Embedded encryption method based on high-order second-order logistic mapping and embedded encryption device based on high-order second-order logistic mapping

An encryption method and encryption device technology, applied in the field of information security, can solve problems such as inability to secure information transmission, key changes at any time, and reduced reliability, so as to achieve the effect of improving security

Inactive Publication Date: 2015-04-29
桂林利华电子科技有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these complex logistic map encryption methods, although more iterations can guarantee information security to a certain extent, but when implementing information transmission, the key cannot be changed at any time, the reliability is reduced, and the information security is still not achieved. The effect of transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded encryption method based on high-order second-order logistic mapping and embedded encryption device based on high-order second-order logistic mapping
  • Embedded encryption method based on high-order second-order logistic mapping and embedded encryption device based on high-order second-order logistic mapping
  • Embedded encryption method based on high-order second-order logistic mapping and embedded encryption device based on high-order second-order logistic mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] An embedded encryption method based on a high-order second-order logistic map, such as figure 1 shown, including the following steps:

[0030] Step 1, select a logistic map as the generation method of the subkey series:

[0031] x n + 1 [ 1 - 4 u ( x n a - x n b ) ] [ 1 - 4 u ( x n - 1 a - 1 - x n - 1 b ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an embedded encryption method based on high-order second-order logistic mapping and an embedded encryption device based on the high-order second-order logistic mapping. A power supply source module provides a power supply for various modules of the device; a data AD sampling module samples input data to be enciphered to provide an initial value changed with a plaintext for a key driving module; the key driving module receives the sampled data of the data AD sampling module, generates a key changed with the sampled data and transmits the key to a microcontroller encryption module; the microcontroller encryption module chaotically enciphers the data to be enciphered and the key and transmits the enciphered data to a product; and an embedded interface driving module provides an interface with a product. The embedded encryption method disclosed by the invention can carry out a high-order second-order encryption embedding mode through a logistic mapping core, thereby realizing that a complex variable key is generated through high-order treatment by encrypting multiple iterations. The embedded encryption device disclosed by the invention can be embedded into various electronic products to enhance the safety of the electronic products.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an embedded encryption method and device based on high-order second-order logistic (logic) mapping. Background technique [0002] The general logistic map encryption method mainly relies on the initial value x of the map 0 and u (algorithm key) to produce two binary series A j and D j , and combine the two binary series A j and D j It is regarded as a subkey of this cryptosystem to realize encryption. However, logistic map encryption method analysis and discovery series A j and D j Both are completely determined by the logistic map and have nothing to do with factors such as plaintext and ciphertext. In this way, when the attacker obtains any plaintext A j and D j After that, you can use this A j and D j Directly attacking the ciphertext encrypted with the same key will not only cause hidden dangers in information security, but also become a se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/001H04L9/0625H04L9/0631H04L9/0861H04L9/16
Inventor 吴世贵廖志贤黄国现谭祖印雷善历
Owner 桂林利华电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products