Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption transmission method, terminal equipment and use method of superlattice chaotic device

A transmission method and data encryption technology, applied in the field of information security, can solve problems such as large amount of calculation

Inactive Publication Date: 2019-11-29
SUZHOU INST OF NANO TECH & NANO BIONICS CHINESE ACEDEMY OF SCI
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the disadvantage of asymmetric encryption is that the amount of calculation is very large, so it is only suitable for encrypting very small data. For a large amount of data, symmetric encryption is still required

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption transmission method, terminal equipment and use method of superlattice chaotic device
  • Data encryption transmission method, terminal equipment and use method of superlattice chaotic device
  • Data encryption transmission method, terminal equipment and use method of superlattice chaotic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] refer to figure 2 As shown, the first embodiment of the present invention proposes a terminal device 2 . It can be understood that the terminal device 2 may be the first terminal 12 or the second terminal 13 described above. The terminal device 2 includes a memory 20 , a digital-to-analog conversion module 21 , a superlattice chaotic device 22 , an analog-to-digital conversion module 23 , a digital post-processing module 24 , a symmetric encryption module 25 , and a communication module 26 .

[0055] Wherein, the memory 20 includes at least one type of readable and writable storage medium for storing local noise sources, and other data and programs required for the normal operation of the terminal. In addition, the memory 20 can also be used to temporarily store various types of data that have been output or will be output.

[0056] The digital-to-analog conversion module 21 is used to convert the local noise source stored in digital form into an analog form noise si...

Embodiment 2

[0068] refer to image 3 As shown, the second embodiment of the present invention proposes a data encryption transmission method, which is applied to the terminal device 2 . It can be understood that the terminal device 2 may be the first terminal 12 or the second terminal 13 described above. In this embodiment, according to different requirements, image 3 The order of execution of the steps in the flowcharts shown may be changed, and certain steps may be omitted. The method includes the following steps:

[0069] S100. Download the public noise source from the public channel 11, and save the obtained local noise source.

[0070] Specifically, in order to ensure that the key generated by the first terminal 12 and the second terminal 13 is the same, so that there is no need to transfer the key between the sender and the receiver, it is necessary to ensure that the first terminal 12 and the second terminal The values ​​of the local noise sources LNSA and LNSB used by the two...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption transmission method, which comprises the following steps of: downloading a public noise source from a public channel, and storing the public noise sourceand obtaining a local noise source; driving a superlattice chaotic device by using the local noise source to obtain a superlattice chaotic output signal; generating a random key according to the superlattice chaotic output signal; and encrypting and decrypting the data by using the random key. The embodiment of the invention further discloses terminal equipment and a using method of the superlattice chaotic device. Therefore, the security of symmetric encryption and the convenience of key distribution can be improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data encryption transmission method, a terminal device and a method for using a superlattice chaotic device. Background technique [0002] Information security is a fundamental requirement of the information society. Especially since the 21st century, with the development of Internet finance, mobile payment, mobile office, cloud computing and other services, the importance of information security has become more prominent. To protect business-critical data, modern communication systems use encryption to varying degrees. Encryption techniques can be roughly divided into two categories: symmetric encryption and asymmetric encryption. Symmetric encryption is the earliest and most widely used encryption technology. There are many specific symmetric encryption algorithms, each of which has its own characteristics, but all have the core feature of symmetric encryption,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/08
CPCH04L9/001H04L9/0869H04L9/0819H04L9/00H04L9/08
Inventor 刘伟张耀辉殷志珍宋贺伦刘佩华
Owner SUZHOU INST OF NANO TECH & NANO BIONICS CHINESE ACEDEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products