WO2008086731A1 - Procédé et système de cryptage par chiffrement continu chaotique - Google Patents

Procédé et système de cryptage par chiffrement continu chaotique Download PDF

Info

Publication number
WO2008086731A1
WO2008086731A1 PCT/CN2008/000040 CN2008000040W WO2008086731A1 WO 2008086731 A1 WO2008086731 A1 WO 2008086731A1 CN 2008000040 W CN2008000040 W CN 2008000040W WO 2008086731 A1 WO2008086731 A1 WO 2008086731A1
Authority
WO
WIPO (PCT)
Prior art keywords
chaotic
key
value
values
int
Prior art date
Application number
PCT/CN2008/000040
Other languages
English (en)
Chinese (zh)
Inventor
Shu Tak Raymond Lee
Original Assignee
Shu Tak Raymond Lee
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shu Tak Raymond Lee filed Critical Shu Tak Raymond Lee
Publication of WO2008086731A1 publication Critical patent/WO2008086731A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3

Definitions

  • the present invention relates to data processing and, more particularly, to a method and system for applying chaotic cipher stream encryption. Background technique
  • the cryptosystem encrypts the original information and decrypts the encrypted information based on mathematical principles.
  • the present invention uses a new mathematical principle, a chaotic principle.
  • the chaotic encryption method is widely used in the field of communication. It is a set of nonlinear dynamic equations controlled by one or more parameters; therefore, the chaotic state changes according to the subtle changes of the parameters and is sensitive to the initial state.
  • the chaotic systems that people can access every day include: water flowing out of taps, angry smoke in cigarettes, rising and falling stock markets, and musical melody.
  • this method can also be implemented in asymmetric encryption.
  • the chaotic cryptosystem is
  • the technical solution adopted by the present invention to solve the problems existing in the prior art is to provide a method for applying encrypted cipher stream encryption, which includes the following steps:
  • the random number generator generates a symmetric key and stores it in a memory
  • the plaintext and the virtual key are operated to obtain a ciphertext.
  • a method for applying chaotic cipher stream decryption comprising the steps of:
  • the ciphertext and the virtual key are operated to obtain plaintext.
  • a system for chaotic cipher stream encryption comprising the following means:
  • a memory for storing a symmetric key generated by the random number generating device
  • a chaotic mapping device that generates a chaotic map of symmetric key values to generate chaotic values
  • a transforming device that rounds the chaotic values and reverses partial chaotic values
  • the ciphertext encryption device is obtained by calculating the plaintext and the virtual key.
  • a system for chaotic cryptographic stream decryption comprising the following means:
  • a chaotic mapping device that performs chaotic mapping on a symmetric key value in a memory to generate a chaotic value; a conversion device that rounds the chaotic value and reverses a partial chaotic value;
  • the ciphertext and the virtual key are operated to obtain a plaintext decryption device.
  • the encryption method of the present invention is completely dependent on the initial parameters and, therefore, is more difficult to decrypt if the illegal decryptor does not know the initial parameters. Moreover, the method and system proposed by the present invention are also applicable to any field requiring encryption.
  • FIG. 1 is a block diagram of an encryption system of the present invention
  • FIG. 2 is a block diagram of the decryption system of the present invention.
  • 3 is a flow chart of applying chaotic cipher stream encryption according to the present invention.
  • FIG. 4 is a flow chart of the application of chaotic cipher stream decryption in the present invention.
  • the encryption system of the present invention includes a memory 102, a random number generating device 101 that generates and stores a symmetric key, and chaotic mapping of the generated symmetric key values to generate a chaotic value chaotic mapping device 103.
  • the conversion device 104 that chases the chaotic value and reverses the partial chaotic value, merges the chaotic value into the key generation device 105 that constitutes the virtual key, and performs the encryption operation on the plaintext and the virtual key to obtain the ciphertext encryption.
  • Device 106 is a block diagram of an encryption system of the present invention.
  • the encryption system of the present invention includes a memory 102, a random number generating device 101 that generates and stores a symmetric key, and chaotic mapping of the generated symmetric key values to generate a chaotic value chaotic mapping device 103.
  • the conversion device 104 that chases the chaotic value and reverses the partial chaotic value, merges the chaotic value into the key generation device 105 that constitutes the virtual key, and performs the encryption operation on the plaintext and the virtual key to obtain the cipher
  • the decryption system of the present invention includes a chaotic mapping device 201 that performs chaotic mapping of symmetric key values in a memory to generate chaotic values, truncating the chaotic values, and inverting partial chaotic values.
