WO2008086731A1 - Procédé et système de cryptage par chiffrement continu chaotique - Google Patents
Procédé et système de cryptage par chiffrement continu chaotique Download PDFInfo
- Publication number
- WO2008086731A1 WO2008086731A1 PCT/CN2008/000040 CN2008000040W WO2008086731A1 WO 2008086731 A1 WO2008086731 A1 WO 2008086731A1 CN 2008000040 W CN2008000040 W CN 2008000040W WO 2008086731 A1 WO2008086731 A1 WO 2008086731A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- chaotic
- key
- value
- values
- int
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
Definitions
- the present invention relates to data processing and, more particularly, to a method and system for applying chaotic cipher stream encryption. Background technique
- the cryptosystem encrypts the original information and decrypts the encrypted information based on mathematical principles.
- the present invention uses a new mathematical principle, a chaotic principle.
- the chaotic encryption method is widely used in the field of communication. It is a set of nonlinear dynamic equations controlled by one or more parameters; therefore, the chaotic state changes according to the subtle changes of the parameters and is sensitive to the initial state.
- the chaotic systems that people can access every day include: water flowing out of taps, angry smoke in cigarettes, rising and falling stock markets, and musical melody.
- this method can also be implemented in asymmetric encryption.
- the chaotic cryptosystem is
- the technical solution adopted by the present invention to solve the problems existing in the prior art is to provide a method for applying encrypted cipher stream encryption, which includes the following steps:
- the random number generator generates a symmetric key and stores it in a memory
- the plaintext and the virtual key are operated to obtain a ciphertext.
- a method for applying chaotic cipher stream decryption comprising the steps of:
- the ciphertext and the virtual key are operated to obtain plaintext.
- a system for chaotic cipher stream encryption comprising the following means:
- a memory for storing a symmetric key generated by the random number generating device
- a chaotic mapping device that generates a chaotic map of symmetric key values to generate chaotic values
- a transforming device that rounds the chaotic values and reverses partial chaotic values
- the ciphertext encryption device is obtained by calculating the plaintext and the virtual key.
- a system for chaotic cryptographic stream decryption comprising the following means:
- a chaotic mapping device that performs chaotic mapping on a symmetric key value in a memory to generate a chaotic value; a conversion device that rounds the chaotic value and reverses a partial chaotic value;
- the ciphertext and the virtual key are operated to obtain a plaintext decryption device.
- the encryption method of the present invention is completely dependent on the initial parameters and, therefore, is more difficult to decrypt if the illegal decryptor does not know the initial parameters. Moreover, the method and system proposed by the present invention are also applicable to any field requiring encryption.
- FIG. 1 is a block diagram of an encryption system of the present invention
- FIG. 2 is a block diagram of the decryption system of the present invention.
- 3 is a flow chart of applying chaotic cipher stream encryption according to the present invention.
- FIG. 4 is a flow chart of the application of chaotic cipher stream decryption in the present invention.
- the encryption system of the present invention includes a memory 102, a random number generating device 101 that generates and stores a symmetric key, and chaotic mapping of the generated symmetric key values to generate a chaotic value chaotic mapping device 103.
- the conversion device 104 that chases the chaotic value and reverses the partial chaotic value, merges the chaotic value into the key generation device 105 that constitutes the virtual key, and performs the encryption operation on the plaintext and the virtual key to obtain the ciphertext encryption.
- Device 106 is a block diagram of an encryption system of the present invention.
- the encryption system of the present invention includes a memory 102, a random number generating device 101 that generates and stores a symmetric key, and chaotic mapping of the generated symmetric key values to generate a chaotic value chaotic mapping device 103.
- the conversion device 104 that chases the chaotic value and reverses the partial chaotic value, merges the chaotic value into the key generation device 105 that constitutes the virtual key, and performs the encryption operation on the plaintext and the virtual key to obtain the cipher
- the decryption system of the present invention includes a chaotic mapping device 201 that performs chaotic mapping of symmetric key values in a memory to generate chaotic values, truncating the chaotic values, and inverting partial chaotic values.
- the converting means 202 combines the chaotic values into a key generation means 203 which constitutes a virtual key, and operates the ciphertext and the virtual key to obtain a plaintext decryption means 204.
- Step 300 the random number generating means 101 generates a symmetric key k, which may be of variable length. In the present embodiment, a length of 32 bytes is used, and the key k stores an ASCII value of 0 to 255. storage.
- step 305 the symmetric key k is stored in the database 102 for decryption processing.
- step 310 the key value k is placed in the chaotic mapping device, and after the chaotic mapping is performed multiple times, a chaotic value is generated.
