TWI330485B - Robust hyper-chaotic encryption-decryption system and method for digital secure-communication - Google Patents

Robust hyper-chaotic encryption-decryption system and method for digital secure-communication Download PDF

Info

Publication number
TWI330485B
TWI330485B TW95141674A TW95141674A TWI330485B TW I330485 B TWI330485 B TW I330485B TW 95141674 A TW95141674 A TW 95141674A TW 95141674 A TW95141674 A TW 95141674A TW I330485 B TWI330485 B TW I330485B
Authority
TW
Taiwan
Prior art keywords
super
robust
sequence
parameter
encryption
Prior art date
Application number
TW95141674A
Other languages
Chinese (zh)
Other versions
TW200822662A (en
Inventor
Wen Wei Lin
Chung Hsi Li
Original Assignee
Wen Wei Lin
Chung Hsi Li
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wen Wei Lin, Chung Hsi Li filed Critical Wen Wei Lin
Priority to TW95141674A priority Critical patent/TWI330485B/en
Publication of TW200822662A publication Critical patent/TW200822662A/en
Application granted granted Critical
Publication of TWI330485B publication Critical patent/TWI330485B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Description

1330485 九、發明說明: ^ 【發明所屬之技術領域】 本發明係有關-種用於保密通訊之超渾洗系統與方 法,尤指-種用於數位保密通訊之強健式超渾洗加密解密之 系統與方法。1330485 IX. Description of the invention: ^ [Technical field to which the invention pertains] The present invention relates to an ultra-washing system and method for secure communication, in particular, a robust ultra-washing encryption and decryption for digital secure communication. System and method.

【先前技姻J 隨著電腦與網際網路廣泛的使用,通訊之安全性益趨重 要。然而於一般之資料數位通訊,大多數皆無加密與解密之 功能’亦即無數位保密通訊之功能。 此外’隨著渾洗科技之發展,越來越多的研究開始聚焦 鲁於由雜㈣騎產生之渾__於絲通訊之可能 性。由於非線性系統產生之渾泡執道具有無規律性、無週期 性、不可删、相當靈敏地依賴初始條件等特性,以及關於 兩個非線性系統間之渾洗同步化技術之發展,渾洗系統碟可 應用於保密通訊上。 於-渾洗保密通訊中,渾洗訊號可用作為掩蔽流來擴帶 資訊’然後藉由發送端與接收端間秋同步化性態,可將該 6 資訊回復n早先大錄對渾祕麵訊之研究主要係 針對類比訊號方面。僅有少數研究聚焦於數位訊號之保密通 訊上。 關於數位保密通訊的研究方面,雖然發現利用邏輯映射 之一渾沌系統的確可以產生具不可預測性之序列;然而,由 於人缺精準度’該系統僅具有少量之整體狀態,因此容易遭 受藉由對狀態計數之攻擊。此外,即使該纽可·左循環 函數與參數_迴路來加強縣之強度。令人舰的是,於 k擇明文之假定下,該種純仍容易遭受攻擊。另一方面, 許多研究雜於對·保密通歡攻紅,·結果顯示,該系 統將可被以輸出序财構之映射攻擊;其原因在鱗單一渾 洗系統具有其觸之映射贿,藉此料於分辨不同的渾池 系統並重建其方程式。 為解决此問題’大多數提出之研究聚焦於如何增強輸出 序列之複雜性。這些研究大致可分為三類。第-類:為使初 始訊就不可_,便科映射來產生初始訊號至-混祕射。第二類:使用數個科映射;於任何時間,使用 特疋之映射,其係依據—先前顧順序或是—使用者定義 之機制特岐,此三類 方法仍個僅有-個Lya胸v正指數之—縣統,如此仍 然侷限了渾沌動力學之複雜性。 此外’參數值之可用區域為-不連續渾_步化系统之 缺點所在。系統之渾紐態則視其參數蚊。然而令人遺憾 的是’並麵有的參數皆為錢,其巾-些參歸會導致「* 窗」’此處之「空窗」係定義為—麵性系統之料軌道於 電腦上以娜模她。鱗,咖_小,所以剩 餘的參數空間可能g於遭受蠻力計數法之攻擊。 一傳統邏輯映射L可定義為. x(W) = L(r,x⑴)=τχ⑴(卜χ⑴),叭] 其中r為-參數且〇的4。於上述之方程式,當3 57< r__4時所產生的序列係為非週期性與非收敛性的。缺而, 於3.57<9^4下造成該方程式「空窗」之參數r係為開放 且达、集。❹卜,混祕子縣分佈於㈣與丨細之間,且 】於1於此情況下,藉由測量誠好的長度,將十 分料探知r值。祕該方程式中唯—可行的情況為當㈣ 之才胃疋日幽屯吸子均句分佈於0與1的範_。由此觀 之^數值之選取係極為有限。[Previous Skills J With the widespread use of computers and the Internet, the security of communications is becoming more important. However, in the general data digital communication, most of them have no function of encryption and decryption, that is, the function of digital security communication. In addition, with the development of the washing technology, more and more research has begun to focus on the possibility of using the __ silk communication. Due to the irregularity, non-periodicity, non-removability, and sensitivity of the nonlinear system, the characteristics of the wash-synchronization technology between the two nonlinear systems, the wash system The disc can be used for secure communication. In the - wash secret communication, the wash signal can be used as a masking stream to expand the information' and then by the synchronization between the sender and the receiver, the 6 information can be returned to the previous report. The research is mainly on analog signals. Only a few studies have focused on the confidential communication of digital signals. Regarding the research on digital secure communication, although it is found that the use of one of the logical mapping chaotic systems can indeed produce a sequence with unpredictability; however, due to the lack of precision of the person's system has only a small overall state, it is vulnerable to State count attack. In addition, even the Newcomb left loop function and the parameter_loop are used to strengthen the strength of the county. It is the ship's assumption that this kind of purity is still vulnerable to attack under the assumption of K. On the other hand, many studies are mixed with the secrets of confidentiality, and the results show that the system will be attacked by the mapping of the output order; the reason is that the scale of the single wash system has its touch map bribe, borrow This is to distinguish between different battery systems and rebuild their equations. To solve this problem, most of the research proposed focuses on how to enhance the complexity of the output sequence. These studies can be broadly divided into three categories. Class--: In order to make the initial message impossible, the map is mapped to generate the initial signal to the scam. The second category: the use of several mappings; at any time, the use of special mapping, which is based on the previous order or the user-defined mechanism characteristics, these three methods are still only one - Lya chest v positive index - county system, this still limits the complexity of chaotic dynamics. In addition, the available area of the parameter value is the disadvantage of the discontinuous 浑 _ step system. The system's 浑 state is based on its parasitic mosquitoes. However, it is regrettable that the parameters of the face are all money, and the towel - some of the participation will lead to "* window". Here, the "empty window" is defined as the material track of the surface system on the computer. Namo is her. Scales, coffee _ small, so the remaining parameter space may be attacked by the brute force counting method. A conventional logic map L can be defined as . x(W) = L(r, x(1)) = τ χ (1) (divination (1)), where r is a parameter and 〇 is 4. In the above equation, the sequence generated when 3 57 < r__4 is aperiodic and non-convergent. In the absence of 3.57, the parameter r of the equation "empty window" is open and set. ❹ , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , The only thing that can be used in the equation is that when (4) is the only way to spread the sentence, the scorpion is distributed in the range of 0 and 1. The choice of the value of this view is extremely limited.

