[go: up one dir, main page]

CN119030685B - Double-factor encryption method based on HNN-like hyperchaotic mapping and geographic grid - Google Patents

Double-factor encryption method based on HNN-like hyperchaotic mapping and geographic grid Download PDF

Info

Publication number
CN119030685B
CN119030685B CN202410998222.0A CN202410998222A CN119030685B CN 119030685 B CN119030685 B CN 119030685B CN 202410998222 A CN202410998222 A CN 202410998222A CN 119030685 B CN119030685 B CN 119030685B
Authority
CN
China
Prior art keywords
hyperchaotic
hnn
factor
dimensional
grid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410998222.0A
Other languages
Chinese (zh)
Other versions
CN119030685A (en
Inventor
包涵
苏圆惠
方玉健
丁新成
武花干
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changzhou University
Original Assignee
Changzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changzhou University filed Critical Changzhou University
Priority to CN202410998222.0A priority Critical patent/CN119030685B/en
Publication of CN119030685A publication Critical patent/CN119030685A/en
Application granted granted Critical
Publication of CN119030685B publication Critical patent/CN119030685B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

本发明涉及图像加密技术领域,尤其涉及基于类HNN超混沌映射和地理网格的双因子加密方法,包括构建二维类HNN超混沌映射,设置二维类HNN超混沌映射的不动点,利用二维类HNN超混沌映射的初值对二维类HNN超混沌映射进行若干次迭代,得到第若干次迭代的超混沌序列;使用六边形网格进行空间分区,将地理信息划分为若干区域索引,构造地理网格系统;利用初值偏移因子和对应的网格索引对明文文件进行加密。本发明解决现有的单因素密钥无法保障数据的地理安全性,存在数据地理位置不敏感、装置防盗、密文数据安全性等缺陷问题。

The present invention relates to the field of image encryption technology, and in particular to a dual-factor encryption method based on a HNN-like hyperchaotic map and a geographic grid, including constructing a two-dimensional HNN-like hyperchaotic map, setting a fixed point of the two-dimensional HNN-like hyperchaotic map, iterating the two-dimensional HNN-like hyperchaotic map several times using the initial value of the two-dimensional HNN-like hyperchaotic map, and obtaining a hyperchaotic sequence of several iterations; using a hexagonal grid for spatial partitioning, dividing geographic information into several regional indexes, and constructing a geographic grid system; and encrypting a plaintext file using an initial value offset factor and a corresponding grid index. The present invention solves the problems that the existing single-factor key cannot guarantee the geographic security of data, and has defects such as insensitivity to data geographic location, device anti-theft, and ciphertext data security.