  • the converting means 202 combines the chaotic values into a key generation means 203 which constitutes a virtual key, and operates the ciphertext and the virtual key to obtain a plaintext decryption means 204.
  • Step 300 the random number generating means 101 generates a symmetric key k, which may be of variable length. In the present embodiment, a length of 32 bytes is used, and the key k stores an ASCII value of 0 to 255. storage.
  • step 305 the symmetric key k is stored in the database 102 for decryption processing.
  • step 310 the key value k is placed in the chaotic mapping device, and after the chaotic mapping is performed multiple times, a chaotic value is generated.
  • Step 315 the chaotic value is truncated by the conversion device 104 to an integer value, for example, 0.12345 is truncated to 12345, and some chaotic values are reversed by the conversion device 104, for example, 12345 is inverted to 54321.
  • Step 320 The key generation device combines all the chaotic values into a virtual key S, for example, 12345.54321, etc. to form 1234554321.... The length of the S value varies according to different symmetric keys.
  • Step 325 the plaintext P is read into the encryption device 106.
  • the plaintext P and the virtual key S perform operations multiple times, for example, an exclusive OR operation to ensure randomness of the encrypted text, where the encrypted information C is generated.
  • the key k is a symmetric key with a certain number of bytes, and each byte includes an ASCII value of 0 to 255 (hexadecimal value 00 to FF).
  • the key is used to place a logarithmic map to produce a value for future encryption/decryption processing.
  • the chaotic value (d n ) is the resulting value of the chaotic map inserted into k n .
  • is the fractional part of ⁇ , the integer part is truncated, and then the fractional part is reversed.
  • P is plaintext, that is, information before encryption.
  • C is ciphertext, that is, encrypted information.
  • a is a parameter of the logarithmic mapping, because the branching property of the logarithmic mapping multiplies the mapping period to become chaotic, so a is usually set to be greater than 3.
  • the value of X is set to 0 to 1.
  • n represents the nth repetition within the logarithmic map, the number of repetitions is variable, and is usually set to be greater than
  • logarithmic mapping available to the core of the encryption/decryption technique of the present invention, but any other type of chaotic mapping can be used in the core portion of the cryptographic technique of the present invention.
  • the reason for using logarithmic mapping here is that this equation is simple, does not require too many computational resources, but the results are complex.
  • the processing in the present invention finds a balance between the randomness of ciphertext and the speed of encryption/decryption processing.
  • the exemplary encryption source code is as follows: '
  • File encrypt_ output new File(dirname +" ⁇ " + fhame + " ef); defileOl ⁇ new FileOutputStream(encrypt_output);
  • Defile new BufferedOutputStream(defile01 );
  • Kflle ⁇ new BufferedOutputStream(kfile01 );
  • BASE64Decoder decoder new BASE64Decoder()
  • Defile new BufferedOutputStream(defile01 );
  • Load_key[n] (byte) intKeyGen[n];
  • Nsvalue nsvalue.substring(nsvalue.lastIndexOf(.")+l);
  • Nsvalue sb.reverse().toString()
  • Map— key new byte[ct]
  • Map_key[i] (byte) (255 - map_key[i]);
  • Map—key [i] map— key [i];
  • Double lm ( (double) k / 512);
  • FIG. 4 is a flow chart of decrypting information by the document reading module of the present invention.
  • the key value is placed in the chaotic mapping device 201, and after the chaotic mapping is performed multiple times, a chaotic value is generated.
  • the chaotic value is truncated by the converting means 202 to an integer value. For example, 0.12345 is truncated to 12345, and some chaotic values are reversed by the converting means 202, for example, 12345 is inverted to 54321.
  • the key generation means 203 combines all the chaotic values into a virtual key S, for example, 12345, 54321, etc. to constitute 1234554321.... The length of the S value varies according to different symmetric keys.
  • ciphertext C is read into the memory.
  • the encrypted information C and the virtual key S perform operations multiple times, for example, XOR operations to generate original information. .
  • the exemplary decryption source code is as follows:
  • Kfile new BufferedInputStream(kfileO 1 );
  • Form_key() IIOpen the input text document and create an output text document
  • Fext fext + (char) xor_opt(i, cext[i]);
  • Defile new BufferedOutputStream(defile01 );
  • Kfile new BufferedInputStream(kfileO 1 ); II reads the key from the key file
  • BASE64Decoder decoder new BASE64Decoder()
  • Fext fext + (char) xor_opt(i, cext[i]);
  • Defile new BufferedOutputStream(defile01 ); ppO;e ioExction.rntStackTirace
  • Nsvalue nsvalue. substring(nsvalue.lastIndexOf(.")+l);
  • Nsvalue sb.reverse().toString()
  • Map— key new byte[ct]
  • Map_key[i] (byte) (255 - map— key[i]);
  • Map— key [i] map_key[i];