【發明内容J 、本發明之—目的在於提供用於保密通訊之—強健式超 :⑧解③系統,該线具有較大之參數空間,得以避免 蠻力禮法之攻擊,且無法運用現今運算科技重建該系統。 、本發明之另—目的在於提供用於保密通訊之-強健式 超軍尼加讀衫統’其針朗—日狀訊息,可藉由不同初 始向量之輸人而域魅列之料絲文,觀提高保密 層級。 本發明之再-目的在於提供用於保密通訊之一強健式 超渾洗加聽密m钱可產生柯全_帶映射來傳 达於公共通道之巾,觀,即使在聰日収攻擊的假設狀態 下’亦難以重建該映射。 為達到上述目的’本發明提供之強健式超軸加密解密 系、、先’其包括—發送端與—接收端。其中該發送端包括-超 渾尼訊號產生n ’其可將—败訊息攜人為超秘訊號之一 掩蔽序列中,與-發送端參數調整裝置,用於調整該超渾沌 彻虎產生n之參數’藉此該超科訊號產生料將明文訊息 與掩蔽序列轉為-超渾絲文。該蚊·由該超渾先產生 盗觀至該接收端。而該接收端包括-超科訊號同步接收 工330485 器,其用於產生為超渾沌訊號之一去掩蔽序列,且將超渾沌 在、文與去掩蔽序列轉變為一解密明文訊息;一接收端參數調 整裝置,用以調整該超渾沌訊號同步接受器之參數,使其於 接收超渾沌密文後,得以藉由與發送端之掩蔽序列達成超渾 Λ同步而產生一為超渾洗訊號之去掩蔽序列。 此外’本發明之強健式超渾沌加密解密方法,包括一加 岔與一解密過程。該加密過程包含下列步驟:首先,將明文 訊息解構至一{ρ(1)}序列,而後藉互斥或運算將該序列載入一 為超渾沌訊號之掩蔽序列中,產生一超渾沌密文;而解密過 程則包括下列步驟:於接收端接收該密文後,藉由與發送端 之掩蔽序列達成超渾、/屯同步而產生一為超渾洗訊號之去掩 蔽序列,而後藉互斥或運算將該密文轉變為解密明文訊息。 該掩蔽序列較佳依照輸入之初始向量乂⑼與參數而產生,而 該去掩蔽序列較佳依輸入之初始向量y⑼與參數而產生;藉 此,針對同一明文訊息若使用不同之初始向量,將可產生不 同的密文。而該初始向量X(〇)較佳於該發送端隨機產生,然 後被y⑼取代㈣送至雜收端,再於簡收端由χ⑼代換 之;藉此,該掩蔽序列將與該去掩蔽序列相當,而密文將得 以正確地被解密。 10 實: 【實施方式】 如第i圖所示,於—般保密通訊方案中, 號源編碼、加密、通道編碼與調變後 ::、經過訊 接收端則藉由顛倒上述步驟來 、二通道輸达。 设貝訊。而於本發明中,於 入項相對應來自於職源編碼步驟,而輸出彻相對應送: 通道編碼與調變之步驟。 μ、 =2圖卿,_本㈣之1料超料加密解密 系就括-㈣1G與—魏賴。㈣發送㈣包括 一超渾航號產生器2〇與—發送端參數調整裝置3〇。該設 置於該發送端10之超科訊號產生器20用以將一明文訊息 22載入為超軸訊號之—掩_ 24中,該賊序列㈣ 由該超渾洗訊號產生器20所產生。而該發送端參數調整裝 置3〇 __整該超執訊號產生II 2G之參數,藉此使得 該超科峨敍H 2G得⑽朗文喊22触賊序列 24轉變為-超糾密文5{)。該超科密文5()補由該超渾 地訊號產生器20由發送端10傳送至接收端6〇。而該接收端 11 1330485 60則包括一超渾屯訊號同步接收器70與一接收端參數調整 裝置80。該接收端參數調整裝置80用以調整該超渾洗訊號 同步接收斋70之參數,藉此,該超渾洗訊號同步接收器 於接收該超渾沌密文50後,得以藉與該發送端1〇之掩蔽序 列24達成超渾沌同步而產生一為超渾沌訊號之去掩蔽序列 76。此外,該超渾沌訊號同步接收器7〇亦將該超渾沌密文 5〇與該去掩蔽序列76經互斥或運算轉變為一解密明文訊息 90。 uSUMMARY OF THE INVENTION J. The present invention is directed to providing a robust super 8 solution system for secure communication, which has a large parameter space to avoid attacks by brute force etiquette and cannot use today's computing technology. Rebuild the system. Another object of the present invention is to provide a strong-type super-Niger reading shirt for secret communication, which can be used for the input of different initial vectors. , view to improve the level of confidentiality. A further object of the present invention is to provide a robust super-washing and listening secret for a secure communication, which can generate a full-band map to convey the towel in the public channel, and view even the assumption of the attack in Congri. It is also difficult to reconstruct the map in the state. In order to achieve the above object, the present invention provides a robust super-axis encryption and decryption system, which first includes a transmitting end and a receiving end. The transmitting end includes a super-sound signal generating n', which can carry the - losing message as one of the super secret signals in the masking sequence, and the - transmitting end parameter adjusting device, for adjusting the parameters of the super-discrete tiger generating n 'Through this super-signal generation material will turn the plaintext message and the masking sequence into super-silk text. The mosquito is first generated by the super stalk to the receiving end. The receiving end includes a super-synchronous signal receiving receiver 330485, which is used to generate a masking sequence for one of the hyper-chaotic signals, and converts the hyper-chaotic, text and de-masking sequences into a decrypted plaintext message; The parameter adjusting device is configured to adjust the parameter of the super-chaotic signal synchronous receiver to generate a super-wash signal by super-synchronizing with the masking sequence of the transmitting end after receiving the super-hidden ciphertext To mask the sequence. Further, the robust hyperchaotic encryption and decryption method of the present invention includes a process of adding and decrypting. The encryption process comprises the following steps: First, the plaintext message is deconstructed into a sequence of {ρ(1)}, and then the sequence is loaded into a masking sequence of the super-chaotic signal by a mutual exclusion or operation to generate a hyper-hidden ciphertext. The decryption process includes the following steps: after receiving the ciphertext at the receiving end, by performing a super/浑 synchronization with the masking sequence of the transmitting end, a de-masking sequence for the super-wash signal is generated, and then the mutex is mutually exclusive. Or the operation converts the ciphertext into a decrypted plaintext message. The masking sequence is preferably generated according to the input initial vector 乂(9) and parameters, and the demasking sequence is preferably generated according to the input initial vector y(9) and parameters; thereby, if different initial vectors are used for the same plaintext message, Can produce different ciphertexts. The initial vector X(〇) is preferably randomly generated at the transmitting end, and then replaced by y(9) (4) to the miscellaneous end, and then replaced by χ(9) at the simple receiving end; thereby, the masking sequence is to be masked The sequence is equivalent and the ciphertext will be decrypted correctly. 10 Real: [Implementation] As shown in Figure i, in the general secret communication scheme, after source coding, encryption, channel coding and modulation::, after receiving the signal, by reversing the above steps, Channel transmission. Set up Beixun. In the present invention, the entry corresponds to the source coding step, and the output corresponds to the step of channel coding and modulation. μ, =2 图卿, _ this (four) 1 material over material encryption and decryption system is included - (four) 1G and - Wei Lai. (4) The transmission (4) includes a super-track number generator 2〇 and a transmission-end parameter adjustment device 3〇. The super-signal generator 20 disposed at the transmitting end 10 is configured to load a plaintext message 22 into a mask _ 24 of the super-axis signal, and the thief sequence (4) is generated by the super-wash signal generator 20. And the transmitting end parameter adjusting device 3 __ the entire super-signal number generates the parameter of the II 2G, thereby making the super-discipline H 2G get (10) Longman shouting 22 touch thief sequence 24 into - super-corrected text 5 {). The super-Courmet 5 () complement is transmitted from the transmitting end 10 to the receiving end 6 by the super-sound signal generator 20. The receiving end 11 1330485 60 includes a super-signal synchronous receiver 70 and a receiving end parameter adjusting device 80. The receiving end parameter adjusting device 80 is configured to adjust the parameter of the super-washing signal synchronous receiving fasting 70, whereby the super-washing signal synchronous receiver can borrow the transmitting end 1 after receiving the super-hidden ciphertext 50 The masking sequence 24 of the scorpion achieves a hyperchaotic synchronization to produce a de-masking sequence 76 that is a hyper-chaotic signal. In addition, the hyper-chaotic sync receiver 7〇 also converts the hyper-hidden ciphertext 〇 and the de-masking sequence 76 into a decrypted plaintext message 90 by mutual exclusion or operation. u