Description

Double-factor encryption method based on HNN-like hyperchaotic mapping and geographic grid
Technical Field
The invention relates to the technical field of image encryption, in particular to a double-factor encryption method based on HNN-like hyperchaotic mapping and geographic grids.
Background
Chaos has a series of characteristics such as good pseudo-randomness, track unpredictability, initial state and control parameter sensitivity, and the like, the characteristics are matched with the requirements of cryptography, and the chaos has a very wide application prospect in engineering application in the fields of information security, secret transmission and the like, and is highly valued by the scientific community and even the national government.
In literature Discrete Memristor Hyperchaotic Maps, a pseudo-random number generator (PRNGs) is designed by utilizing some discrete chaotic mappings, in literature Two-Dimensional Memristive Hyperchaotic Maps andApplication in Secure Communication, memristive hyperchaotic mappings are applied to safety communication, and experiments show that memristive mappings show better performance than some existing discrete mappings.
The hardware encryption is a data security protection measure, and the encryption and decryption process is executed by special equipment, so that higher-level reliability and security can be provided compared with software encryption, in a modern cryptosystem, stateless hardware encryption can be used as an effective security measure, the security of a secret key and an algorithm is ensured through physical equipment, and in a literature SPECTRAL SENSITIVITY NEAR exceptional points as a resource for hardware encryption, the secret key is not required to be stored or transmitted through a secure channel, the encryption and decryption state is not required to be stored, and the security of the secret key and the encryption algorithm is greatly ensured.
However, the conventional hardware encryption usually ignores the security of the geographical area, in the literature Initial-offset-boosted coexisting hyperchaos in a 2D memristive Chialvo neuron map and its application in image encryption, only the initial value of the chaotic map is used as a security key, geographical factors are not considered, the existing single factor key cannot guarantee the geographical security of data for information data sensitive to the geographical position, the defects of insensitive geographical position of the data, theft prevention of devices, security of ciphertext data and the like exist, and the hardware encryption based on the geographical position is particularly important when the data is encrypted in the security area and is not expected to be decrypted outside the security area.
Disclosure of Invention
Aiming at the defects of the prior method, the invention combines the geographic position with the encryption of the chaotic system, takes the geographic information as a unique identifier and acts with a hardware key at the same time to construct the chaotic hardware encryption method driven by double factors, so that encrypted data cannot be decrypted outside an effective safety area, the geographic position sensitivity of the data is enhanced, and the data is effectively protected from unauthorized access.
The technical scheme adopted by the invention is that the double-factor encryption method based on HNN-like hyperchaotic mapping and geographic grids comprises the following steps:
Step one, constructing a two-dimensional HNN hyperchaotic mapping, setting a fixed point of the two-dimensional HNN hyperchaotic mapping, and carrying out iteration for a plurality of times on the two-dimensional HNN hyperchaotic mapping by utilizing an initial value of the two-dimensional HNN hyperchaotic mapping to obtain a hyperchaotic sequence of a first iteration;
As a preferred embodiment of the present invention, the formula of the hyper-chaotic sequence of the first iteration is:
wherein, (p, q) is an initial value offset factor, x, y represents the direction, and x ', y' are the hyperchaotic sequences in the x, y direction respectively.
Secondly, space partitioning is carried out by using hexagonal grids, geographical information is divided into a plurality of area indexes, and a geographical grid system is constructed;
as a preferred embodiment of the present invention, the construction of the geographic grid system includes:
step 21, utilizing a world map and longitude and latitude coordinates obtained by using the mercator projection and satellite positioning;
Step 22, dividing the world map into hexagonal grids arranged in a honeycomb mode;
step 23, determining the grid size by taking a certain coordinate as an initial dividing point;
Step 24, indexing and numbering the grids by using the positive integer with the upper left corner of the world map as a starting point;
and step 25, converting the positioned longitude and latitude coordinates into grid indexes corresponding to the initial value offset factors.
Step three, encrypting the plaintext file by utilizing the initial value offset factor and the corresponding grid index;
as a preferred embodiment of the present invention, the third step specifically includes:
