
CN201710919545.6A Division CN107707351A (en) 2015-02-09 2015-02-09 Embedded encryption method based on logistic mappings

Publications (2)

Publication Number Publication Date
CN104579693A CN104579693A (en) 2015-04-29
CN104579693B true CN104579693B (en) 2017-11-03

Family

ID=53094972

Family Applications (5)

Application Number Title Priority Date Filing Date
CN201710919542.2A Pending CN107733642A (en) 2015-02-09 2015-02-09 Embedded encryption method based on high order second order logistic mappings
CN201710919612.4A Active CN107707352B (en) 2015-02-09 2015-02-09 A kind of embedded encryption method
CN201710919545.6A Pending CN107707351A (en) 2015-02-09 2015-02-09 Embedded encryption method based on logistic mappings
CN201510066179.5A Expired - Fee Related CN104579693B (en) 2015-02-09 2015-02-09 Based on the high order second order logistic embedded encryption methods mapped and device
CN201710917058.6A Active CN107835070B (en) 2015-02-09 2015-02-09 Simple embedded encryption method

Family Applications Before (3)

Application Number Title Priority Date Filing Date
CN201710919542.2A Pending CN107733642A (en) 2015-02-09 2015-02-09 Embedded encryption method based on high order second order logistic mappings
CN201710919612.4A Active CN107707352B (en) 2015-02-09 2015-02-09 A kind of embedded encryption method
CN201710919545.6A Pending CN107707351A (en) 2015-02-09 2015-02-09 Embedded encryption method based on logistic mappings

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201710917058.6A Active CN107835070B (en) 2015-02-09 2015-02-09 Simple embedded encryption method

Country Status (1)

Country Link
CN (5) CN107733642A (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110889477A (en) * 2018-08-15 2020-03-17 齐爱民 Commodity anti-counterfeiting code generation method based on block chain
CN110415075A (en) * 2019-07-11 2019-11-05 梧州市众恒商贸有限公司 One kind, which has, exempts from unifunctional merchandise system
CN110650006B (en) * 2019-09-17 2021-11-12 南通大学 Encryption and decryption method for Chinese and English character strings

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102708534A (en) * 2012-04-12 2012-10-03 江苏技术师范学院 Generating method of variable-parameter multistage chaotic pseudorandom sequence
KR20130064989A (en) * 2011-12-09 2013-06-19 연세대학교 산학협력단 Image transmission method and apparatus, and image reception method and apparatus for image tamper detection
CN104065422A (en) * 2014-07-01 2014-09-24 电子科技大学 Noise auxiliary encryption and signal recovery method of broadband access network

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6442445B1 (en) * 1999-03-19 2002-08-27 International Business Machines Corporation, User configurable multivariate time series reduction tool control method
CN100369404C (en) * 2002-01-10 2008-02-13 张红雨 Chaotic encipher series generator
US7848516B2 (en) * 2006-01-20 2010-12-07 Chiou-Haun Lee Diffused symmetric encryption/decryption method with asymmetric keys
CN101217360A (en) * 2007-12-28 2008-07-09 中南大学 A method to obtain uniform distributed pseudo random sequence in random chaos system
CN101222318B (en) * 2008-01-23 2010-08-18 黑龙江大学 Chaotic sequence generation method and sequence generator of high speed high-precision chaotic function
CN101232367B (en) * 2008-01-23 2010-06-30 黑龙江大学 Chaos encrypting and decrypting method without multiply and divide of chaos function and circuit thereof
CN101714917A (en) * 2009-08-24 2010-05-26 黑龙江大学 Chaotic key-based data encryption transmission card
CN102571330B (en) * 2012-02-01 2014-07-30 桂林电子科技大学 Method for constructing block encryption algorithm based on random function
CN103560876B (en) * 2013-11-22 2016-06-22 北京航空航天大学 A kind of encryption method using the random clock based on chaos and device
CN103716502B (en) * 2013-12-25 2017-02-01 西安理工大学 Encryption method based on iteration FrFT and chaotic single-channel color images
CN104144343B (en) * 2014-07-11 2017-06-30 东北大学 A kind of digital image compression encrypts joint coding method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130064989A (en) * 2011-12-09 2013-06-19 연세대학교 산학협력단 Image transmission method and apparatus, and image reception method and apparatus for image tamper detection
CN102708534A (en) * 2012-04-12 2012-10-03 江苏技术师范学院 Generating method of variable-parameter multistage chaotic pseudorandom sequence
CN104065422A (en) * 2014-07-01 2014-09-24 电子科技大学 Noise auxiliary encryption and signal recovery method of broadband access network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"Logistic chaotic maps for binary numbers generations";KANSO A.etc;《Solitons & Fractals》;20090531;第40卷(第5期);全文 *
"基于Logistic映射的动态密钥加密算法";陆秋琴等;《计算机安全》;20080331(第12期);全文 *
"混沌系统的变参数前后反馈加密算法";毛永毅等;《计算机工程与应用》;20120319;第47卷(第36期);全文 *

