CN104579693B - Based on the high order second order logistic embedded encryption methods mapped and device - Google Patents
Based on the high order second order logistic embedded encryption methods mapped and device Download PDFInfo
- Publication number
- CN104579693B CN104579693B CN201510066179.5A CN201510066179A CN104579693B CN 104579693 B CN104579693 B CN 104579693B CN 201510066179 A CN201510066179 A CN 201510066179A CN 104579693 B CN104579693 B CN 104579693B
- Authority
- CN
- China
- Prior art keywords
- plaintext
- block
- logistic
- data
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (3)
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510066179.5A CN104579693B (en) | 2015-02-09 | 2015-02-09 | Based on the high order second order logistic embedded encryption methods mapped and device |
CN201710919542.2A CN107733642A (en) | 2015-02-09 | 2015-02-09 | Embedded encryption method based on high order second order logistic mappings |
CN201710917058.6A CN107835070B (en) | 2015-02-09 | 2015-02-09 | Simple embedded encryption method |
CN201710919612.4A CN107707352B (en) | 2015-02-09 | 2015-02-09 | A kind of embedded encryption method |
CN201710919545.6A CN107707351A (en) | 2015-02-09 | 2015-02-09 | Embedded encryption method based on logistic mappings |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510066179.5A CN104579693B (en) | 2015-02-09 | 2015-02-09 | Based on the high order second order logistic embedded encryption methods mapped and device |
Related Child Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710919612.4A Division CN107707352B (en) | 2015-02-09 | 2015-02-09 | A kind of embedded encryption method |
CN201710917058.6A Division CN107835070B (en) | 2015-02-09 | 2015-02-09 | Simple embedded encryption method |
CN201710919542.2A Division CN107733642A (en) | 2015-02-09 | 2015-02-09 | Embedded encryption method based on high order second order logistic mappings |
CN201710919545.6A Division CN107707351A (en) | 2015-02-09 | 2015-02-09 | Embedded encryption method based on logistic mappings |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104579693A CN104579693A (en) | 2015-04-29 |
CN104579693B true CN104579693B (en) | 2017-11-03 |
Family
ID=53094972
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710919542.2A Pending CN107733642A (en) | 2015-02-09 | 2015-02-09 | Embedded encryption method based on high order second order logistic mappings |
CN201710919612.4A Active CN107707352B (en) | 2015-02-09 | 2015-02-09 | A kind of embedded encryption method |
CN201710919545.6A Pending CN107707351A (en) | 2015-02-09 | 2015-02-09 | Embedded encryption method based on logistic mappings |
CN201510066179.5A Expired - Fee Related CN104579693B (en) | 2015-02-09 | 2015-02-09 | Based on the high order second order logistic embedded encryption methods mapped and device |
CN201710917058.6A Active CN107835070B (en) | 2015-02-09 | 2015-02-09 | Simple embedded encryption method |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710919542.2A Pending CN107733642A (en) | 2015-02-09 | 2015-02-09 | Embedded encryption method based on high order second order logistic mappings |
CN201710919612.4A Active CN107707352B (en) | 2015-02-09 | 2015-02-09 | A kind of embedded encryption method |
CN201710919545.6A Pending CN107707351A (en) | 2015-02-09 | 2015-02-09 | Embedded encryption method based on logistic mappings |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710917058.6A Active CN107835070B (en) | 2015-02-09 | 2015-02-09 | Simple embedded encryption method |
Country Status (1)
Country | Link |
---|---|
CN (5) | CN107733642A (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110889477A (en) * | 2018-08-15 | 2020-03-17 | 齐爱民 | Commodity anti-counterfeiting code generation method based on block chain |
CN110415075A (en) * | 2019-07-11 | 2019-11-05 | 梧州市众恒商贸有限公司 | One kind, which has, exempts from unifunctional merchandise system |
CN110650006B (en) * | 2019-09-17 | 2021-11-12 | 南通大学 | Encryption and decryption method for Chinese and English character strings |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102708534A (en) * | 2012-04-12 | 2012-10-03 | 江苏技术师范学院 | Generating method of variable-parameter multistage chaotic pseudorandom sequence |
KR20130064989A (en) * | 2011-12-09 | 2013-06-19 | 연세대학교 산학협력단 | Image transmission method and apparatus, and image reception method and apparatus for image tamper detection |
CN104065422A (en) * | 2014-07-01 | 2014-09-24 | 电子科技大学 | Noise auxiliary encryption and signal recovery method of broadband access network |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6442445B1 (en) * | 1999-03-19 | 2002-08-27 | International Business Machines Corporation, | User configurable multivariate time series reduction tool control method |
CN100369404C (en) * | 2002-01-10 | 2008-02-13 | 张红雨 | Chaotic encipher series generator |
US7848516B2 (en) * | 2006-01-20 | 2010-12-07 | Chiou-Haun Lee | Diffused symmetric encryption/decryption method with asymmetric keys |
CN101217360A (en) * | 2007-12-28 | 2008-07-09 | 中南大学 | A method to obtain uniform distributed pseudo random sequence in random chaos system |
CN101222318B (en) * | 2008-01-23 | 2010-08-18 | 黑龙江大学 | Chaotic sequence generation method and sequence generator of high speed high-precision chaotic function |