step 31, processing the plaintext file into a one-dimensional binary sequence S;
Step 32, calculating an initial value of two-dimensional HNN hyperchaotic mapping by taking an initial value offset factor (p, q) as an intrinsic encryption key and taking an encryption key (s 1,s2) built in a singlechip as an internal equipment credential;
as a preferred embodiment of the invention, the formula for calculating the initial value of the two-dimensional HNN hyper-chaotic map is as follows:
(x0=s1+2pπ,y0=s2+2qπ) (8)
Wherein, (s 1,s2) is an encryption key, (p, q) is an initial value offset factor, and (x 0,y0) is an initial value of the hyperchaotic mapping.
Step 33, performing a plurality of iterations on the two-dimensional HNN hyperchaotic mapping, and taking the obtained hyperchaotic state value (X, Y) as a pseudo-random number (X, Y);
step 34, the ordered positions of the pseudo random numbers X and Y are respectively replaced by a one-dimensional binary sequence S;
Step 35, obtaining a sequence C F and a sequence C B by using a diffusion method;
Wherein M () is an operation function, P is a permuted value, and C is a diffused value;
as a preferred embodiment of the present invention, the formula of the operating function is:
Wherein, Representing a rounding-up operation, k being the amplification factor and b being the bias factor.
Step 36, repeating steps 34, 35 several times to obtain a cryptographic data sequence.
As a preferred implementation mode of the invention, the double-factor encryption device based on HNN hyperchaotic mapping and geographic grids comprises a singlechip, a dynamic random access memory, a positioning module, a digital-to-analog conversion module and a USB bus conversion module, wherein,
The USB bus conversion module is used for data communication between the host and the singlechip;
the digital-to-analog conversion module converts the encrypted ciphertext digital signal into an analog signal;
The positioning module is used for acquiring longitude and latitude coordinates in the world map;
the dynamic random access memory is used for storing pseudo-random numbers and password data sequences;
the singlechip is used for receiving a plaintext in the host and encrypting the plaintext to obtain an encrypted ciphertext digital signal.
As a preferred embodiment of the invention, the HNN hyperchaotic mapping and geography grid-based two-factor encryption system comprises a memory and a processor, wherein the memory is used for storing instructions executable by the processor, and the processor is used for executing the instructions to realize the HNN hyperchaotic mapping-like and geography grid-based two-factor encryption method.
As a preferred embodiment of the present invention, a computer readable medium storing computer program code which, when executed by a processor, implements a two-factor encryption method based on a class HNN hyperchaotic mapping and a geographical grid.
The invention has the beneficial effects that:
1. The geographic position is combined with chaotic hardware encryption for the first time, geographic information is used as a unique identifier and acts with a hardware key at the same time, so that a chaotic hardware encryption method driven by double factors is constructed, encrypted data cannot be decrypted outside an effective safety area, the geographic position sensitivity of the data is enhanced, and the data is effectively protected from unauthorized access;
2. the problem that the geographic position of data encrypted by single-factor hardware is insensitive is solved;
3. the anti-theft problem of the encryption device is solved.
Drawings
FIG. 1 is a flow chart of a two-factor encryption method based on HNN-like hyperchaotic mapping and geographic meshes of the invention;
fig. 2 is a grid homogeneous coexistence attractor of two-dimensional HNN hyperchaotic mapping.
Fig. 3 is a hyperchaotic sequence of the two-dimensional HNN-like hyperchaotic map of the invention.
FIG. 4 is a schematic diagram of a geographic grid system of the present invention;
FIG. 5 is a schematic diagram of a two-factor chaotic hardware encryption device based on a geographic grid;
FIG. 6 is a flow chart of the geographic location based grid key generation of the present invention;
FIG. 7 is a schematic diagram of the encryption and decryption process of the present invention;
Fig. 8 is a physical diagram of a two-factor chaotic hardware encryption device based on a geographic grid.
Detailed Description
The invention will be further described with reference to the accompanying drawings and examples, which are simplified schematic illustrations showing only the basic structure of the invention and thus showing only those constructions that are relevant to the invention.
As shown in fig. 1, the two-factor encryption method based on the HNN-like hyper-chaotic map and the geographic grid comprises the following steps:
step one, constructing two-dimensional HNN hyper-chaotic mapping;
The mathematical model formula of the two-dimensional HNN hyper-chaos mapping is as follows:
where n is a natural number, x n and y n are two discrete time variables of the nth iteration, x and y represent the electrical activity of the first and second neurons, respectively, and for neurons at the inner decaying edge, the parameter g 11、g12、g21、g22 is a connection weight and the nonlinear function sin () is an activation function.
Let the stationary point of the two-dimensional HNN hyperchaotic mapping be S ' = (X ', Y '), the stationary point can be found by calculating X ' =x ' +g 11sinX′+g12 sinY ' and Y ' =y ' +g 21sinX′+g22 sinY ':
S'=(X',Y')=(mπ,lπ) (2)
where m and l are two integers.
Thus, the map has an infinite number of grid immobilization points, which can present a grid distribution in the X '-Y' plane, as shown in fig. 2, resulting in the appearance of grid homogeneous coexisting attractors.
The initial value of the two-dimensional HNN hyperchaotic mapping is (x 0,y0), the values are all within (-pi, pi), if x 0 deviates from 2ppi, y 0 deviates from 2qpi, namely a new initial value (x '0,y′0)=(x0+2pπ,y0 +2qpi), the two-dimensional HNN hyperchaotic mapping generates a new set of sequences, which are represented by variables (x', y '), and for (x' 0,y′0), the new sequence after the 1 st iteration is:
The new sequence after the second iteration is:
The new sequence after the third iteration is:
similarly, the new sequence after (n+1) iterations can be expressed as:
Thus, when x 0 and y 0 are offset by 2ppi and 2qpi, respectively, the sequence of the solution of formula (1) into new variables x 'and y' is offset by 2ppi in the x-direction and by 2qpi in the y-direction, i.e. the linear transformation between the original sequence and the new sequence is expressed as:
It is shown that when x 0 moves by 2ppi, the new sequence x 'moves by 2ppi in the x direction, and when y 0 moves by 2qpi, the new sequence y' moves by 2qpi in the y direction, so that the dynamic behavior of grid homocoexistence occurs.
The two integers p and q in the formula (7) are core parameters for determining the initial value of the grid, so the (p, q) is defined as an initial value offset factor, and the initial value offset factor is an important factor for using two-dimensional HNN-like hyperchaotic mapping in subsequent two-factor chaotic hardware encryption based on the geographic grid.
The two-dimensional HNN-like hyperchaotic mapping generates 8 hyperchaotic sequences, and as shown in figure 3, the numerical result shows that the dynamic amplitude of the hyperchaotic sequences can be controlled by switching the initial value offset factors in two directions, and the number of the hyperchaotic sequences is determined by integers p and q in the figure, namely 8 hyperchaotic sequences.
The two-dimensional HNN mapping can generate a hyperchaotic sequence with excellent performance, is very suitable for chaotic encryption application, and has the grid homoplasmy coexisting characteristic very well matched with the geographic grid index;
Step two, constructing a geographic grid system according to grid homogeneity characteristics of two-dimensional HNN hyperchaotic mapping;
In order to realize double-factor chaotic encryption based on geographic grids, a Beidou satellite system is utilized for positioning, a H3 geographic space index developed by Uber is utilized for space partitioning, geographic information is divided into a plurality of regional indexes, different indexes correspond to different geographic keys, regional safety is guaranteed, because the geographic space index system is irrelevant to current positioning information, positioning state information is not required to be stored in encryption, the system belongs to stateless encryption, stability and safety of the system are effectively guaranteed, and a geographic grid system is designed before encryption, wherein a schematic diagram of the geographic grid system is shown in figure 4 and comprises an cuttotor projection diagram, a hexagonal tiling diagram, a geographic index and conversion from geographic to index.
Step 21, the mercator projection is one of the most commonly used cylindrical projections, and the accuracy of the map in terms of angle and shape is maintained by projecting the earth surface onto a cylinder and then expanding the earth surface into a rectangle;
Step 22, the world map may then be divided into hexagonal grids arranged in a honeycomb, as shown in fig. 4 (b), the hexagons are most circular polygons, due to their lower area to perimeter ratio, the deviations from the grid shape boundary effect may be reduced, so that uniform grids may be split, and furthermore, the hexagonal grids are easier to locate due to their centers being the same distance from all adjacent centers, as compared to square grids, triangular grids, and are the best choice for filling planes.
Step 23, after map projection and grid segmentation are determined, a certain coordinate is used as an initial segmentation point, and the size of the grid, namely the set radius, is determined, so that the construction of a geographic grid system can be completed;
step 24, indexing and numbering grids by using a positive integer with the upper left corner of the world map as a starting point, wherein each grid corresponds to a unique plane index, and the schematic diagram is shown in fig. 4 (c);