- Step 315 the chaotic value is truncated by the conversion device 104 to an integer value, for example, 0.12345 is truncated to 12345, and some chaotic values are reversed by the conversion device 104, for example, 12345 is inverted to 54321.
- Step 320 The key generation device combines all the chaotic values into a virtual key S, for example, 12345.54321, etc. to form 1234554321.... The length of the S value varies according to different symmetric keys.
- Step 325 the plaintext P is read into the encryption device 106.
- the plaintext P and the virtual key S perform operations multiple times, for example, an exclusive OR operation to ensure randomness of the encrypted text, where the encrypted information C is generated.
- the key k is a symmetric key with a certain number of bytes, and each byte includes an ASCII value of 0 to 255 (hexadecimal value 00 to FF).
- the key is used to place a logarithmic map to produce a value for future encryption/decryption processing.
- the chaotic value (d n ) is the resulting value of the chaotic map inserted into k n .
- ⁇ is the fractional part of ⁇ , the integer part is truncated, and then the fractional part is reversed.
- P is plaintext, that is, information before encryption.
- C is ciphertext, that is, encrypted information.
- a is a parameter of the logarithmic mapping, because the branching property of the logarithmic mapping multiplies the mapping period to become chaotic, so a is usually set to be greater than 3.
- the value of X is set to 0 to 1.
- n represents the nth repetition within the logarithmic map, the number of repetitions is variable, and is usually set to be greater than
- logarithmic mapping available to the core of the encryption/decryption technique of the present invention, but any other type of chaotic mapping can be used in the core portion of the cryptographic technique of the present invention.
- the reason for using logarithmic mapping here is that this equation is simple, does not require too many computational resources, but the results are complex.
- the processing in the present invention finds a balance between the randomness of ciphertext and the speed of encryption/decryption processing.
- the exemplary encryption source code is as follows: '
- File encrypt_ output new File(dirname +" ⁇ " + fhame + " ef); defileOl ⁇ new FileOutputStream(encrypt_output);
- Defile new BufferedOutputStream(defile01 );
- Kflle ⁇ new BufferedOutputStream(kfile01 );
- BASE64Decoder decoder new BASE64Decoder()
- Defile new BufferedOutputStream(defile01 );
- Load_key[n] (byte) intKeyGen[n];
- Nsvalue nsvalue.substring(nsvalue.lastIndexOf(.")+l);
- Nsvalue sb.reverse().toString()
- Map— key new byte[ct]
- Map_key[i] (byte) (255 - map_key[i]);
- Map—key [i] map— key [i];
- Double lm ( (double) k / 512);
- FIG. 4 is a flow chart of decrypting information by the document reading module of the present invention.
- the key value is placed in the chaotic mapping device 201, and after the chaotic mapping is performed multiple times, a chaotic value is generated.
- the chaotic value is truncated by the converting means 202 to an integer value. For example, 0.12345 is truncated to 12345, and some chaotic values are reversed by the converting means 202, for example, 12345 is inverted to 54321.
- the key generation means 203 combines all the chaotic values into a virtual key S, for example, 12345, 54321, etc. to constitute 1234554321.... The length of the S value varies according to different symmetric keys.
- ciphertext C is read into the memory.
- the encrypted information C and the virtual key S perform operations multiple times, for example, XOR operations to generate original information. .