CN101232367B (en) * | 2008-01-23 | 2010-06-30 | 黑龙江大学 | Chaos encrypting and decrypting method without multiply and divide of chaos function and circuit thereof |
CN101714917A (en) * | 2009-08-24 | 2010-05-26 | 黑龙江大学 | Chaotic key-based data encryption transmission card |
CN102571330B (en) * | 2012-02-01 | 2014-07-30 | 桂林电子科技大学 | Method for constructing block encryption algorithm based on random function |
CN103560876B (en) * | 2013-11-22 | 2016-06-22 | 北京航空航天大学 | A kind of encryption method using the random clock based on chaos and device |
CN103716502B (en) * | 2013-12-25 | 2017-02-01 | 西安理工大学 | Encryption method based on iteration FrFT and chaotic single-channel color images |
CN104144343B (en) * | 2014-07-11 | 2017-06-30 | 东北大学 | A kind of digital image compression encrypts joint coding method |
-
2015
- 2015-02-09 CN CN201710919542.2A patent/CN107733642A/en active Pending
- 2015-02-09 CN CN201710919612.4A patent/CN107707352B/en active Active
- 2015-02-09 CN CN201710919545.6A patent/CN107707351A/en active Pending
- 2015-02-09 CN CN201510066179.5A patent/CN104579693B/en not_active Expired - Fee Related
- 2015-02-09 CN CN201710917058.6A patent/CN107835070B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20130064989A (en) * | 2011-12-09 | 2013-06-19 | 연세대학교 산학협력단 | Image transmission method and apparatus, and image reception method and apparatus for image tamper detection |
CN102708534A (en) * | 2012-04-12 | 2012-10-03 | 江苏技术师范学院 | Generating method of variable-parameter multistage chaotic pseudorandom sequence |
CN104065422A (en) * | 2014-07-01 | 2014-09-24 | 电子科技大学 | Noise auxiliary encryption and signal recovery method of broadband access network |
Non-Patent Citations (3)
Title |
---|
"Logistic chaotic maps for binary numbers generations";KANSO A.etc;《Solitons & Fractals》;20090531;第40卷(第5期);全文 * |
"基于Logistic映射的动态密钥加密算法";陆秋琴等;《计算机安全》;20080331(第12期);全文 * |
"混沌系统的变参数前后反馈加密算法";毛永毅等;《计算机工程与应用》;20120319;第47卷(第36期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN107707351A (en) | 2018-02-16 |
CN107835070B (en) | 2020-09-04 |
CN107707352A (en) | 2018-02-16 |
CN107707352B (en) | 2019-07-02 |
CN107733642A (en) | 2018-02-23 |
CN104579693A (en) | 2015-04-29 |
CN107835070A (en) | 2018-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106411518B (en) | A kind of unfixed symmetrical whitepack encryption method of key and device | |
CN103560880B (en) | Method for generating a cipher-based message authentication code | |
CN104333446B (en) | A kind of novel ultra-light magnitude QTL block cipher implementation method | |
CN108809626A (en) | A kind of whitepack SM4 cryptographic algorithms scheme and system | |
CN104065474B (en) | Novel low-resource efficient lightweight Surge block cipher implementation method | |
CN101814985B (en) | Block cipher system using multi-chaotic mapping multi-dynamic S-box | |
CN110474761A (en) | One kind 16 takes turns SM4-256 whitepack password implementation method | |
CN104579693B (en) | Based on the high order second order logistic embedded encryption methods mapped and device | |
CN106301759A (en) | A kind of method of data encryption, the method and device of deciphering | |
CN104751065A (en) | Encryption method for geographic information product file | |
CN104852798A (en) | Data encryption and decryption system and method thereof | |
CN103731822A (en) | System and method for achieving ZUC | |
CN104486068A (en) | Stream cipher algorithm SNRR based on nonlinear circulating shift register | |
CN104092535B (en) | A kind of method for realizing DES password encryptions | |
CN109218008A (en) | A kind of template attack method for SM4 key schedule | |
CN104219045B (en) | RC4 stream cipher generators | |
CN102662483A (en) | A method for cloud computing business intelligent terminal users to safely input information | |
CN103684748B (en) | Symmetric encryption and decryption method, and symmetric encryption and decryption system | |
CN102135871B (en) | Device for generating random number by using chaos theory and dynamic password token thereof | |
CN104219043B (en) | A kind of key device and operation method can be preset and reconstructed | |
CN103051443B (en) | AES (Advanced Encryption Standard) key expansion method | |
CN101938739B (en) | Encryption method for wireless local area network | |
CN204376927U (en) | Based on the embedded encryption device that high order second order logistic maps | |
CN105553647A (en) | Light-weight stream cipher technology LSNR2 based on nonlinear ring shift register | |
CN103236923B (en) | Safe encryption method for WLAN |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Liao Zhixian Inventor after: Wu Shigui Inventor after: Huang Guoxian Inventor after: Tan Zuyin Inventor after: Lei Shanli Inventor before: Wu Shigui Inventor before: Liao Zhixian Inventor before: Huang Guoxian Inventor before: Tan Zuyin Inventor before: Lei Shanli |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201229 Address after: 541004 No.1, group 303, Lijiang Garden, No.52, Huancheng Beier Road, Qixing District, Guilin City, Guangxi Zhuang Autonomous Region Patentee after: Guilin Lihua Electronic Technology Co.,Ltd. Address before: 541004 No. 15 Yucai Road, Guilin, the Guangxi Zhuang Autonomous Region Patentee before: Guangxi Normal University |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171103 Termination date: 20220209 |
|
CF01 | Termination of patent right due to non-payment of annual fee |