In step 25, the coordinates (x, y) obtained by satellite positioning fall into a certain grid, the positioning is converted into grid indexes (p, q) corresponding to initial value offset factors, as shown in fig. 4 (d), and the different coordinates falling into the same hexagonal grid are finally converted into the same index, which means that the hexagon is the effective range of the index, and the coordinates are all in the same safety zone.
Correlating the geographic position with the initial value offset factor to obtain the chaotic encryption sensitive to the geographic position, and realizing the chaotic encryption method based on the geographic grid;
The double-factor encryption device based on HNN hyperchaotic mapping and geographic grids adopts a singlechip (STM 32H743IIT 6), a dynamic random access memory SDRAM (W9825G 6 KH), a positioning module (ATK-1218 chip), a digital-to-analog conversion module (DAC 856) and a USB bus conversion module (CH 340G), wherein the singlechip is electrically connected with the host through the USB bus conversion module, the dynamic random access memory is electrically connected with the singlechip, the digital-to-analog conversion module is electrically connected with the singlechip and an oscilloscope respectively, the USB bus conversion module is used for data communication between the host and the singlechip, the digital-to-analog conversion module converts encrypted ciphertext digital signals into analog signals, the positioning module is used for acquiring longitude and latitude coordinates in a world map, the singlechip is used for receiving plaintext in the host and encrypting the plaintext to obtain encrypted ciphertext digital signals, the dynamic random access memory is used for storing and encrypting pseudo-random number data sequences, and the double-factor chaotic hardware encryption device based on geographic grids can encrypt data in any format.
Step three, the host reads the whole plaintext file in a binary mode, writes the plaintext into a byte slice S dat, then transmits the byte slice to the singlechip, particularly optimizes the reading method of the image format file for convenience of safety analysis, and can identify the common image type such as JPEG, PNG, BMP format by judging file header information, decodes the image to obtain 8-bit pixels with the size of MxN, M and N are respectively the width and the height of the image for single-channel gray level images, then adopts a flattening method to obtain a one-dimensional binary sequence S img with the length of L=MxN of the image, and is notable that although S dat and S img are both one-dimensional binary sequences, the former represents complete data information, the latter only contains image pixel information, and the one-dimensional binary sequence S is defined as any data (S dat) received by the singlechip for non-loss of generality, and the specific implementation steps on hardware are as follows:
1. S is sent from a host to the singlechip through the USB bus conversion module, so that the loss of data exchange between the singlechip and the random access memory is reduced in consideration of limited resources and communication requirements of a hardware memory, and binary data acquired by the STM32 can be transferred to the SDRAM for temporary storage.
2. The method comprises the steps that a positioning module of a Beidou satellite navigation system is used for receiving longitude and latitude information of a Beidou satellite, and a geographic grid system is combined to map a current geographic position to a hexagonal center coordinate, wherein the coordinates (p, q) are used as initial value offset factors;
3. In order to protect the security of the key and encryption, an initial value offset factor (p, q) is used as an intrinsic encryption key, an encryption key (s 1,s2) built in a singlechip is used as an internal device credential, and an initial value (x 0,y0) of two-dimensional HNN hyperchaotic mapping is calculated by a formula (8), wherein the formula is as follows:
(x0=s1+2pπ,y0=s2+2qπ) (8)
The initial value (x 0,y0) is not only controlled by the device certificate, but also affected by the geographical position, when the geographical position changes within the area range, the geographical coordinates can be mapped to the same hexagonal central coordinates within the effective area range, when the geographical position exceeds the area range, the geographical coordinates can be mapped to different hexagonal central coordinates, and the initial value is changed by changing the values of initial value offset factors p and q.
4. After generating an initial value, the singlechip carries out L+L H iterations on the two-dimensional HNN hyperchaotic mapping, wherein L H =100 is the preheating frequency, the first L H iteration is abandoned, and the reserved hyperchaotic state value (X, Y) is used as a pseudo-random number (X, Y) and the pseudo-random number is stored in SDRAM;
5. The sorting position of the S and the sorting position of the X are replaced to obtain P X, then the sorting position of the Y and the sorting position of the P X are replaced by the same method to obtain P, and finally the P is stored in SDRAM;