此外’該強健式超渾洗加密解密系統係使用兩個強健式 超渾洗工具,其巾每-健健式料Μ具域數個強健式 邏輯映射一個攜帶映射與數個隱匿映射組成。其中該強健 式邏輯映射為-均勻分佈之映射,具有—較大之參數空間, 其使用一強健式邏輯函數定義如下: L( 7 ,x)= Ύ x(l-x) (modi) 3 x(l-x) (modi) (T/4)(modl) , lint 其中1ext ,^2= 1/2+ //4- [r/4] . , 之最大整數/ 、中[ω]為—等於或小於o 1/4- [r/4] 長式,7"值之範圍可延 根據上述該強健麵輯函數之方 1330485 伸超過4。#如)大於1時,上述之第―個方程式可將大 於1之映射轉至G〜1之範_,其帽組式單縣得使x 值不變地鋪於叫細,當續在㈣_,該映射將 會不均勻分佈’而造成該映射之「空窗」。因此,當办,X) 小於1時’上述第二個方程式可將該值按比例轉至(M範圍 内。藉由該模組式運算與比例式運算,可使該映射均勾分佈 於〇〜1範圍内。 5次7¾平他玑铌屋生写2 态20之作用係利用一第一強健式超 渾沌工具,其可定義為: x(i> = F(r,x^) χ(ί)=[χι(0} >>5In addition, the robust ultra-washing encryption and decryption system uses two robust ultra-washing tools, which consist of a number of robust logical mappings of one carrying map and several hidden mappings. Where the robust logic maps to a uniformly distributed map with a larger parameter space, which is defined using a robust logic function as follows: L(7,x)= Ύ x(lx) (modi) 3 x(lx ) (modi) (T/4)(modl) , lint where 1ext , ^2= 1/2+ //4- [r/4] . , the largest integer / , medium [ω] is - equal to or less than o 1/4- [r/4] long, 7" value range can be extended beyond 4 according to the above-mentioned robust face function function 1330485. When #如) is greater than 1, the above-mentioned equation can transfer the mapping greater than 1 to the value _ of G~1, and the cap group-type single county has to make the value of x constant in the order, and continues in (4)_, The mapping will be unevenly distributed' resulting in an "empty window" for the mapping. Therefore, when X) is less than 1, the second equation above can be scaled to (in the range of M.) By using the modular operation and the proportional operation, the mapping can be distributed to the 〇. Within a range of ~1. 5 times 73⁄4 flats, he writes 2 states 20 uses a first robust hyperchaos tool, which can be defined as: x(i> = F(r,x^) χ( ))=[χι(0} >>5

Xn(l)]T,^X(i'I)HL(r1^^ ^ 中你,X)為一強健式邏輯函數,已於上述提及,且Xn(l)]T,^X(i'I)HL(r1^^^, you, X) is a robust logic function, as mentioned above, and

CC

Cc^ cn ... Cl; c·21 Ί >1 Cn2 ... c:n 其為一正隨機齡矩陣,其中所有元素係為〇 <Cij <卜且 ^Cirlfori,j=l,..”n。 此外,該掩蔽序列24可定義nxi(i)’係由發送端 1〇之該超秘減纽H 2〇触輪从她㈣與參數所 13 1330485 產生’其中該初始向量可定義為:χ(0):=[Χι(〇),,⑼丁 ’ χη ],其 中Xi(〇) 6{(〇,1)\ {1/2}};而該參數包括—以于订列之隨機矩 陣c = [Cij],其中0< Cij<b i,W”..,n,以及—渾洗參數向 量 γ = [τί,…,rJT,其中 γθ4、 而該超渾洗訊號同步接收器70之作用係利用一第二強 健式超渾沌工具,可定義為:Cc^ cn ... Cl; c·21 Ί >1 Cn2 ... c:n It is a positive random age matrix in which all elements are 〇<Cij <Bu and ^Cirlfori,j=l, .."n. In addition, the masking sequence 24 may define nxi(i)' to be generated by the transmitting end 1〇 of the super-secret H 2〇 wheel from her (four) with the parameter 13 1330485 'where the initial vector is Defined as: χ(0):=[Χι(〇),,(9)丁' χη ], where Xi(〇) 6{(〇,1)\ {1/2}}; and the parameter includes—for order The random matrix of the columns c = [Cij], where 0 <Cij<bi, W".., n, and - wash parameter vector γ = [τί, ..., rJT, where γθ4, and the super-wash signal is synchronously received The function of the device 70 is defined by a second robust hyperchaotic tool:

yw = Gfeyd’sCZ^r,#1)),其中 /)=[γι(ί), i>o。 而該去掩蔽序列76可定義為:ί) = yi⑴,係由接收端 60之超渾洗訊號同步接收器70依照輸入之初始向量y⑼與參 數而產生。 於此需要注意的是,該第一強健式超渾沌工具與第二強 健式超渾沌工具分別屬於x(i)與y(i),且具有相同參數C和r。 此外’根據本發明之一強健式超渾屯加密解密方法則包 括一加密與一解密過程,其中該加密過程為:將明文訊息解 構至一序列,藉互斥或運算將該序列載入一為渾沌訊號之掩 蔽序列中,產生一超渾沌密文;解密過程則為:於接收端接收 該密文後,藉由與發送端之掩蔽序列達成超渾沌同步而產生 一為渾沌訊號之去掩蔽序列,藉互斥或運算將密文轉為解密 14 1330485 明文訊息。 菖該明文訊息22進入發送端10後,將被解構為一丨 序列。若將該第一強健式超渾沌工具之實數位元表示為爪, 而令每一 ρω之長度為(!,則其關係可表示為:d = m_ < 1。於此條件下,於該發送端進行之該加密程序定義為: z(0=Lx 丨(0丄, d ζ(ί)® P(i),其中©代表互斥或運算,而 Lxil·代表自X脫落最初ί數位。 而於接收端進行之該解密過程可定義為:^(〇= <, P (1)= Z⑴© ’),其中P①為—解密明文訊息。 須注意的是’該初始向量X(G)係由歸送端隨機產生, 然後由y⑼取代後傳送至該接收端,再於該接收端由X⑼代 換之;經上述步驟’ζω=ζω、i>Q。而由於該第一強健 式超渾洗工具與第二強健式超渾⑨卫具具有相同初始向 i且z -z(),疋故該密文5〇可被正確地解密,亦即, Ρ 0)=ρω。 此外,藉由於通訊中隱匿(個最重要之數位,亦即,將 這些ί個數位脫落不使用於加密中,藉此,掩蔽序列24之 ik機性可被加強。親够位元,雜文5()將越難被分析。 15 丄 …、而保密性之增加是以犧牲其運算資源為代價 ,而隱匿二 數位即可得到良好的隨機性。 /上述該第—_式超渾紅具與第4健式超渾洗工 -系由複數她合雜式麵映騎組成(々合邏輯映射之 為幻其中每一強健式邏輯映射擁有其各自之Lyapunov 正心數。為了解是否於該工具維數下其Lyapunov正指數數 疋否確^力π ’我們將利用數值法分析該強健式超渾洗工 具。當該工具具有越高之維數’其將擁有更多之Lyapunov 正‘數。藉此,輸出掩蔽糊24之性祕更趨複雜。下例 中,合強健式邏輯映射數目設為2(亦即n=2)。於此情形 —r**» ,此二耦合強健式邏輯映射具有兩參數τ1與^2。在第 Q » 圖中’兩個麵合強健式邏輯映射之兩個Lyap_指數在 至16、1/30比例以及r 2為一定值29 6668情況下繪 "°果”'頁示,富γ 1值大於或荨於4時,兩個Lyapunov 才曰數皆為正值,也就是說,該工具確實為超渾沌且無「空 囱J。同樣地,當n等於3,4及1〇時,其中在jg n 時7 1為固定值’且W之範圍為〇至16,Lyapunov指數之 數目分別顯示於第邪〜幼圖中。由此可知,#η值增大時, Lyapunov正指數之數目亦將隨之增加,且無「空窗」出現, 16 1330485 而該工具中所有值皆大於4。 以下將對於s亥強健式超渾洗加密解密系統進行密碼分 析’將以一例說明’例中其精準度為48位元,且具有兩個 輕ό強健式映射。當n=2時(n為強健式邏輯映射之數目), 該第一強健式超渾沌工具可表示為: J Xi(0 = • [x2(0 = (l-c22)L(yux^) +c22L(y2,X2^) 於此例中,有四個參數Cu、C22、γ i與γ 2,而參數可選擇 的總數目則為2' 2192個。其提供了—較大的參數空間。此 外,由於該掩蔽序列24之產生相當靈敏性地依賴參數,藉 此攻擊者將十分不易發現參數與其相對應之掩蔽序列24之 間的關連。 • 以下將以—實驗來顯示此-特性。首先,以上述第一強 健式超渾沌工具之方程式中為例。其次,選取一組C與I·參 數並乂,、為基礎來產生一基準掩蔽序列ke。然後,以變動 最>、基準7 1的重要位元來產生2〇〇個γ 1。以不同的7 1與 相同的r 2與C,產生200個掩蔽序列Sbase+1-48,其中用 …100來標示該掩蔽序列。最後,我們計算‘與u8 間的位元錯誤率。由第4圖可知,即使在一個參數2χ2_48的 17 1330485 微小改變下,產生之序列確實有所不同。 此外’攻擊者可能藉由分析-個科映射之輸出序列來 緣製映射。對該工具進行展開為—種用來計算未知來數值之 方法。仍以上述工具之絲式為例,#1外方程式有五 個未知的變數,即ri、T2,、Cii、⑶與χ2(1)。將該方程式展 開至W時,攻擊者將有人個方程絲解額外的三個變數, 即”與^。整體來說,給予之人個方程式可解該 =固未知數。然而,於強健式超渾缸具中,攻擊者將無法 靠展開法來重建映射’其顧歸功於以下兩轉色。第一, 掩蔽序列ζ“)24為第1健式超渾缸具之—不完整輸出序 列,其中最重要的〖個數位皆被脫漏,也就是說,掩蔽序列 ζ 24不等於Xl⑴。若方程式忖四個&⑴,每一個ζ⑴脱落 J位元’四個Xl⑴可能的組合為⑽。第二,於強健式邏輯 射中使用組核單運算來計算映射函數。片斷非線性映射並 非為--對一映射。-已知之L映射之輸出,其輸入可能性 為r/4 X2個。在此例中,需要解決八個[映射。可能的 組合為(χ2)8。假設r小於2,_,且舛,攻擊者 將總共需要嘴試(28)4xl,〇248次可能的方程式組合來解決具 有上述兩_之未知魏。如果細使用為1THz中央處理 18 1330485 單元之電腦’其每秒可處理,個可驗合,若用於計算上 例之組合,則需要將近一百萬年 、 禹年方可重建該苐-強健式超澤 泡工具。現今科技_無法重賴第—雜式超潭 洗工具。 而為顯示該第-強健式超渾洗工具之效能,以下將示範 其於硬體内細之軌。該工具轉之·如下所述:強健 式邏輯映射數目為二,4之實際數位表示為㈣數位, 而隱匿數位數,即d。然後,於十六進位表示(一數位為 四位凡)’該工具係以49位元運算(―位元代表—符號位 元)。一個掩蔽訊號流長度為40位元,且有兩個隱匿數位。 藉此,該明文訊息22將分割成4〇位元長的片段。 第5圖係顯示於該超渾沌訊號產生器内之該第一強健式 超渾沌工具之資料流。於此資料流中,每產生一個掩蔽序列 Z(〕’需要八次乘法運算。將49位元的x〗(i)、X2(i)、r丨、r 2、 〇11與C22輪入乘法運算中。scal與sca2分別標記兩個用於 常態化運和_因子,即 1 (Τι/4χ_1)與(7T75SHT) ° 而 V2= χαΛ-jm- [ri/4], 19 1330485 V3=m~J^ITr^_ iV4 = \/2+J^I~W^^ 分別標示四種狀況來決定是否使用-组態式運算是比例 式運算。由於7ι、72係由使用者決定、且於運算過程中保 持不變’所以心、…、叫與叫為輪入向量。 田<7?2(7?3< χ2Μ <77 4)時,scai (sca2)被選來依比例 調整映射值。否則,則乘以常數1。 第6圖為該第一強健式超渾洗工具於硬體中應用之方塊 圖。為了區域與表現效能之緣故,則使用一二級管線流通乘 法器。因此,需要八回合來產生一個掩蔽序列。除了該49 位7〇的二級乘法器,本祕更有兩細於暫存龍的仰位 元之暫存器,即「暫存器A」與「暫存器β」,以及四個加減 器。方塊「圆」用來計#NEG(x)=1_x,而方塊「㈣㈣」 用來檢查該輸入是祕Iint範圍中。回路以齋邮形式安 置且經TSMC . 13um程序合成。第7圖為該模擬結果。於本 不範中,錢雜網路連線表之準顯,該第一強健式超渾 沌工具之加密速率可達每秒5〇〇千位元。 當n-2時’該第-強健式超渾洗工具將使用以下參數值 來示範: 20 1330485 xi(0)= 0.26e7bf70710c χ2 ⑼=0.3cebe4e04ecb Τι = 15.000000000 7 2 = 23.0000000000Yw = Gfeyd’sCZ^r, #1)), where /)=[γι(ί), i>o. The demasking sequence 76 can be defined as: ί) = yi(1), which is generated by the super-washed sync receiver 70 of the receiving end 60 in accordance with the input initial vector y(9) and parameters. It should be noted here that the first robust hyperchaos tool and the second robust hyperchaos tool belong to x(i) and y(i), respectively, and have the same parameters C and r. In addition, the robust encryption and decryption method according to the present invention includes an encryption and a decryption process, wherein the encryption process is: deconstructing the plaintext message into a sequence, and loading the sequence into a sequence by mutual exclusion or operation. In the masking sequence of the chaotic signal, a hyper-hidden ciphertext is generated; the decryption process is: after receiving the ciphertext at the receiving end, generating a chaotic sequence of chaotic signals by achieving superchaotic synchronization with the masking sequence of the transmitting end. The ciphertext is converted to the decrypted 14 1330485 plaintext message by mutual exclusion or operation. After the plaintext message 22 enters the transmitting end 10, it will be deconstructed into a sequence. If the real digit of the first robust hyperchaotic tool is represented as a claw, and the length of each ρω is (!, the relationship can be expressed as: d = m_ < 1. Under this condition, The encryption procedure performed by the sender is defined as: z(0=Lx 丨(0丄, d ζ(ί)® P(i), where © stands for mutual exclusion or operation, and Lxil· represents the first ί digit from X. The decryption process performed at the receiving end can be defined as: ^(〇= <, P (1)= Z(1)© '), where P1 is - decrypt the plaintext message. It should be noted that the initial vector X(G) It is randomly generated by the returning end, then replaced by y(9) and transmitted to the receiving end, and then replaced by X(9) at the receiving end; after the above steps 'ζω=ζω, i>Q. And because of the first strong super The washing tool has the same initial direction i and z - z() as the second strong type of super-guard, so that the ciphertext 5 〇 can be correctly decrypted, that is, Ρ 0)=ρω. Due to the concealment in communication (the most important digit, that is, the dropping of these digits is not used in encryption, the ik function of the masking sequence 24 can be enhanced. The more difficult it is, the more difficult it is for essay 5() to be analyzed. 15 丄..., and the increase in confidentiality is at the expense of its computing resources, and the hidden two digits can get good randomness. The super-red 浑 浑 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 - - - - - - - - - - - - - - - - - - - - - - - - - - In order to know whether the Lyapunov positive exponent number is φ in the tool dimension, we will use the numerical method to analyze the robust super-washing tool. When the tool has a higher dimension, it will have more The Lyapunov positive 'number. By this, the secret of the output masking paste 24 is more complicated. In the following example, the number of strong logical mappings is set to 2 (that is, n=2). In this case -r**», This two-coupling robust logical mapping has two parameters τ1 and ^2. In the Q» diagram, the two Lyap_ exponents of the two-faced robust logical mapping are at a ratio of 16, 1/30, and r 2 is a certain value. 