Also Published As

Publication number Publication date
CN107707351A (en) 2018-02-16
CN107835070B (en) 2020-09-04
CN107707352A (en) 2018-02-16
CN107707352B (en) 2019-07-02
CN107733642A (en) 2018-02-23
CN104579693A (en) 2015-04-29
CN107835070A (en) 2018-03-23

Similar Documents

Publication Publication Date Title
CN106411518B (en) A kind of unfixed symmetrical whitepack encryption method of key and device
CN103560880B (en) Method for generating a cipher-based message authentication code
CN104333446B (en) A kind of novel ultra-light magnitude QTL block cipher implementation method
CN108809626A (en) A kind of whitepack SM4 cryptographic algorithms scheme and system
CN104065474B (en) Novel low-resource efficient lightweight Surge block cipher implementation method
CN101814985B (en) Block cipher system using multi-chaotic mapping multi-dynamic S-box
CN110474761A (en) One kind 16 takes turns SM4-256 whitepack password implementation method
CN104579693B (en) Based on the high order second order logistic embedded encryption methods mapped and device
CN106301759A (en) A kind of method of data encryption, the method and device of deciphering
CN104751065A (en) Encryption method for geographic information product file
CN104852798A (en) Data encryption and decryption system and method thereof
CN103731822A (en) System and method for achieving ZUC
CN104486068A (en) Stream cipher algorithm SNRR based on nonlinear circulating shift register
CN104092535B (en) A kind of method for realizing DES password encryptions
CN109218008A (en) A kind of template attack method for SM4 key schedule
CN104219045B (en) RC4 stream cipher generators
CN102662483A (en) A method for cloud computing business intelligent terminal users to safely input information
CN103684748B (en) Symmetric encryption and decryption method, and symmetric encryption and decryption system
CN102135871B (en) Device for generating random number by using chaos theory and dynamic password token thereof
CN104219043B (en) A kind of key device and operation method can be preset and reconstructed
CN103051443B (en) AES (Advanced Encryption Standard) key expansion method
CN101938739B (en) Encryption method for wireless local area network
CN204376927U (en) Based on the embedded encryption device that high order second order logistic maps
CN105553647A (en) Light-weight stream cipher technology LSNR2 based on nonlinear ring shift register
CN103236923B (en) Safe encryption method for WLAN

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Liao Zhixian

Inventor after: Wu Shigui

Inventor after: Huang Guoxian

Inventor after: Tan Zuyin

Inventor after: Lei Shanli

Inventor before: Wu Shigui

Inventor before: Liao Zhixian

Inventor before: Huang Guoxian

Inventor before: Tan Zuyin

Inventor before: Lei Shanli

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201229

Address after: 541004 No.1, group 303, Lijiang Garden, No.52, Huancheng Beier Road, Qixing District, Guilin City, Guangxi Zhuang Autonomous Region

Patentee after: Guilin Lihua Electronic Technology Co.,Ltd.

Address before: 541004 No. 15 Yucai Road, Guilin, the Guangxi Zhuang Autonomous Region

Patentee before: Guangxi Normal University

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171103

Termination date: 20220209

CF01 Termination of patent right due to non-payment of annual fee