6. The rule that the last element M (i) affects the next element M (i+1) is propagated into the whole sequence to obtain the sequence C F, and propagated again to obtain the sequence C B, the diffusion method can be described as formula (9):
Where P is the value after substitution and C is the value after diffusion.
M (x) is an operating function, described as:
Wherein, The value (X i,Yi,Pi) representing the rounding-up operation, k=10 13 being the amplification factor and b=2pi being the bias factor, can be fetched from SDRAM as required.
7. Step 5, 6 is repeatedly executed for 3 times to obtain a password data sequence C, then the password data sequence C is transmitted to a host through a USB bus conversion module, and in the process, data interaction is carried out between the singlechip and the SDRAM, so that the safety of a memory is ensured;
The repeated execution for 3 times is to increase the safety and the diffusion effect, and resist the password analysis, ensure the key use efficiency, and realize the reversibility of the algorithm, wherein the repeated execution times are the self-defined parameters.
And after the data reception is completed, recovering the original dimension data from the sequence C by using a rearrangement method on the host, and finally obtaining the ciphertext data in the mode.
The structure diagram of the two-factor chaotic hardware encryption device based on the geographic grid is shown in fig. 5, in the encryption algorithm, fig. 6 shows a process of acquiring a system initial value based on the geographic positioning, the encryption operation is described in detail in the above encryption steps, and the decryption operations of substitution and diffusion are the inverse steps of the encryption operation.
It is noted that in equation (10), a double-precision floating point number is used, which occupies 8 bytes, in order to maintain the operation accuracy, all constants and variables used in equation (10) are 64-bit double-precision floating point numbers, so that the problem of data overflow or precision loss during the mixed operation of 32 bits and 64 bits is avoided, in terms of data storage, a data type partition of SDRAM is defined, which is divided into a 64-bit double-precision floating point partition for storing hyper-chaotic sequences, a 32-bit unsigned integer partition for storing permutation information and an 8-bit unsigned integer partition for storing binary numbers, in serial transmission, the maximum 500-byte cache is configured by using the internal RAM of STM32, and data sent by a host enters the cache first, then is sequentially allocated to a predefined 8-bit unsigned integer partition address, and then the cache is cleared and SDRAM address offset of a next transmission period is recorded.
In the experiment, an image with 512 multiplied by 512 pixels is selected as an example for testing, after the STM32 is electrified, the encryption mode is entered by pressing the KEY 0 KEY, plaintext data is transmitted to the singlechip through the host computer, and the positioning module obtains the geographic position through the antenna. The geographic coordinates are transformed into grid factors (p, q) by combining the geographic grid system in fig. 4, then an encryption process is completed through iterative operation of two-dimensional HNN mapping and a series of replacement diffusion operation, then a result is transmitted to a host computer through CH340G, so that chaotic encryption combining geographic factors is completed, and similarly, KEY 1 is pressed to enter a decryption mode, and the decryption process is the same as the encryption process, so that decryption can be carried out according to the geographic coordinates during decryption.
In FIG. 7, the geographical coordinates during encryption are displayed at the bottom, the upper left corner is the original image, the upper right corner is the binary sequence corresponding to the original image, the lower left corner is binary data transmitted back from hardware equipment, the lower right corner is the corresponding encrypted image, a DAC8563 chip is used as a D/A converter to obtain real-time sequences in the encryption and decryption process in experiments, plaintext data of yellow sequences and ciphertext data of blue sequences are respectively displayed through an oscilloscope, the hardware encryption and decryption process of a host is displayed in FIG. 7, decryption results of different geographical positions are displayed, encrypted images in the encrypted geographical positions can be correctly decrypted, but encrypted images beyond the positions cannot be decrypted, and the experiment results prove the feasibility of chaotic hardware encryption based on a geographical grid system, and FIG. 8 is a hardware physical diagram.
With the above-described preferred embodiments according to the present invention as an illustration, the above-described descriptions can be used by persons skilled in the relevant art to make various changes and modifications without departing from the scope of the technical idea of the present invention. The technical scope of the present invention is not limited to the description, but must be determined according to the scope of claims.

