Digital chaotic encryption method based on chaotic number spectrum

A chaotic encryption and encryption method technology, applied in the field of information security, can solve problems such as difficulty in adapting to computer data encryption, and achieve the effect of superior security and confidentiality performance and information processing efficiency

Inactive Publication Date: 2017-02-08
陈卫
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the technical shortcomings of the chaotic coding method, such as the repeated code coding problem of 5 pairs of dot circle coding, and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital chaotic encryption method based on chaotic number spectrum
  • Digital chaotic encryption method based on chaotic number spectrum
  • Digital chaotic encryption method based on chaotic number spectrum

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] Such as figure 1 Shown, a kind of digitized chaos encryption method based on chaotic number spectrum, described encryption method comprises the following steps:

[0063] Step 1: Send encoded plaintext data, and convert the plaintext data into binary array code 01;

[0064] Step 2: Discretize and map the binary array code 01 obtained in Step 1 into chaotic code 0000011111;

[0065] Step 3: The chaotic code 0000011111 obtained in Step 2 is fuzzified and mapped into a serial number code 0123456789;

[0066] Step 4: Encode the serial number 0123456789 obtained in Step 3 to construct ciphertext data 0-9;

[0067] Step 5: The ciphertext data 0-9 obtained in Step 4 is transmitted to the receiver through an open channel.

[0068] Wherein, there is also step six: inverting the ciphertext data obtained in step five into serial number codes.

[0069] Among them, there is also a step seven, which is to reversely map the serial number code in step six into a chaotic code.

[0070...

Embodiment 2

[0073] Such as figure 2 As shown, the method of this embodiment lies in the dual-system chaotic key stream generator, which is suitable for synchronous communication schemes in real-time signal processing occasions, and has basically the same secure communication functions and application fields as modern serial ciphers.

[0074] A kind of digital chaos encryption method based on chaos number spectrum, described encryption method comprises the steps:

[0075] Step 1: Send the coded plaintext sequence, and convert the plaintext sequence into binary array code 01;

[0076] Step 2: Discretize and map the binary array code 01 obtained in Step 1 into chaotic code 0000000001;

[0077] Step 3: The chaotic code 0000011111 obtained in Step 2 is fuzzified and mapped into a serial number code 0123456789;

[0078] Step 4: Encoding the serial number obtained in Step 3 0123456789 to construct a ciphertext sequence 0-9;

[0079] Step five: transmit the ciphertext sequence 0-9 obtained in...

Embodiment 3

[0088] see image 3 , a kind of digital chaos encryption method based on chaos number spectrum, described encryption method comprises the following steps:

[0089] Step 1: Send encoded plaintext data, and convert the plaintext data into a binary array code, such as 0101010101;

[0090] Step 2: The binary array code obtained in step 1 is sequentially mapped into the first-level chaotic code 0000000001 through the first-level discretization, and then fuzzy-mapped into the first-level serial number code 0101010101 through the n(10) run filter;

[0091] Step 3: The serial number code 0101010101 obtained in step 2 is mapped into the second-level chaotic code 0000000001 through the second-level discretization, and then fuzzy mapped into the second-level serial number code 0101010101 through the n(10) run filter;

[0092] Step 4: Encode the second-level sequence number obtained in Step 3 to construct ciphertext data through the chaos mixer;

[0093] Step 5: The ciphertext data obta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a digital chaotic encryption method based on a chaotic number spectrum. The encryption method comprises the following steps: step one, sending code plaintext data and converting the plaintext data into binary array codes; step two, mapping the binary array codes obtained in the step one into chaotic codes via a discretization mapping method; step three, mapping the chaotic codes obtained in the step two into serial number codes via a fuzzy mapping method; step four, constructing the serial number codes obtained in the step three into ciphertext data; and step five, transmitting the ciphertext data obtained in the step four to a receiver via a public channel. The method has a function of shielding signals with spread spectrum code mapping characteristics and a parallel data processing function of carrying out parallel chaotic mapping; compared with the modern cryptosystem, the digital chaotic encryption method has higher security and secrecy performance and higher information processing efficiency and is more applicable to optical fiber communication.

Description

technical field [0001] The invention belongs to the field of information security, in particular to the field of encryption and decryption of computer data, in particular to a digital chaotic encryption method based on chaotic number spectrum. Background technique [0002] The globalization and openness of computer networks pose a huge threat to information security, forcing cryptography to become the core technology for ensuring information security. Cryptography is a subject that studies the secret communication by hiding plaintext messages through character transformation, and its research object is information storage. In a cryptographic system, plaintext refers to an unencrypted message; ciphertext refers to an encrypted message; the key specifies the means of character transformation between text and ciphertext. The process of transforming plaintext into ciphertext is called encryption or encoding; the process of transforming ciphertext into plaintext is called decryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04B10/25
CPCH04B10/25H04L9/001
Inventor 陈伟
Owner 陈卫
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products