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un procédé et un système de cryptage utilisant un chiffrement continu chaotique de cryptage. Ledit procédé comporte le cryptage par actionnement du chiffrement continu chaotique généré avec les données de texte claires et le décryptage par l'opération de XOR entre les données de texte de chiffrement et ledit chiffrement continu chaotique. Le procédé de cryptage dépend entièrement du paramètre initial, ce qui rend le décryptage plus difficilement puisque le paramètre initial n'est pas connu du décrypteur illégal.
PCT/CN2008/000040 2007-01-05 2008-01-07 Procédé et système de cryptage par chiffrement continu chaotique WO2008086731A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN 200710072919 CN101216868A (zh) 2007-01-05 2007-01-05 一种应用混沌密码流加密的方法和系统
CN200710072919.1 2007-01-05

Publications (1)

Publication Number Publication Date
WO2008086731A1 true WO2008086731A1 (fr) 2008-07-24

Family

ID=39623300

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2008/000040 WO2008086731A1 (fr) 2007-01-05 2008-01-07 Procédé et système de cryptage par chiffrement continu chaotique

Country Status (2)

Country Link
CN (1) CN101216868A (fr)
WO (1) WO2008086731A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355417B (zh) * 2008-09-10 2011-08-10 重庆大学 三阶自治混沌系统
CN102142074B (zh) * 2011-03-31 2013-04-10 东北大学 基于混沌的通用电子档案加解密方法
CN103346875B (zh) * 2013-05-08 2016-10-26 东南大学 混沌保密通信系统中数字混沌密码的产生方法

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999016208A2 (fr) * 1997-09-22 1999-04-01 Qualcomm Incorporated Methode et appareil permettant de generer des chiffrements de flux de cryptage
CN1480851A (zh) * 2002-09-04 2004-03-10 斌 杨 计算机加密装置及其加密方法

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999016208A2 (fr) * 1997-09-22 1999-04-01 Qualcomm Incorporated Methode et appareil permettant de generer des chiffrements de flux de cryptage
CN1480851A (zh) * 2002-09-04 2004-03-10 斌 杨 计算机加密装置及其加密方法

Also Published As

Publication number Publication date
CN101216868A (zh) 2008-07-09

Similar Documents

Publication Publication Date Title
Katz et al. Complete characterization of security notions for probabilistic private-key encryption
JP4575283B2 (ja) 暗号装置、復号装置、プログラム及び方法
US7190791B2 (en) Method of encryption using multi-key process to create a variable-length key
Alsaidi et al. Compression multi-level crypto stego security of texts utilizing colored email forwarding
JP2008513811A (ja) 計算変換の方法及びシステム
JP2005331656A (ja) 暗号装置、復号装置、鍵生成装置、プログラム及び方法
WO2000001111A1 (fr) Codeur/decodeur de donnees de securite
JP2002185443A (ja) 秘密鍵管理方法
Saračević et al. Encryption based on Ballot, Stack permutations and Balanced Parentheses using Catalan-keys
Jakobsson et al. Scramble all, encrypt small
Kazmirchuk et al. The Improvement of digital signature algorithm based on elliptic curve cryptography
WO2008086731A1 (fr) Procédé et système de cryptage par chiffrement continu chaotique
Lee et al. Design and evaluation of a block encryption algorithm using dynamic-key mechanism
JP2011040932A (ja) 認証付き暗号化装置、認証付き暗号化方法、検証付き復号装置、検証付き復号方法、暗号システム、プログラム、記録媒体
Chen et al. Tame transformation signatures with topsy-turvy hashes
Omerasevic et al. CryptoStego—A novel approach for creating cryptographic keys and messages
KR101076747B1 (ko) 스트림 모듈의 계층적 트리 구조를 통한 무작위 접근이 가능한 암호화/복호화 방법 및 장치
Kumar et al. BEAN: a lightweight stream cipher
JP4914377B2 (ja) 署名生成装置、署名検証装置、署名生成検証システム、それらの方法及びプログラム
Kim et al. A modified exhaustive search on a password system using SHA-1
Das Design and Comparative Analysis of Quantum Hashing Algorithms using Qiskit
JP2001509608A (ja) デジタル・データのlビットの入力ブロックをlビットの出力ブロックに暗号変換するための方法
JPH1155244A (ja) 鍵回復方法および装置
KR20020025343A (ko) 기본키와 일회용키를 이용한 파일 암호 와 복호 방법 및그 장치
Berlin et al. A novel encryption technique for securing text files

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08700600

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08700600

Country of ref document: EP

Kind code of ref document: A1