Claims (4)

1.基于类HNN超混沌映射和地理网格的双因子加密方法,其特征在于,包括以下步骤:1. A dual-factor encryption method based on HNN-like hyperchaotic mapping and geographic grid, characterized in that it comprises the following steps: 步骤一、构建二维类HNN超混沌映射,设置二维类HNN超混沌映射的不动点,利用二维类HNN超混沌映射的初值对二维类HNN超混沌映射进行若干次迭代,得到第若干次迭代的超混沌序列,公式为:Step 1: construct a two-dimensional HNN-like hyperchaotic map, set the fixed point of the two-dimensional HNN-like hyperchaotic map, use the initial value of the two-dimensional HNN-like hyperchaotic map to iterate the two-dimensional HNN-like hyperchaotic map several times, and obtain the hyperchaotic sequence of the severalth iteration. The formula is: 其中,(p,q)为初值偏移因子;x,y表示方向;x′,y′分别为x,y方向上超混沌序列;Among them, (p, q) is the initial value offset factor; x, y represent the direction; x′, y′ are the hyperchaotic sequences in the x and y directions respectively; 步骤二、使用六边形网格进行空间分区,将地理信息划分为若干区域索引,构造地理网格系统;Step 2: Use hexagonal grids to perform spatial partitioning, divide geographic information into several regional indexes, and construct a geographic grid system; 地理网格系统的构建包括:The construction of the geographic grid system includes: 步骤21、利用墨卡托投影和卫星定位得到的世界地图和经纬度坐标;Step 21: World map and longitude and latitude coordinates obtained using Mercator projection and satellite positioning; 步骤22、将世界地图划分成蜂窝排列的六边形网格;Step 22: Divide the world map into a hexagonal grid in a honeycomb arrangement; 步骤23、以某一个坐标作为起始分割点,确定网格尺寸;Step 23, using a certain coordinate as the starting segmentation point to determine the grid size; 步骤24、以世界地图的左上角作为起始点,用正整数对网格进行索引和编号;Step 24: Using the upper left corner of the world map as the starting point, index and number the grids with positive integers; 步骤25、将定位的经纬度坐标转化为初值偏移因子对应的网格索引;Step 25: convert the located longitude and latitude coordinates into the grid index corresponding to the initial value offset factor; 步骤三、利用初值偏移因子和对应的网格索引对明文文件进行加密;Step 3: Encrypt the plaintext file using the initial value offset factor and the corresponding grid index; 步骤三具体包括:Step three specifically includes: 步骤31、将明文文件处理为一维二进制序列S;Step 31, processing the plaintext file into a one-dimensional binary sequence S; 步骤32、以初值偏移因子(p,q)作为本征加密密钥,以加密密钥(s1,s2)作为内部设备凭证,计算二维类HNN超混沌映射的初值,公式为:Step 32: Using the initial value offset factor (p, q) as the intrinsic encryption key and the encryption key (s 1 , s 2 ) as the internal device credential, the initial value of the two-dimensional HNN-like hyperchaotic map is calculated. The formula is: (x0=s1+2pπ,y0=s2+2qπ) (8)(x 0 =s 1 +2pπ,y 0 =s 2 +2qπ) (8) 其中,(s1,s2)为加密密钥,(p,q)为初值偏移因子,(x0,y0)为超混沌映射的初值;Among them, (s 1 ,s 2 ) is the encryption key, (p,q) is the initial value offset factor, (x 0 ,y 0 ) is the initial value of the hyperchaotic map; 步骤33、对二维类HNN超混沌映射进行若干次迭代,将得到的超混沌状态值(x,y)作为伪随机数(X,Y);Step 33, iterating the two-dimensional HNN-like hyperchaotic mapping several times, and using the obtained hyperchaotic state value (x, y) as a pseudo-random number (X, Y); 步骤34、利用一维二进制序列S对伪随机数X,Y的排序位置分别进行置换;Step 34: Use the one-dimensional binary sequence S to permute the order of the pseudo-random numbers X and Y respectively; 步骤35、利用扩散法得到序列CF、序列CBStep 35, using diffusion method to obtain sequence CF and sequence CB ; 其中,M()为操作函数,P是置换后的值,C为扩散后的值;Among them, M() is the operation function, P is the value after substitution, and C is the value after diffusion; 操作函数的公式为:The formula of the operation function is: 其中,表示向上取整运算,k为放大系数,b为偏置因子;in, Indicates rounding up operation, k is the amplification factor, and b is the bias factor; 步骤36、重复执行若干次的步骤34、35得到密码数据序列。Step 36: Repeat steps 34 and 35 several times to obtain the password data sequence. 2.采用权利要求1所述的基于类HNN超混沌映射和地理网格的双因子加密方法的装置,其特征在于,包括:单片机、动态随机存取存储器、定位模块、数模转换模块和USB总线转换模块;其中,2. The device using the dual-factor encryption method based on HNN-like hyperchaotic mapping and geographic grid as claimed in claim 1 is characterized by comprising: a single-chip microcomputer, a dynamic random access memory, a positioning module, a digital-to-analog conversion module and a USB bus conversion module; wherein, USB总线转换模块用于主机和单片机的数据通信;The USB bus conversion module is used for data communication between the host and the microcontroller; 数模转换模块将加密后的密文数字信号转换为模拟信号;The digital-to-analog conversion module converts the encrypted ciphertext digital signal into an analog signal; 定位模块用于获取世界地图中的经纬度坐标;The positioning module is used to obtain the longitude and latitude coordinates in the world map; 动态随机存取存储器用于存储伪随机数和密码数据序列;Dynamic random access memory is used to store pseudo-random numbers and cryptographic data sequences; 单片机用于接收主机中明文,并将明文进行加密,得到加密后的密文数字信号。The single chip microcomputer is used to receive the plain text from the host and encrypt the plain text to obtain the encrypted ciphertext digital signal. 3.基于HNN超混沌映射和地理网格的双因子加密系统,其特征在于,包括:存储器,用于存储可由处理器执行的指令;处理器,用于执行指令以实现如权利要求1所述的基于类HNN超混沌映射和地理网格的双因子加密方法。3. A two-factor encryption system based on HNN hyperchaotic mapping and geographic grid, characterized in that it includes: a memory for storing instructions executable by a processor; a processor for executing instructions to implement the two-factor encryption method based on HNN-like hyperchaotic mapping and geographic grid as described in claim 1. 4.存储有计算机程序代码的计算机可读介质,其特征在于,计算机程序代码在由处理器执行时实现如权利要求1所述的基于类HNN超混沌映射和地理网格的双因子加密方法。4. A computer-readable medium storing computer program code, wherein the computer program code, when executed by a processor, implements the two-factor encryption method based on HNN-like hyperchaotic mapping and geographic grid as described in claim 1.
CN202410998222.0A 2024-07-24 2024-07-24 Double-factor encryption method based on HNN-like hyperchaotic mapping and geographic grid Active CN119030685B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410998222.0A CN119030685B (en) 2024-07-24 2024-07-24 Double-factor encryption method based on HNN-like hyperchaotic mapping and geographic grid