- the exemplary decryption source code is as follows:
- Kfile new BufferedInputStream(kfileO 1 );
- Form_key() IIOpen the input text document and create an output text document
- Fext fext + (char) xor_opt(i, cext[i]);
- Defile new BufferedOutputStream(defile01 );
- Kfile new BufferedInputStream(kfileO 1 ); II reads the key from the key file
- BASE64Decoder decoder new BASE64Decoder()
- Fext fext + (char) xor_opt(i, cext[i]);
- Defile new BufferedOutputStream(defile01 ); ppO;e ioExction.rntStackTirace
- Nsvalue nsvalue. substring(nsvalue.lastIndexOf(.")+l);
- Nsvalue sb.reverse().toString()
- Map— key new byte[ct]
- Map_key[i] (byte) (255 - map— key[i]);
- Map— key [i] map_key[i];
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
L'invention concerne un procédé et un système de cryptage utilisant un chiffrement continu chaotique de cryptage. Ledit procédé comporte le cryptage par actionnement du chiffrement continu chaotique généré avec les données de texte claires et le décryptage par l'opération de XOR entre les données de texte de chiffrement et ledit chiffrement continu chaotique. Le procédé de cryptage dépend entièrement du paramètre initial, ce qui rend le décryptage plus difficilement puisque le paramètre initial n'est pas connu du décrypteur illégal.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200710072919 CN101216868A (zh) | 2007-01-05 | 2007-01-05 | 一种应用混沌密码流加密的方法和系统 |
CN200710072919.1 | 2007-01-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008086731A1 true WO2008086731A1 (fr) | 2008-07-24 |
Family
ID=39623300
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2008/000040 WO2008086731A1 (fr) | 2007-01-05 | 2008-01-07 | Procédé et système de cryptage par chiffrement continu chaotique |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101216868A (fr) |
WO (1) | WO2008086731A1 (fr) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101355417B (zh) * | 2008-09-10 | 2011-08-10 | 重庆大学 | 三阶自治混沌系统 |
CN102142074B (zh) * | 2011-03-31 | 2013-04-10 | 东北大学 | 基于混沌的通用电子档案加解密方法 |
CN103346875B (zh) * | 2013-05-08 | 2016-10-26 | 东南大学 | 混沌保密通信系统中数字混沌密码的产生方法 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999016208A2 (fr) * | 1997-09-22 | 1999-04-01 | Qualcomm Incorporated | Methode et appareil permettant de generer des chiffrements de flux de cryptage |
CN1480851A (zh) * | 2002-09-04 | 2004-03-10 | 斌 杨 | 计算机加密装置及其加密方法 |
-
2007
- 2007-01-05 CN CN 200710072919 patent/CN101216868A/zh active Pending
-
2008
- 2008-01-07 WO PCT/CN2008/000040 patent/WO2008086731A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999016208A2 (fr) * | 1997-09-22 | 1999-04-01 | Qualcomm Incorporated | Methode et appareil permettant de generer des chiffrements de flux de cryptage |
CN1480851A (zh) * | 2002-09-04 | 2004-03-10 | 斌 杨 | 计算机加密装置及其加密方法 |
Also Published As
Publication number | Publication date |
---|---|
CN101216868A (zh) | 2008-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Katz et al. | Complete characterization of security notions for probabilistic private-key encryption | |
JP4575283B2 (ja) | 暗号装置、復号装置、プログラム及び方法 | |
US7190791B2 (en) | Method of encryption using multi-key process to create a variable-length key | |
Alsaidi et al. | Compression multi-level crypto stego security of texts utilizing colored email forwarding | |
JP2008513811A (ja) | 計算変換の方法及びシステム | |
JP2005331656A (ja) | 暗号装置、復号装置、鍵生成装置、プログラム及び方法 | |
WO2000001111A1 (fr) | Codeur/decodeur de donnees de securite | |
JP2002185443A (ja) | 秘密鍵管理方法 | |
Saračević et al. | Encryption based on Ballot, Stack permutations and Balanced Parentheses using Catalan-keys | |
Jakobsson et al. | Scramble all, encrypt small | |
Kazmirchuk et al. | The Improvement of digital signature algorithm based on elliptic curve cryptography | |
WO2008086731A1 (fr) | Procédé et système de cryptage par chiffrement continu chaotique | |
Lee et al. | Design and evaluation of a block encryption algorithm using dynamic-key mechanism | |
JP2011040932A (ja) | 認証付き暗号化装置、認証付き暗号化方法、検証付き復号装置、検証付き復号方法、暗号システム、プログラム、記録媒体 | |
Chen et al. | Tame transformation signatures with topsy-turvy hashes | |
Omerasevic et al. | CryptoStego—A novel approach for creating cryptographic keys and messages | |
KR101076747B1 (ko) | 스트림 모듈의 계층적 트리 구조를 통한 무작위 접근이 가능한 암호화/복호화 방법 및 장치 | |
Kumar et al. | BEAN: a lightweight stream cipher | |
JP4914377B2 (ja) | 署名生成装置、署名検証装置、署名生成検証システム、それらの方法及びプログラム | |
Kim et al. | A modified exhaustive search on a password system using SHA-1 | |
Das | Design and Comparative Analysis of Quantum Hashing Algorithms using Qiskit | |
JP2001509608A (ja) | デジタル・データのlビットの入力ブロックをlビットの出力ブロックに暗号変換するための方法 | |
JPH1155244A (ja) | 鍵回復方法および装置 | |
KR20020025343A (ko) | 기본키와 일회용키를 이용한 파일 암호 와 복호 방법 및그 장치 | |
Berlin et al. | A novel encryption technique for securing text files |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08700600 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08700600 Country of ref document: EP Kind code of ref document: A1 |