29 6668 case painted " ° fruit" 'page shows that the rich γ 1 value is greater than or 荨 at 4, two Lyapunov 曰Both are positive, that is, the tool is indeed hyperchaotic and has no "empty J. Similarly, when n is equal to 3, 4, and 1〇, where 7 is a fixed value at jg n' and W The range is from 〇 to 16, and the number of Lyapunov exponents is shown in the first evil ~ young map. It can be seen that when the #η value increases, the number of Lyapunov positive indices will also increase, and there is no "empty window". 16 1330485 and all the values in the tool are greater than 4. The following will perform cryptanalysis for the s-heeling-type ultra-washing encryption and decryption system, which will be described as an example. The accuracy is 48 bits and has two shackles. Robust mapping. When n=2 (n is the number of robust logical maps), the first robust hyperchaotic tool can be expressed as: J Xi(0 = • [x2(0 = (l-c22)L(yux^) + c22L(y2, X2^) In this example, there are four parameters Cu, C22, γ i and γ 2, and the total number of parameters selectable is 2' 2192. This provides - a large parameter space. Moreover, since the generation of the masking sequence 24 is relatively sensitive to parameters, the attacker will be very difficult to find the correlation between the parameter and its corresponding masking sequence 24. • This will be shown as an experiment. Taking the equation of the first robust hyperchaotic tool mentioned above as an example. Secondly, a set of C and I parameters are selected, and a reference masking sequence ke is generated based on the basis. Then, the most variable > The important bits of 1 produce 2 γ γ 1. With different 7-1 and the same r 2 and C, 200 masking sequences Sbase+1-48 are generated, where the masking sequence is marked with ... 100. Finally, We calculate the bit error rate between ' and u8. As can be seen from Figure 4, even a small change in 17 1330485 for a parameter 2χ2_48 In the following, the generated sequence does differ. In addition, the attacker may determine the mapping by analyzing the output sequence of the branch mapping. The tool is expanded into a method for calculating the unknown value. For example, the tool wire type has five unknown variables, namely ri, T2, Cii, (3) and χ2(1). When the equation is expanded to W, the attacker will have an extra solution. The three variables, namely "and ^. On the whole, the equation given to the person can solve the = solid unknown. However, in the robust super-cylinder, the attacker will not be able to reconstruct the mapping by the expansion method" Thanks to the following two color changes. First, the masking sequence ζ ") 24 is the first healthy type of ultra-cylinder - incomplete output sequence, the most important of which are all missing, that is, the masking sequence ζ 24 is not equal to Xl(1). If the equation 忖 four &(1), each ζ(1) falls off the J-bit 'four Xl(1) possible combinations are (10). Second, the kernel-single operation is used to calculate the mapping function in the robust logic shot. Fragment nonlinear mapping is not --- one Map.- The output of the known L map has an input probability of r/4 X2. In this case, eight [maps are needed. The possible combinations are (χ2) 8. Let r be less than 2, _, and Hey, the attacker will need a total of (28) 4xl, 248 possible combinations of equations to solve the unknown Wei with the above two. If you use a computer that processes the 18 1330485 unit for 1THz, it can handle it every second. If it is used to calculate the combination of the above example, it will take nearly one million years and the next year to rebuild the 苐-strong super-bubble tool. Today's technology _ can not rely on the first - miscellaneous super pool wash tools. In order to show the performance of the first-strong super-washing tool, the following will demonstrate the fine track in the hard body. The tool goes as follows: The number of robust logical maps is two, the actual digits of 4 are represented as (four) digits, and the hidden digits, ie d. Then, it is expressed in hexadecimal (one digit is four digits). The tool is operated by 49 bits ("bit represents - symbol bit"). A masked signal stream is 40 bits long and has two hidden digits. Thereby, the plaintext message 22 will be segmented into segments of 4 bits long. Figure 5 is a data flow of the first robust hyperchaotic tool shown in the hypertext signal generator. In this data stream, each time a masking sequence Z(]' is generated, eight multiplication operations are required. The 49-bit x (i), X2(i), r丨, r 2, 〇11, and C22 are rounded and multiplied. In the operation, scal and sca2 respectively mark two for normalization and _factor, namely 1 (Τι/4χ_1) and (7T75SHT) ° and V2= χαΛ-jm- [ri/4], 19 1330485 V3=m~ J^ITr^_ iV4 = \/2+J^I~W^^ Indicates four conditions to determine whether to use - the configuration operation is a proportional operation. Since 7ι, 72 are determined by the user and are operated The process remains the same 'so the heart, ..., call and call the wheel vector. Field <7?2 (7?3< χ2Μ <77 4), scai (sca2) is selected to adjust the mapped value proportionally Otherwise, multiply by the constant 1. Figure 6 is a block diagram of the first robust super-washing tool applied to the hardware. For the sake of region and performance, a one-stage pipeline flow multiplier is used. It takes eight rounds to generate a masking sequence. In addition to the 49-bit 7-inch second-order multiplier, this secret has two more scratchpads that are more detailed than the temporary bit of the temporary dragon, namely "scratchpad A" and " Register And four adders and subtractors. The square "circle" is used to count #NEG(x)=1_x, and the square "(four)(four)" is used to check that the input is in the secret Iint range. The loop is placed in the form of a fast post and passed through TSMC. 13um The program is synthesized. Figure 7 shows the simulation results. In this non-paradigm, the Qianchao network connection table is accurate, and the encryption rate of the first robust hyper-chaotic tool can reach 5〇〇 per thousand per second. When n-2, the first-strong super-washing tool will use the following parameter values to demonstrate: 20 1330485 xi(0)= 0.26e7bf70710c χ2 (9)=0.3cebe4e04ecb Τι = 15.000000000 7 2 = 23.0000000000

cu = O.feOOOOOOOOOO c22 = O.faOOOOOOOOOO 苐8圖為明文訊息「The Digital Encryption」之加密 結果。該明文訊息以Ascii碼格式編碼,然後資料序列藉由 掩蔽序列加密,該掩蔽序列由該第一強健式超渾沌工具依照 上述參數值所產生。結果亦顯示接收端可藉上述參數回復明 文0 依上述所揭示之說明與圖式,本發明顯可達到預 期之目的,即本發明可提供較大之參數空間,可針對同一 明文訊息,藉由不同初始向量之輸入而相應產生不同之超渾 洗密文,並可產生不完全的攜帶映射·於公共通道之中, 藉此達到高保密層級。 【圖式簡單說明】 第1圖係為—般保密通訊方案之方塊圖。 第2圖係為根據本發明之—強健式超科加密解密系統之方 塊圖。 第3A至3D圖係為以數值法分析根據本制之—強健式超渾 21 1330485 ί屯工具之結果,圖中係顯示Lyapunov指數vs. /、 n=2,3,4,10。 弟4圖係為一貝驗中Sbase與Sbase—i^48間位元錯誤率之結果, 其顯示本發明之一特性:一掩蔽序列將靈敏地依照輸 入參數而產生。 第五圖係為根據本發明之一超渾沌訊號產生器所使用之一 弟強健式超渾洗工具之資料流示範。 第六圖係為根據本發明之該超渾沌訊號產生器所使用之該 第一強健式超渾沌工具於硬體示範之方塊圖。 第七圖係為根據本發明之該第一強健式超渾沌工具示範之 模擬結果表格,其中該第一強健式超軍洗工具之強健 式邏輯映射數目為二。 第八圖係為示範該第-強健式超渾洗工具之—加密系統之 加密範例表,其中該第-強健式超渾洗工具之強健式 邏輯映射數目為二。 22 1330485Cu = O.feOOOOOOOOOO c22 = O.faOOOOOOOOOO 苐8 The picture shows the encrypted result of the plaintext message "The Digital Encryption". The plaintext message is encoded in the Ascii code format, and then the data sequence is encrypted by a masking sequence generated by the first robust hyperchaotic tool in accordance with the parameter values. The result also shows that the receiving end can reply to the plaintext by the above parameters. According to the above description and the schema, the present invention can achieve the intended purpose, that is, the present invention can provide a larger parameter space, and can be used for the same plaintext message. The input of different initial vectors correspondingly generates different super-wash ciphertexts, and may generate incomplete carrying maps in the common channel, thereby achieving a high security level. [Simple description of the diagram] Figure 1 is a block diagram of a general secure communication scheme. Figure 2 is a block diagram of a robust hyper-cryptographic decryption system in accordance with the present invention. The 3A to 3D graphs are numerically analyzed based on the results of the robust-type 21 1330485 ί屯 tool, which shows the Lyapunov exponent vs. /, n=2, 3, 4, 10. Figure 4 is the result of a bit error rate between Sbase and Sbase-i^48 in a beta test, which shows one of the features of the present invention: a masking sequence will be generated sensitively according to the input parameters. The fifth figure is a data flow demonstration of one of the powerful super-washing tools used in the ultra-chaotic signal generator according to the present invention. The sixth figure is a block diagram of the first robust hyperchaotic tool used in the hard demonstration signal generator according to the present invention. The seventh figure is a simulation result table of the first robust hyperchaotic tool demonstration according to the present invention, wherein the number of strong logical maps of the first robust super military washing tool is two. The eighth figure is an example of an encryption example of the encryption system of the first-strong hyper-washing tool, wherein the number of robust logical mappings of the first-strong hyper-washing tool is two. 22 1330485

【主要元件符號說明】 發送端10 明文訊息22 發送端參數調整裝置30 接收端60 去掩蔽序列76 解密明文訊息90 超渾洗訊號產生器20 掩蔽序列24 超渾沌密文50 超渾沌訊號同步接收器70 接收端參數調整裝置80[Main component symbol description] Transmitter 10 plaintext message 22 Transmitter parameter adjustment device 30 Receiver 60 Demasking sequence 76 Decrypted plaintext message 90 Super scrubbing signal generator 20 Masking sequence 24 Chaos ciphertext 50 Super chaotic signal synchronous receiver 70 receiving end parameter adjustment device 80

23twenty three

Claims (1)

1330485 ,%年斗月Mf日修正本 十、申請專利範圍: I —_於保賴訊之_式超執加轉料統,可將 資料以保密方式自一發送端傳送至一接收端,包括:1330485,% of the year of the Mf date revision of the tenth, the scope of application for patents: I - _ _ _ _ _ _ _ _ super-transfer system, the data can be transmitted from a sender to a receiver in a confidential manner, including: -超渾洗訊號產生ϋ,設置於該發送翻,用於將一明 文訊息載入為超渾沌訊號之一掩蔽序列中;該超渾 沌訊號產生器之運作係利用一第一強健式超渾沌 工具;該第一強健式超渾沌工具係包括複數個耦合 強健式邏輯映射、一攜帶映射與數個隱匿映射,且 可定義為: χ1 二 F(r,xw)):= 其中 χω=[Χι(〇, . .,,丁 ^x(i-V[L(r ι,χ/^ν .-L(rn,^^ 強健式邏輯函數,其可定義為:- a super-wash signal generation, set in the transmission flip, for loading a plaintext message into a masking sequence of one of the hyper-chaotic signals; the operation of the hyper-chaotic signal generator utilizes a first robust hyper-chaos tool The first robust hyperchaotic tool system includes a plurality of coupled robust logical maps, a carry map and a plurality of occult maps, and can be defined as: χ1 2 F(r, xw):: where χω=[Χι( 〇, . . , ,丁^x(iV[L(r ι,χ/^ν .-L(rn,^^ robust logic function, which can be defined as: L(r,x)= rx〇x)(m〇dl),X e iext ’ ^ x(l-x) (modi) ^ (7/4) (modi) ,x e lint 其中 lext e 77 2], ^1=1/2- l/4-ll^I,77 2=1/2+/^17^ / T f ~f 而其 中[叫為小於或等於ω之最大整數,而L(r,x)= rx〇x)(m〇dl),X e iext ' ^ x(lx) (modi) ^ (7/4) (modi) ,xe lint where lext e 77 2], ^1 =1/2- l/4-ll^I,77 2=1/2+/^17^ / T f ~f where [[called as the largest integer less than or equal to ω, and c;!忠…g,其為一正隨機_合矩陣,其中 • ·* ·· · ··♦ ^nl Cn2 … 24 丄330485 以及for i,j= L ,n;該 x(_ = L (7,χω);而由超渾沌 。孔號產生态產生之該掩蔽序列用以加密明文訊息且可定義 為:ζ⑴=Xl⑴; 一發送端參數調整裝置,設置於該發送端内,用於調整c;! loyal...g, which is a positive random_combined matrix, where • ·* ·····♦ ^nl Cn2 ... 24 丄330485 and for i,j= L ,n; the x(_ = L ( 7, χ ω); and the masking sequence generated by the hyperchaos. hole number generating state is used to encrypt the plaintext message and can be defined as: ζ(1)=Xl(1); a transmitting end parameter adjusting device is disposed in the transmitting end for adjusting 該超渾沌訊號產生器之參數,使其得以將該明文訊 息與該掩蔽序列經互斥或運算轉變為一超渾沌密 文; 一超渾沌訊號同步接收器,設置於該接收端内,用於產 生為超渾沌訊號之一去掩蔽序列,且將該超渾沌密 文與該去掩蔽序列轉變為一解密明文訊息;The parameter of the hypertext signal generator is such that the plaintext message and the masking sequence are mutually exclusive or converted into a hyper-hidden ciphertext; a super-chaotic signal synchronizing receiver is disposed in the receiving end for Generating a sequence of super-chaotic signals to mask the sequence, and converting the hyper-hidden ciphertext and the de-masking sequence into a decrypted plaintext message; 所有元素均為0 < Cij < 1 強健式邏輯映射定義為: 接收鸲參數調整裝置,設置於該接收端内,用以調整 該超渾洗訊號同步接收器之參數,使其於接收超渾 沌密文後’得以藉由與發送端之掩蔽序列達成超渾 沌同步而產生為渾沌訊號之去掩蔽序列。 2.如申請專繼群丨項所狀用於保密通歡強健式超 渾先加密解密系統’其中設置於接收端之該超渾洗訊號同 步接收器之運作係利用一第二強健式超渾缸具,其包括 複數個輕合驗式魏映射、—攜帶崎與數個隱匿映 25 射 3·如申請利麵第2項所狀略_通訊之強健式超 渾洗加密解齡統’其中當參數…,該第-強健式超渾洗 工具之Lyap·正指數數目隨著雜—_式超渾洗工具 使用之強健式超渾沌映射數目增加而增加。All elements are 0 < Cij < 1 robust logical mapping is defined as: Receive 鸲 parameter adjustment device, set in the receiving end, used to adjust the parameters of the super-washed signal synchronous receiver to make it super-received After the hacking ciphertext, it is possible to generate a chaotic sequence for the chaotic signal by achieving superchaotic synchronization with the masking sequence of the transmitting end. 2. If the application for the exclusive group item is used for the security, the sturdy and super-precise encryption and decryption system, the operation of the super-washed-signal synchronous receiver set at the receiving end utilizes a second strong type Cylinders, which include a plurality of light-combined Wei mappings, - carrying Nasaki and several hidden images 25 shots 3. If you apply for the second item of the noodles, _ Communication's robust super-washing encryption solution When the parameter..., the number of Lyap·positive indices of the first-strong super-washing tool increases as the number of robust hyperchaotic maps used by the hybrid-type super-washing tool increases. 4.如申請專利細第2項所述之用雜密通訊之強健式超 渾洗加練m其巾該第二強健式超軸卫具可定義 y(i) = G(r,严)):=叫,)),其中内 i>o;而 由該超科訊朗步接收H產生之該去賊序朋以將密 文轉變為解密明文訊息且可定義為= y丨①。 5. 如申請專利細第丨獅述之麟絲通敵強健式超 渾A加⑥解③、系統’其巾參數包括—n行n列之隨機矩陣 c [叫]’其中0<Cij<l fori,j=i,...,n,以及—渾洗參數向量『 [γι,...,Ύη],其中 7i2 4f〇ri=l,...,n。 6. 如申請專利範圍第1項所述之用於保密通訊之強健式超 渾洗加密解密系統,其中當參數γ24,該第二強健式超渾泡 工具之Lyapunov正指數數目隨著該第二強健式超渾沌工具 26 使用之強健式超渾丨屯映射數目增加而增加。 申明專利範圍第1項所述之帛於保密通訊之強健式超 渾洗加密解⑽道,其愤魏端齡該超渾賊號產生器 傳送該超渾沌密文至該接收端。 8. -種胁絲通訊之_式超科加密職方法,可將資 料以保密方式自-發送端傳送至—接收端,包括: 加铯過私,於該發送端進行,包含以下步驟:將一明 文訊息解構為一{p(i)}序列,依輸入之初始向量x(0) 與參數產生-為超渾沌訊號之掩蔽序列,藉互斥或 運异將該{p(1)}序列載入該掩蔽序列中,而產生一超 渾泡密文;以及 解岔過私,於該接收端進行,包含以下步驟:依輸入 之初始向量y⑼與參數產生一為超渾沌訊號之去掩 蔽序列,其與發送端之掩蔽序列達成超渾沌同步, 藉該密文與該去掩蔽序列之互斥或運算而將該密 文轉變為一解密明文訊息; 其中,該初始向量X⑼係由該發送端隨機產生,然後由y ⑼取代後傳送至該接收端,再於該接收端由x⑼代 換之,前述參數則係包括一 n行n列之隨機矩陣C = 27 1330485 N ’ 其中 0<Cij<l fori,j=l,...,n,以及一渾洗參數 向量 Γ=[γι,.",γη]τ,其中 Yi2 4fori=i,.,n。 9.如申請專利範圍第8項所述之用於保密通訊之強健式超 渾洗加密解密方法,其中當一第一強健式超渾先工具之實數 以m表示,每一 P(i)之長度為d數位,其關係為: d = πΝ,f。沿!;而於上述條件下,該於發送端進行 之加密過程可定義為: z ) =L Xi(1)」^,c(1) = z(1) © p(i), 其+ ®代表互斥或運算,U丄代表自x脫落最仏數 位。 讥如申請專利範圍第9項所述之用於保密通訊之強健式超 軍洗加密觸方法,於其中所述條件τ,該於接收端進行之 解密過程可定義為:> =L yi①」;, p(i)= ζ〜(ί)®π其中“為-解密明文訊息。 U·如申請專利範圍第8項所述之用於保密通訊之強健式超 渾泡加密職雜’該料簡由—解_難生器傳送 該超渾沌密文至該接收端。 284. As described in the second paragraph of the patent application, the robust super-washing and cleaning of the miscellaneous communication is the second strong-type super-axis. The y(i) = G(r, strict) can be defined. :=,,)), where i>o; and the thief-ordered person who receives the H generated by the super-technical step to convert the ciphertext into a decrypted plaintext message and can be defined as = y丨1. 5. If you apply for a patent 丨 丨 丨 之 通 通 通 通 强 强 强 强 强 强 强 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 Fori, j=i,...,n, and —washing parameter vector 『[γι,...,Ύη], where 7i2 4f〇ri=l,...,n. 6. The robust ultra-washing encryption and decryption system for secure communication as described in claim 1, wherein when the parameter γ24, the number of Lyapunov positive indices of the second robust super-bubble tool follows the second The robust hyper-chaos tool 26 uses an increase in the number of robust super-maps. It is stated in the first paragraph of the patent scope that is based on the robust over-the-counter encryption solution (10) of the confidential communication, and its anger Wei Duanling, the super thief horn generator, transmits the super hacked ciphertext to the receiving end. 8. - The method of tying the silk communication, the method of transmitting the data from the sender to the receiver in a confidential manner, including: A plaintext message is deconstructed into a {p(i)} sequence, which is generated according to the input initial vector x(0) and the parameter--a masked sequence of the hyper-chaotic signal, and the {p(1)} sequence is mutually exclusive or different. Loading the masking sequence to generate a super-bubble ciphertext; and de-blending, at the receiving end, comprising the steps of: generating a de-masking sequence of the super-chaotic signal according to the input initial vector y(9) and the parameter And achieving a hyperchaotic synchronization with the masking sequence of the transmitting end, and converting the ciphertext into a decrypted plaintext message by the mutual exclusion or operation of the ciphertext and the demasking sequence; wherein the initial vector X(9) is from the transmitting end Randomly generated, then replaced by y (9) and then transmitted to the receiving end, and then replaced by x (9) at the receiving end, the foregoing parameters include a random matrix of n rows and n columns C = 27 1330485 N 'where 0 < Cij < l fori, j=l,...,n, and a glimpse Wash the parameter vector Γ=[γι,.",γη]τ, where Yi2 4fori=i,.,n. 9. The robust ultra-wash encryption and decryption method for secure communication as described in claim 8 wherein the real number of a first robust super-predator tool is expressed in m, and each P(i) The length is d digits, and the relationship is: d = πΝ, f. along! Under the above conditions, the encryption process performed at the transmitting end can be defined as: z) =L Xi(1)"^,c(1) = z(1) © p(i), where + ® represents each other斥 or operation, U 丄 represents the most digits from x. For example, in the method of claim 9, the robust over-the-wash encryption method for secure communication, in which the condition τ, the decryption process performed at the receiving end can be defined as: > =L yi1" ;, p(i)= ζ~(ί)®π where “for-decrypt plaintext messages. U·For example, the robust super-bubble encryption used for secure communication as described in item 8 of the patent application scope” The super-hidden ciphertext is transmitted to the receiving end by the solution_hardware.
TW95141674A 2006-11-10 2006-11-10 Robust hyper-chaotic encryption-decryption system and method for digital secure-communication TWI330485B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW95141674A TWI330485B (en) 2006-11-10 2006-11-10 Robust hyper-chaotic encryption-decryption system and method for digital secure-communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW95141674A TWI330485B (en) 2006-11-10 2006-11-10 Robust hyper-chaotic encryption-decryption system and method for digital secure-communication

Publications (2)

Publication Number Publication Date
TW200822662A TW200822662A (en) 2008-05-16
TWI330485B true TWI330485B (en) 2010-09-11

Family

ID=44770818

Family Applications (1)

Application Number Title Priority Date Filing Date
TW95141674A TWI330485B (en) 2006-11-10 2006-11-10 Robust hyper-chaotic encryption-decryption system and method for digital secure-communication

Country Status (1)

Country Link
TW (1) TWI330485B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI552563B (en) * 2014-01-13 2016-10-01 林文偉 Encryption and decryption system and method using chaotic mapping with spatial-temporal perturbation

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI410103B (en) * 2008-06-25 2013-09-21 Univ Shu Te Chaos Communication Confidentiality System and Its Data Transmission Method and Proportional Integral Control Module Design Method
TWI455556B (en) * 2011-08-05 2014-10-01 Univ Shu Te Secure Communication System and Method for Estimating Nonlinear Signal Capability
TWI571092B (en) * 2015-09-04 2017-02-11 崑山科技大學 Encryption system for safe transmission of network data with adaptive synchronization of hyperchaotic signals free from external interference and parameter disturbance, and method for the same

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI552563B (en) * 2014-01-13 2016-10-01 林文偉 Encryption and decryption system and method using chaotic mapping with spatial-temporal perturbation

Also Published As

Publication number Publication date
TW200822662A (en) 2008-05-16

Similar Documents

Publication Publication Date Title
Kumar et al. Development of modified AES algorithm for data security
EP2089794B1 (en) A method of generating arbitrary numbers given a seed
CN107196763A (en) SM2 algorithms collaboration signature and decryption method, device and system
JP4052480B2 (en) Pseudorandom number generation method, pseudorandom number generator, and pseudorandom number generation program
CN106941407B (en) Method and device for dynamically encrypting platform data
Kanso Self-shrinking chaotic stream ciphers
JP2002314534A (en) Non-deterministic mixture generator stream encryption system
Aljohani et al. Performance analysis of cryptographic pseudorandom number generators
JP2008513811A (en) Calculation conversion method and system
CN107147486A (en) A kind of platform data encryption method and device based on dynamic variable length code
TWI330485B (en) Robust hyper-chaotic encryption-decryption system and method for digital secure-communication
US6404888B1 (en) Confusion data generator
El Hennawy et al. LEA: link encryption algorithm proposed stream cipher algorithm
Deepthi et al. Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions
CN107124273A (en) A kind of platform data encryption method and device based on dynamic authorization code
JP4857230B2 (en) Pseudorandom number generator and encryption processing device using the same
Kumar et al. Lightweight stream cipher for health care IoT
Bringer et al. On physical obfuscation of cryptographic algorithms
Alli et al. Three Tier Framework Iris Authentication for Secure Image Storage and Communication
Younes et al. CeTrivium: A Stream Cipher Based on Cellular Automata for Securing Real-TimeMultimedia Transmission.
Ramakrishnan et al. Wireless security protocol using a low cost pseudo random number generator
Akhila et al. Implementation of Modified Dual-Coupled Linear Congruential Generator in Data Encryption Standard Algorithm
Seguinard et al. Experimental certification of more than one bit of quantum randomness in the two inputs and two outputs scenario
Salman et al. Smart cloud security using hybrid encryption algorithms with 4-d chaotic key
RU2706463C1 (en) Method of encoding information in computer networks using variable pin code, sets of random numbers and functional transformations, carried out synchronously for transmitting and receiving sides