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410998222.0A CN119030685B (en) 2024-07-24 2024-07-24 Double-factor encryption method based on HNN-like hyperchaotic mapping and geographic grid

Publications (2)

Publication Number Publication Date
CN119030685A CN119030685A (en) 2024-11-26
CN119030685B true CN119030685B (en) 2025-04-08

Family

ID=93529862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410998222.0A Active CN119030685B (en) 2024-07-24 2024-07-24 Double-factor encryption method based on HNN-like hyperchaotic mapping and geographic grid

Country Status (1)

Country Link
CN (1) CN119030685B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7170997B2 (en) * 2000-12-07 2007-01-30 Cryptico A/S Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data
CN106961639B (en) * 2017-03-11 2024-06-21 苏州桑泰海洋仪器研发有限责任公司 Underwater interphone communication method and underwater communication system applying same
CN112446814B (en) * 2019-08-27 2022-04-19 中国人民解放军战略支援部队航天工程大学 A Fragile Watermarking Method for Vector Map Data to Locate and Tamper Entity Groups
CN114465706B (en) * 2021-12-01 2024-11-22 哈尔滨理工大学 Hyperchaotic parallel encryption method for images in network office approval documents
CN117234460B (en) * 2023-08-31 2024-04-02 常州大学 Hyperchaotic pseudo-random number generation method and device based on three-dimensional MHM

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Planar Homogeneous Coexisting Hyperchaos in Bi-Memristor Cyclic Hopfield Neural Network;Han Bao ect.;《IEEE Transactions on Industrial Electronics ( Volume: 71, Issue: 12, December 2024)》;20240430;正文第V节及图11(a)-(b) *

Also Published As

Publication number Publication date
CN119030685A (en) 2024-11-26

Similar Documents

Publication Publication Date Title
CN109740376B (en) Location privacy protection method, system, device and medium based on neighbor query
CN114465706B (en) Hyperchaotic parallel encryption method for images in network office approval documents
US6014614A (en) Method and mechanism for performing spatial joins
CN106533680B (en) Quantum neighbor query method for protecting position privacy
CN103414549A (en) QR two-dimensional code binary image partition-based key varying chaotic encryption method
CN113272798A (en) Map acquisition method, map acquisition device, computer equipment and storage medium
CN117394984B (en) Sensitive information security protection method, device, equipment and storage medium
Azzaz et al. An efficient and lightweight multi‐scroll chaos‐based hardware solution for protecting fingerprint biometric templates
Zhu et al. A class of quadratic polynomial chaotic maps and its application in cryptography
CN116527235A (en) Data encryption method and device based on key rotation and electronic equipment
CN109194666B (en) A secure kNN query method based on LBS
CN119030685B (en) Double-factor encryption method based on HNN-like hyperchaotic mapping and geographic grid
CN105391544A (en) Hash function construction method applicable to RFID authentication system
Zhang et al. Construction of high-dimensional cyclic symmetric chaotic map with one-dimensional chaotic map and its security application
CN117744123A (en) Security protection method and system for private data, electronic equipment and storage medium
Xiang An efficient location privacy preserving model based on Geohash
CN116578657A (en) Geographic position coding and decoding method, device and system
Ding et al. A local encryption method for large-scale vector maps based on spatial hierarchical index and 4D hyperchaotic system
CN103927572A (en) Encoding graph block and method and device for forming lattice graph through encoding graph block
CN118885554A (en) Map tile generation method based on FPGA technology
CN119031080A (en) A method, device and computer program product for protecting privacy data
CN113902135A (en) Method, device, device, system and storage medium for joint expansion of sample data volume
Bernardini et al. Tools for designing chaotic systems for secure random number generation
CN115879138B (en) Lightweight data encryption method for chip
CN113098676A (en) Vector map two-position random scrambling encryption method based on four-dimensional chaos

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant