TWI571092B - Encryption system for safe transmission of network data with adaptive synchronization of hyperchaotic signals free from external interference and parameter disturbance, and method for the same - Google Patents
Encryption system for safe transmission of network data with adaptive synchronization of hyperchaotic signals free from external interference and parameter disturbance, and method for the same Download PDFInfo
- Publication number
- TWI571092B TWI571092B TW104129287A TW104129287A TWI571092B TW I571092 B TWI571092 B TW I571092B TW 104129287 A TW104129287 A TW 104129287A TW 104129287 A TW104129287 A TW 104129287A TW I571092 B TWI571092 B TW I571092B
- Authority
- TW
- Taiwan
- Prior art keywords
- hyperchaotic
- signal
- receiving end
- transmitting end
- chaotic
- Prior art date
Links
- 230000005540 biological transmission Effects 0.000 title claims description 89
- 238000000034 method Methods 0.000 title claims description 20
- 230000003044 adaptive effect Effects 0.000 title claims description 17
- 230000000739 chaotic effect Effects 0.000 claims description 53
- 230000001360 synchronised effect Effects 0.000 claims description 26
- 230000008859 change Effects 0.000 claims description 14
- 230000007717 exclusion Effects 0.000 claims description 10
- 238000013459 approach Methods 0.000 claims description 5
- 230000001131 transforming effect Effects 0.000 claims description 3
- 230000006399 behavior Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 230000008878 coupling Effects 0.000 description 5
- 238000010168 coupling process Methods 0.000 description 5
- 238000005859 coupling reaction Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000006978 adaptation Effects 0.000 description 3
- 230000008054 signal transmission Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000032683 aging Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000010429 evolutionary process Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 230000035939 shock Effects 0.000 description 1
- 239000013598 vector Substances 0.000 description 1
Landscapes
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Description
本發明係有關於一種網路資料安全傳輸加密保護系統與方法,尤其是指一種能抗外干擾及參數擾動的異質超混沌訊號適應同步之網路資料安全傳輸加密保護系統及方法。 The invention relates to a network data security transmission encryption protection system and method, in particular to a heterogeneous hyperchaotic signal capable of resisting external disturbances and parameter disturbances, and a network data security transmission encryption protection system and method.
當前之資訊安全問題隨著資訊技術的發展,一直是企業甚至國家揮之不去的隱憂。常見的資安問題,是駭客透過網路入侵電腦系統,竊取個資、公司機密、甚至是國家機密,不僅造成個人財產的損失,也對公司的營運甚至是國家安全造成威脅。 With the development of information technology, the current information security issue has always been a lingering worry for enterprises and even countries. A common security problem is that hackers invade computer systems through the Internet, stealing personal capital, company secrets, and even state secrets, not only causing personal property losses, but also threatening the company's operations and even national security.
目前資安管理業者所提供的網路資料安全傳輸及加密保護方法是使用者須先加入會員,在加入會員的過程中需填寫相關的個人資料,填寫完成並確定加入會員後,系統業者稍後會發送一認證信件至使用者所指定的電子信箱中,在該認證信件中並賦予一認證連結,當使用者點擊該認證連結後,便能使用業者在網頁中所提供的服務。其中,該認證連結一般是將密碼、電子郵箱、目前時間組成的字串經編碼後所形成的啟動碼,如MD5及SHA-1兩大密碼系統,係國際上認為牢不可破的兩大密碼系統,但此兩大密碼系統近年來已宣告被破解,在國際密碼界造成了極大的震撼。 At present, the secure transmission and encryption protection method of network data provided by the security management industry is that users must first join the membership. In the process of joining the membership, they need to fill in the relevant personal information, fill in the completion and confirm the membership, the system operator later A certification letter is sent to the e-mail address specified by the user, and an authentication link is given in the authentication letter. When the user clicks on the authentication link, the service provided by the operator on the webpage can be used. The authentication link is generally a startup code formed by encoding a password, an e-mail address, and a current time string, such as MD5 and SHA-1, which are two major cryptosystems that are considered unbreakable internationally. However, these two major cryptosystems have been announced to be cracked in recent years, causing great shock in the international cryptography.
又,混沌訊號是一種看似混亂但卻又隱藏規則的現象,它在1978年左右開始被廣泛研究,包括通訊、生物、數學、物理、化學,甚至經濟方面都能看到混沌現象的身影。混沌為長時間的非週期性行為,並且具有決定性(Deterministic)與對初始值敏感(Sensitive to initial condition)的明顯特徵。其中,決定性代表混沌的演化過程看似混亂的非線性反應但它卻是依循一定的規則(即方程式)在進行;至於對初始值的敏感,則使得在混沌系統中的軌道,就算很接近也會以指數形式而快速分離。正因為混沌系統具有上述兩特徵,使混沌系統常被應用於通訊安全的設計上。 Moreover, the chaotic signal is a seemingly chaotic but hidden rule. It began to be widely studied around 1978, including communication, biology, mathematics, physics, chemistry, and even economics. Chaos is a long-term non-periodic behavior and is characterized by a deterministic and Sensitive to initial condition. Among them, the decisive representation of the evolutionary process of chaos seems to be a chaotic nonlinear response, but it follows a certain rule (ie, the equation); as for the sensitivity of the initial value, the orbit in the chaotic system is close. Will be quickly separated in the form of an index. Because chaotic systems have these two characteristics, chaotic systems are often used in the design of communication security.
運用1990年Pecora-Carroll所提出的「混沌系統同步理論之運用」,請參看第三圖所示之發送-接收單向耦合混沌系統,若發送端與接收端之超混沌系統有不同的初始向量(做為安全傳輸時 之私鑰),根據Pecora-Carroll同步理論設計一單向耦合同步控制器,能讓發送端與接收端的兩個超混沌系統產生混沌同步現象,其係將欲傳輸資料在發送端先做混沌調變(Modulation),當送至接收端再予以解調(Demodulation),雖發送端和接收端具不同的初始狀態但均屬同一類型的混沌系統且混沌系統參數固定則能符合Pecora-Carroll理論推導之假設。 Using the "Application of Chaos System Synchronization Theory" proposed by Pecora-Carroll in 1990, please refer to the transmission-reception unidirectional coupling chaotic system shown in Figure 3, if the hyperchaotic system at the transmitting end and the receiving end has different initial vectors. (as a safe transmission The private key), according to the Pecora-Carroll synchronization theory, a one-way coupled synchronous controller can generate chaotic synchronization between the two hyperchaotic systems at the transmitting end and the receiving end, which is to make the chaotic tone of the data to be transmitted at the transmitting end. Modulation, when sent to the receiving end and then demodulated (Demodulation), although the transmitting end and the receiving end have different initial states but all belong to the same type of chaotic system and the chaotic system parameters are fixed, it can conform to the Pecora-Carroll theory derivation. Assumption.
我國2009年8月11日公告第I313557號,揭示一種「超混沌之保密通訊系統及方法」,即是上述發送-接收單向耦合混沌系統應用的專利,其包括:一超混沌訊號產生器,藉以將一信息載於該超混沌訊號產生器之一第一訊號上;一可調整參數裝置,使得該超混沌訊號產生器將該信息及該第一訊號形成一超混沌訊息;一超混沌訊號同步接收器,藉調整該超混沌訊號同步接收器之一第二內部耦合參數,並於該接收方獲取該超混沌訊息後,使得超混沌訊號同步接收器內產生一第二訊號與該發射方之第一訊號達成單向耦合之超混沌同步;及一增值還原裝置,用來計算該超混沌訊息及該第二訊號的差值,再輸入該差值,並且藉由該增值還原裝置內之一增值還原設定以解譯該信息。 China's August 11, 2009 announcement No. I313557 discloses a "hyperchaotic secure communication system and method", which is a patent for the above-mentioned transmission-reception unidirectional coupling chaotic system application, which comprises: a hyperchaotic signal generator, The information is carried on the first signal of the hyperchaotic signal generator; an adjustable parameter device is configured to cause the hyperchaotic signal generator to form the information and the first signal into a hyperchaotic message; a hyperchaotic signal The synchronous receiver adjusts a second internal coupling parameter of the super-chaotic signal synchronous receiver, and after the receiving party acquires the hyperchaotic message, causes a second signal and the transmitting side to be generated in the hyper-chaotic signal synchronous receiver The first signal reaches a one-way coupling hyperchaotic synchronization; and a value-added reduction device is configured to calculate the difference between the hyperchaotic message and the second signal, and then input the difference, and the value is restored by the value-added device A value-added restore setting to interpret the information.
此一混沌系統具有以下缺點: This chaotic system has the following disadvantages:
1、傳送的資訊僅經過簡單的混沌調變,因此竊密者能輕易利用通訊通道設計適應觀測器,將傳輸資訊解調出來,造成通訊的不安全性。 1. The transmitted information is only subjected to simple chaotic modulation, so the thief can easily use the communication channel to adapt to the observer and demodulate the transmission information, resulting in insecure communication.
2、由於發送端與接收端採用相同類型的混沌系統,使資訊的傳送不夠安全。 2. Since the same type of chaotic system is used at the transmitting end and the receiving end, the information transmission is not safe enough.
3、無法抵抗外干擾造成信號誤差以至於無法達成兩邊信號的同步,無法通訊。 3, can not resist the external interference caused by signal error so that the two sides of the signal can not be synchronized, can not communicate.
4、無法抵抗系統參數擾動,當系統漸漸老化造成信號誤差以至於無法達成兩邊信號的同步,無法通訊。 4, can not resist the disturbance of system parameters, when the system gradually aging causes signal error so that the two sides of the signal can not be synchronized, can not communicate.
5、資料完成傳輸後並無保護機制,當掀去資料的「遮罩」或「載具」後,可幾乎同時還原正確的資訊,欠缺對原始資料直接加密保護的技術。 5. There is no protection mechanism after the data is transmitted. When the "mask" or "vehicle" of the data is removed, the correct information can be restored almost at the same time, and the technology for directly encrypting and protecting the original data is lacking.
6、參數設定範圍不太大,安全性不夠,如公告第I313557號「超混沌之保密通訊系統及方法」之參數範圍設定較佳為0.01-1與0.89-1,更佳僅為0.01-0.11與0.89-0.99。 6. The parameter setting range is not too large, and the safety is not enough. For example, the parameter range setting of "Improved communication system and method of hyperchaos" of No. I313557 is preferably 0.01-1 and 0.89-1, and more preferably only 0.01-0.11. With 0.89-0.99.
本發明之主要目的,係提出一種抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護系統及方法,主要令在發送端與接收端採用整合兩種以上不同的混沌系統之整合型超混沌系統來進行資料的傳輸,並同時對發送端的原始資訊明文進一步加密,俾以增加遮罩或載入原始資訊明文的參數,提高加密效果,使資料的傳輸更具安全性。 The main object of the present invention is to provide a network data security transmission encryption protection system and method for super-chaotic signal adaptation against external disturbances and parameter disturbances, mainly to integrate two or more different chaotic systems at the transmitting end and the receiving end. The integrated hyperchaotic system transmits data, and at the same time further encrypts the plaintext of the original information of the transmitting end, so as to increase the mask or load the parameters of the original information plaintext, improve the encryption effect, and make the data transmission more secure.
為達成上述目的,本發明提出一種抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護系統;所述抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護系統包括發送端與接收端,係將原始資訊明文由所述發送端以保密的方式傳送至所述接收端;所述發送端包含有超混沌加密模組與發送端超混沌安全傳輸模組,所述接收端包含有適應控制器、接收端超混沌安全傳輸模組與超混沌解密模組;其中: 所述超混沌加密模組,用以將一原始資訊明文混沌加密為一超混沌密文訊號; 所述發送端超混沌安全傳輸模組,係採用整合兩種以上混沌系統之整合型超混沌系統,其具有複數個異質系統參數,以經由複數個所述異質系統參數的設定產生複數個超混沌狀態訊號,用以將超混沌密文訊號混沌調變載於所述複數個超混沌狀態訊號形成超混沌金鑰訊息,並輸出該超混沌金鑰訊息; 所述適應控制器,用以調整所述接收端超混沌安全傳輸模組系統參數; 所述接收端超混沌安全傳輸模組,係採用整合兩種以上混沌系統之整合型超混沌系統來響應所述發送端輸出的超混沌金鑰訊息,其具有複數個異質系統參數,經由複數個所述異質系統參數的設定產生複數個超混沌狀態估測訊號,並藉由所述適應控制器調整 所述接收端超混沌安全傳輸模組的系統參數,以使所述超混沌狀態估測訊號趨近於所述發送端超混沌安全傳輸模組之所述超混沌狀態訊號,繼而適應同步,再予以解調出所述超混沌密文訊號; 所述超混沌解密模組,係將所述超混沌密文訊號解密還原為所述原始資訊明文。 In order to achieve the above object, the present invention provides a network data security transmission encryption protection system for super-chaotic signal adaptation against external disturbances and parametric disturbances; the anti-external interference and parameter disturbance hyperchaotic signals are adapted to synchronize network data security. The transmission encryption protection system includes a transmitting end and a receiving end, and transmits the original information plaintext to the receiving end by the transmitting end in a confidential manner; the transmitting end includes a hyperchaotic encryption module and a transmitting end hyperchaotic secure transmission. a module, the receiving end comprises an adaptive controller, a receiving end hyperchaotic secure transmission module and a hyperchaotic decryption module; wherein: The hyperchaotic encryption module is configured to encrypt an original information plaintext chaotic into a hyperchaotic ciphertext signal; The transmitting end hyperchaotic secure transmission module adopts an integrated hyperchaotic system integrating two or more chaotic systems, which has a plurality of heterogeneous system parameters to generate a plurality of hyperchaos through the setting of a plurality of said heterogeneous system parameters. a state signal for chaotically transforming the hyperchaotic ciphertext signal into the plurality of hyperchaotic state signals to form a hyperchaotic key message, and outputting the hyperchaotic key information; The adaptation controller is configured to adjust a parameter of the hyperchaotic secure transmission module system at the receiving end; The receiving end hyperchaotic secure transmission module uses an integrated hyperchaotic system integrating two or more chaotic systems to respond to the hyperchaotic key information output by the transmitting end, and has a plurality of heterogeneous system parameters, through a plurality of heterogeneous system parameters. The setting of the heterogeneous system parameter generates a plurality of hyperchaotic state estimation signals, and is adjusted by the adaptive controller The system parameter of the hyperchaotic secure transmission module at the receiving end is such that the hyperchaotic state estimation signal approaches the hyperchaotic state signal of the transmitting hyperchaotic secure transmission module, and then adapts to synchronization, and then Demodulating the hyperchaotic ciphertext signal; The hyperchaotic decryption module decrypts the hyperchaotic ciphertext signal into the original information plaintext.
如上所述之抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護系統,其中,所述原始資訊明文為圖片或文字。 The anti-external interference and the parameter-disturbed hyperchaotic signal as described above are adapted to the synchronized network data security transmission encryption protection system, wherein the original information plaintext is a picture or a text.
如上所述之抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護系統,其中,所述超混沌加密模組係先將圖片之RGB像素值或文字之ASC Ⅱ碼轉換成二進位得到B={B 1,B 2,...,B M×N };以超混沌訊號產生加密訊息,所述加密訊息再轉換成二進位金鑰,其中T=abs(x ik )-floor(abs(x ik )),x ik 為超混沌訊號;所述二進位金鑰與上述所得到之二進位B={B 1,B 2,...,B M×N }做行列置換與同餘運算進行加密,加密後得到C={C 1,C 2,...,C M×N },其中進行XOR互斥運算;將加密後資訊轉回十進位的圖片之RGB像素值或文字之ASC Ⅱ碼,即能得到加密後的圖片或文字。 The anti-external interference and the parameter-disturbed hyperchaotic signal as described above are adapted to the synchronous network data security transmission encryption protection system, wherein the hyperchaotic encryption module first converts the RGB pixel value of the picture or the ASC II code of the text. Binary to get B = { B 1 , B 2 , ..., B M × N }; generate an encrypted message with a hyperchaotic signal, which is then converted into a binary key Where T = abs ( x ik )- floor ( abs ( x ik )), x ik is a hyperchaotic signal; the binary key and the resulting binary B = { B 1 , B 2 , .. . B M × N } performs row-column permutation and congruence operations for encryption, and obtains C = { C 1 , C 2 ,..., C M × N } after encryption. Perform XOR mutual exclusion operation; convert the encrypted information back to the RGB pixel value of the decimal image or the ASC II code of the text, that is, the encrypted picture or text can be obtained.
如上所述之抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護系統,其中,所述超混沌解密模組係將 加密後圖片十進位之RGB像素值或加密後文字十進位之ASC Ⅱ碼轉換為二進位,得到C={C 1,C 2,...,C M×N },並以進行XOR互斥運算,其中二進位金鑰,其中,T=abs(x ik )-floor(abs(x ik )),x ik 為超混沌訊號;接著將解密後得到之二進位B={B 1,B 2,...,B M×N }之圖片RGB像素值或文字ASC Ⅱ碼轉換成十進位,即能得到解密後的圖片或文字。 The anti-external interference and the parameter-disturbed hyperchaotic signal as described above are adapted to the synchronous network data security transmission encryption protection system, wherein the hyperchaotic decryption module is an RGB pixel value or an encrypted text of the encrypted image. The decimal ASC II code is converted to binary, which gives C = { C 1 , C 2 ,..., C M × N }, and Perform an XOR mutual exclusion operation, where the binary key , where T = abs ( x ik )- floor ( abs ( x ik )), x ik is a hyperchaotic signal; then the binary obtained by decryption B = { B 1 , B 2 ,..., B M × N } Picture RGB pixel value or text ASC II code is converted to decimal, that is, the decrypted picture or text can be obtained.
為達成上述目的,本發明更進一步提出一種抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護方法,主要係將發送端的原始資訊明文以保密的方式傳送至接收端,其步驟包括:(A)在所述發送端將所述原始資訊明文混沌加密形成超混沌密文訊號,使所述原始資訊明文以所述超混沌密文訊號為遮罩或載具而隱藏於所述超混沌密文訊號中傳輸訊息;(B)在所述發送端係整合兩種以上混沌系統之整合型超混沌系統,經由所述整合型超混沌系統的複數個異質系統參數的設定產生複數個超混沌狀態訊號,用以將所述超混沌密文訊號混沌調變載於所述複數個超混沌狀態訊號形成超混沌金鑰訊息,並輸出該超混沌金鑰訊息;(C)所述接收端接收所述超混沌金鑰訊息;
(D)所述接收端響應發送端輸出的超混沌金鑰訊息,所述接收端係整合兩種以上混沌系統之整合型超混沌系統,經由所述接收端的所述整合型超混沌系統的複數個異質系統參數的設定產生複數個超混沌狀態估測訊號,並藉由一適應控制器調整所述接收端之系統參數,以使所述超混沌狀態估測訊號適應同步於所述發送端之超混沌狀態訊號,以解調出所述超混沌密文訊號;
(E)接著將所述超混沌密文訊號經超混沌解密,以還原得到正確之所述原始資訊明文;
其中,所述發送端的整合型混沌系統的動態方程式為:
如上所述之抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護方法,其中,所述原始資訊明文為圖片或文字。 The anti-external interference and the parameter-disturbed hyperchaotic signal as described above are adapted to the synchronous network data security transmission encryption protection method, wherein the original information plaintext is a picture or a text.
如上所述之抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護方法,其中,在將所述原始資訊明文混沌加密形成超混沌密文訊號之步驟中,係將圖片之RGB像素值或文字之ASC Ⅱ碼轉換成二進位得到B={B 1,B 2,...,B M×N };以超混沌訊號產生加密訊息,所述加密訊息再轉換成二進位金鑰,其中,T=abs(x ik )-floor(abs(x ik )),x ik 為超混沌訊號;所述二進位金鑰與上述所得到之二進位B={B 1,B 2,...,B M×N }做行列置換與同餘運算進行加密,加密後得到C={C 1,C 2,...,C M×N },其中進行XOR互斥運算;將加密後資訊轉回十進位的圖片之RGB像素值或文字之ASC Ⅱ碼,即得到加密後的圖片或文字。 The anti-external interference and the parameter-disturbed hyperchaotic signal as described above are adapted to the synchronous network data security transmission encryption protection method, wherein in the step of encrypting the original information plaintext to form a hyperchaotic ciphertext signal, the picture is taken The RGB pixel value or the ASC II code of the text is converted into binary bits to obtain B = { B 1 , B 2 , ..., B M × N }; the encrypted message is generated by the hyperchaotic signal, and the encrypted message is converted into two. Carry key Where T = abs ( x ik )- floor ( abs ( x ik )), x ik is a hyperchaotic signal; the binary key and the resulting binary B = { B 1 , B 2 ,. .., B M × N } performs row-column permutation and congruence operations for encryption, and obtains C = { C 1 , C 2 ,..., C M × N } after encryption. Perform XOR mutual exclusion operation; convert the encrypted information back to the RGB pixel value of the decimal image or the ASC II code of the text, that is, obtain the encrypted picture or text.
如上所述之抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護方法,其中,在將所述超混沌密文訊號經超混沌解密,以還原得到正確之所述原始資訊明文的步驟中,係將加密後圖片十進位之RGB像素值或加密後文字十進位之ASC Ⅱ碼轉換為二進位,得到C={C 1,C 2,...,C M×N },並以進行XOR互斥運算, 其中二進位金鑰,其中,T=abs(x ik )-floor(abs(x ik )),x ik 為超混沌訊號;接著將解密後得到之二進位B={B 1,B 2,...,B M×N }之圖片RGB像素值或文字ASC Ⅱ碼轉換成十進位,即能得到解密後的圖片或文字。 The anti-external interference and the parameter-disturbed hyperchaotic signal as described above are adapted to the synchronous network data security transmission encryption protection method, wherein the hyperchaotic ciphertext signal is decrypted by hyperchaos to restore the correct original In the step of clearing the information, the RGB pixel value of the encrypted image decimal digit or the ASC II code of the encrypted text decimal is converted into a binary digit, and C ={ C 1 , C 2 ,..., C M × N is obtained. },and Perform an XOR mutual exclusion operation, where the binary key , where T = abs ( x ik )- floor ( abs ( x ik )), x ik is a hyperchaotic signal; then the binary obtained by decryption B = { B 1 , B 2 ,..., B M × N } Picture RGB pixel value or text ASC II code is converted to decimal, that is, the decrypted picture or text can be obtained.
本發明之抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護系統及方法具有如下優點: 本發明將原始資訊明文加密形成超混沌密文訊號後,再將超混沌密文訊號混沌調變載於複數個超混沌狀態訊號形成超混沌金鑰訊息,而以超混沌金鑰訊息作為遮罩或載具將原始資訊明文由發送端傳送到接收端,最後再於接收端解調及解密以還原得到原始資訊明文,尤其發送端、接收端之間係採用不同參數的超混沌訊號設計,故能產生較為混亂之超混沌金鑰訊息,而不易被破解,確保資訊傳輸的安全性。 The network data security transmission encryption protection system and method for adapting to the super-chaotic signal of the external disturbance and the parameter disturbance of the invention has the following advantages: The invention encrypts the original information plaintext to form a hyperchaotic ciphertext signal, and then transforms the hyperchaotic ciphertext signal chaotic modulation into a plurality of hyperchaotic state signals to form a hyperchaotic key message, and uses the hyperchaotic key information as a mask. Or the carrier transmits the original information plaintext from the transmitting end to the receiving end, and finally demodulates and decrypts at the receiving end to restore the original information plaintext, especially the superchaotic signal design with different parameters between the transmitting end and the receiving end, It can generate chaotic key information of hyperchaos, and it is not easy to be cracked to ensure the security of information transmission.
(1)‧‧‧發送端 (1) ‧‧‧Send
(11)‧‧‧超混沌加密模組 (11)‧‧‧Superchaotic Encryption Module
(12)‧‧‧發送端超混沌安全傳輸模組 (12)‧‧‧Send Hyperchaotic Security Transmission Module
(2)‧‧‧接收端 (2) ‧‧‧ receiving end
(21)‧‧‧適應控制器 (21) ‧‧‧Adapted controller
(22)‧‧‧接收端超混沌安全傳輸模組 (22)‧‧‧ Receiver Hyperchaotic Security Transmission Module
(23)‧‧‧超混沌解密模組 (23)‧‧‧Superchaotic Decryption Module
(3)‧‧‧公開傳輸通道 (3) ‧ ‧ public transmission channel
第一圖:本發明實施例之抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護系統架構示意圖 The first figure is a schematic diagram of the architecture of the network data security transmission encryption protection system adaptive to synchronization of the anti-external interference and parameter disturbance in the embodiment of the present invention.
第二圖:本發明實施例之抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護方法流程示意圖 The second figure: a schematic diagram of a method for securely encrypting and protecting a data security transmission of a hyperchaotic signal that is resistant to external disturbances and parametric disturbances according to an embodiment of the present invention
第三圖:現有之發送一接收單向耦合混沌系統架構示意圖 Figure 3: Schematic diagram of the existing transmission-receive unidirectional coupling chaotic system architecture
為令本發明所運用之技術內容、發明目的及其達成之功效有更完整且清楚的揭露,茲於下詳細說明之,並請一併參閱所揭之圖式及圖號:請參看第一圖,係揭示本發明之抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護系統的架構示意圖。 For a more complete and clear disclosure of the technical content, the purpose of the invention and the effects thereof achieved by the present invention, the following is a detailed description, and please refer to the illustrated drawings and drawings: please refer to the first The figure shows a schematic diagram of the architecture of the network data security transmission encryption protection system for adapting the super-chaotic signal of the anti-external interference and the parameter disturbance to the synchronization of the present invention.
本發明之抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護系統,包括一發送端(1)與一接收端(2)。發送端(1)包括一超混沌加密模組(11)與一發送端超混沌安全傳輸模組(12)。接收端(2)包括一適應控制器(21)、一接收端超混沌安全傳輸模組(22)與一超混沌解密模組(23)。發送端超混沌安全傳輸模組(12)與適應控制器(21)透過一公開之信號傳輸通道(3)形成通訊連接。其中:超混沌加密模組(11),用以將一原始資訊明文混沌加密為一超混沌密文訊號;發送端超混沌安全傳輸模組(12),採用了整合兩種以上混沌系統的整合型超混沌系統,該整合型超混沌系統具有複數個異質系統參數,以經由複數個異質系統參數的設定產生複數個超混沌狀態訊號,用以將超混沌密文訊號混沌調變載於所述複數個超混沌狀態訊號形成超混沌金鑰訊息,並輸出該超混沌金鑰訊息;適應控制器(21),用以調整接收端超混沌安全傳輸模組 (22)系統參數;接收端超混沌安全傳輸模組(22),係響應發送端(1)輸出的超混沌金鑰訊息,其採用了整合兩種以上混沌系統的整合型超混沌系統,該整合型超混沌系統具有複數個異質系統參數,經由複數個異質系統參數的設定產生複數個超混沌狀態估測訊號,並藉由適應控制器(21)調整接收端超混沌安全傳輸模組(22)的系統參數,以使超混沌狀態估測訊號趨近於發送端超混沌安全傳輸模組(12)之超混沌狀態訊號,繼而適應同步,再予以解調出超混沌密文訊號;超混沌解密模組(23),係將超混沌密文訊號解密還原為原始資訊明文。 The anti-external interference and parameter-disturbed hyperchaotic signal of the invention adapts to the synchronous network data security transmission encryption protection system, comprising a transmitting end (1) and a receiving end (2). The transmitting end (1) comprises a hyperchaotic encryption module (11) and a transmitting end hyperchaotic secure transmission module (12). The receiving end (2) comprises an adaptive controller (21), a receiving end hyperchaotic secure transmission module (22) and a hyperchaotic decryption module (23). The transmitting end hyperchaotic secure transmission module (12) and the adaptive controller (21) form a communication connection through a public signal transmission channel (3). Among them: hyperchaotic encryption module (11), used to encrypt a original information plaintext chaotic encryption into a hyperchaotic ciphertext signal; the transmitting end hyperchaotic secure transmission module (12) adopts the integration of two or more chaotic systems. a hyperchaotic system, the integrated hyperchaotic system having a plurality of heterogeneous system parameters for generating a plurality of hyperchaotic state signals via a plurality of heterogeneous system parameters for carrying chaotic modulation of the hyperchaotic ciphertext signal A plurality of hyperchaotic state signals form a hyperchaotic key message, and output the hyperchaotic key message; the controller (21) is adapted to adjust the superchaotic secure transmission module at the receiving end (22) System parameters; the hyperchaotic secure transmission module (22) at the receiving end responds to the hyperchaotic key information output by the transmitting end (1), and adopts an integrated hyperchaotic system integrating two or more chaotic systems. The integrated hyperchaotic system has a plurality of heterogeneous system parameters, and generates a plurality of hyperchaotic state estimation signals through setting of a plurality of heterogeneous system parameters, and adjusts the receiving end hyperchaotic safety transmission module by adapting the controller (21) (22) The system parameters are such that the hyperchaotic state estimation signal approaches the hyperchaotic state signal of the hyperchaotic secure transmission module (12) at the transmitting end, and then adapts to the synchronization, and then demodulates the hyperchaotic ciphertext signal; hyperchaos The decryption module (23) decrypts the hyperchaotic ciphertext signal into the original information plaintext.
發送端超混沌安全傳輸模組(12)係利用整合兩種以上混沌系統之整合型超混沌系統(unified chaotic system)來達成。當某一個系統參數改變時,發送端超混沌安全傳輸模組(12)會呈現出三種不同類型的混沌動態行為,分別為Lorenz系統、Chen系統與Lü系統,將超混沌加密模組(11)所產生之超混沌密文訊號載入發送端超混沌安全傳輸模組(12)中,三種不同類型的混沌動態方程式為:
其中,x 1,x 2,x 3是發送端超混沌安全傳輸模組(12)的超混沌狀態訊號,,,是發送端超混沌安全傳輸模組(12)的超混沌狀態訊號的瞬時變化量,α [0,1]則做為發送端超混沌安全傳輸模組(12)的系統參數。當α [0,0.8)時系統會呈現出Lorenz系統動態行為;當α (0.8,1]時系統會呈現出Chen系統動態行為;當α=0.8時系統會呈現出Lü系統動態行為。因此,透過α的變化,便能令發送端超混沌安全傳輸模組(12)產生不可預測的超混沌狀態訊號x 1,x 2,x 3。 Where x 1 , x 2 , x 3 are hyperchaotic state signals of the hyperchaotic secure transmission module (12) at the transmitting end, , , Is the instantaneous change of the hyperchaotic state signal of the transmitting hyperchaotic secure transmission module (12), α [0,1] is used as the system parameter of the transmitting hyperchaotic secure transmission module (12). When α [0,0.8) the system may exhibit a dynamic Lorenz system behavior; when α (0.8,1), the system will show the dynamic behavior of Chen system; when α = 0.8, the system will show the dynamic behavior of Lü system. Therefore, through the change of α , the hyperchaotic secure transmission module can be made at the transmitting end (12) Unpredictable hyperchaotic state signals x 1 , x 2 , x 3 are generated.
接收端超混沌安全傳輸模組(22)係利用整合兩種以上混沌系統之整合型超混沌系統(unified chaotic system)來響應發送端(1)輸出的超混沌金鑰訊息,並藉由適應控制器(21)的運作調整接收端超混沌安全傳輸模組(22)系統參數,以使接收端超混沌安全傳輸模組(22)產生之超混沌狀態估測訊號趨近於發送端超混沌安全傳輸模組(12)之超混沌狀態訊號,繼而適應同步。其混沌動態方程式為:
其中,z 1,z 2,z 3是接收端超混沌安全傳輸模組(22)的超混沌狀態估測訊號,,,是接收端超混沌安全傳輸模組(22)的超混沌狀態估測訊號的瞬時變化量,β [0,1]則做為接收端超混沌安全傳輸模組(22)的系統參數。當β [0,0.8)時系統會呈現出Lorenz 系統動態行為;當β (0.8,1]時系統會呈現出Chen系統動態行為;當β=0.8時系統會呈現出Lü系統動態行為。因此,透過β的變化,便能令接收端超混沌安全傳輸模組(22)產生不可預測的超混沌狀態估測訊號z 1,z 2,z 3。 Where z 1 , z 2 , z 3 are hyperchaotic state estimation signals of the receiving hyperchaotic secure transmission module (22), , , It is the instantaneous change of the hyperchaotic state estimation signal of the hyperchaotic safety transmission module (22) at the receiving end, β [0,1] is used as the system parameter of the receiving end hyperchaotic security transmission module (22). When β [0,0.8) The system will exhibit the dynamic behavior of the Lorenz system; when β (0.8,1), the system will show the dynamic behavior of Chen system; when β = 0.8, the system will show the dynamic behavior of Lü system. Therefore, through the change of β , the hyperchaotic secure transmission module at the receiving end can be made (22) Unpredictable hyperchaotic state estimation signals z 1 , z 2 , z 3 are generated.
令e i =z i -x i ,i=1,2,3,帶入公式(1)與公式(2),可得:
其中,e i 是所述接收端的超混沌狀態估測訊號和所述發送端的超混沌狀態訊號的誤差,是e i =z i -x i 的瞬時變化量,假設參數α、β已知,則當u(t)=[u 1,u 2,u 3] T 時,可以從有效的控制方法中推導得到下式:
將公式(4)帶入公式(3)找出公式(3)的特徵值為-10、-1和-8/3,且隨著時間趨於無窮,超混沌訊號同步誤差e(t)=[e 1,e 2,e 3] T 也將收斂為零,發送端超混沌安全傳輸模組(12)與接收端超混沌安全傳輸模組(22)因此達到同步。 Bring formula (4) into formula (3) to find the eigenvalues of formula (3) are -10, -1, and -8/3, and as time goes to infinity, hyperchaotic signal synchronization error e ( t ) = [ e 1 , e 2 , e 3 ] T will also converge to zero, and the hyperchaotic secure transmission module (12) at the transmitting end and the hyperchaotic secure transmission module (22) at the receiving end are synchronized.
由於參數α、β事先通常未知且不確定,導致適應控制器(21)無法有效運作;因此為了使兩混沌模組達到自適應同步的狀態,必須設計參數α、β能自主更新規則,於是將公式(4)修改為:
其中,和是在發送端超混沌安全傳輸模組(12)與接收端超混沌安全傳輸模組(22)中分別針對受擾動之未知的參數α和β的估算值,將公式(5)代回公式(3)則可得:
有時候訊息通過信號傳輸通道(3)可能會有噪音干擾的頻道,假設發送端超混沌安全傳輸模組(12)損壞受擾動限制表示為:n(t)=[n 1,n 2,n 3] T ,且∥n∥ D b ,其中,∥n∥為噪音n(t)之歐幾里德範數,D b 為噪音界限。則公式(6)可以重新記為:
利用李雅普諾夫穩定性原理定義一李雅普諾夫函數(Lyapunov function)證明適應控制器(21)運用死區演算法,參數更新規則可重新定義為:
其中,γ 1,γ 2是正值,ε是一個很小的正數,而且
為驗證本發明發送端超混沌安全傳輸模組(12)與接收端超混沌安全傳輸模組(22)係整合兩種以上不同的混沌系統,在系統參數和未知且不確定,且考量信號傳輸通道(3)有干擾因素之下,本發明仍能使發送端(1)與接收端(2)的誤差動態軌跡收斂到趨近於零,即接收端超混沌安全傳輸模組(22)與發送端超混沌安全傳輸模組(12)適應同步,於下進一步說明。 In order to verify that the transmitting end hyperchaotic secure transmission module (12) and the receiving end hyperchaotic secure transmission module (22) are integrated with two or more different chaotic systems, the system parameters are with Unknown and uncertain, and considering that the signal transmission channel (3) has interference factors, the present invention can still converge the error dynamic trajectory of the transmitting end (1) and the receiving end (2) to approach zero, that is, the receiving end is super The chaotic secure transmission module (22) and the transmitting end hyperchaotic secure transmission module (12) are adapted to synchronize, as further explained below.
依據柯西-施瓦茨不等式(Cauchy-Schwarz inequality):x,y R n and |x.y|∥x∥∥y∥; Barbalat's理論:If y L ∞∩L 2 and L ∞,then ∥y∥→0 as t→∞; 李雅普諾夫穩定性理論(Lyapunov stability theroy):令x=0為的一平衡點,令V:D→R是與x=0的D相關的一個連續可微分函數,如此則在D-{0}中,V(0)=0且V(x)>0;在D中,(x)0,當x=0表示系統是為穩定的;假如在D-{0}中,(x)<0,當x=0表示系統是漸進穩定的。 According to Cauchy-Schwarz inequality: x,y R n and | x . y | ∥ x ∥∥ y ∥; Barbalat's theory: If y L ∞ ∩ L 2 and L ∞ , then ∥ y ∥ → 0 as t → ∞; Lyapunov stability theroy: Let x =0 be a point of equilibrium, such that V: D → R is a continuous differentiable function associated with D of x =0, such that in D - {0}, V (0) = 0 and V ( x ) >0; In D , ( x ) 0, when x =0 indicates that the system is stable; if in D -{0}, ( x ) < 0, when x =0 indicates that the system is progressively stable.
從公式(10)考慮李雅普諾夫函數(Lyapunov function):
其中且 among them And
藉由使用具有參數更新規則的公式(8)及公式(9)的適應控制器(21)經由公式(7)計算出V的導函數;可以輕易發現:,在∥e∥ ε;及
及
根據李亞普諾夫理論(Lyapunov stability theory),不等式(t)<0表示V(t)收斂到零,且為所有時間的邊界,即V L ∞,在公式(10)的V(t)定義指出e(t) L ∞,(t) L ∞及(t) L ∞,公式(11)及(12)意味e(t)的平方為可積分的函數,即e(t) L 2;此外,公式(6)顯示(t) L ∞,因為e(t) L ∞∩L 2及(t) L ∞,根據Barbalat's理論,則在t→∞時e(t)→0。 According to the Lyapunov theory, inequalities ( t )<0 means that V ( t ) converges to zero and is the boundary of all time, ie V L ∞ , the definition of V ( t ) in equation (10) indicates e ( t ) L ∞ , ( t ) L ∞ and ( t ) L ∞ , equations (11) and (12) mean that the square of e ( t ) is a function of integrable, ie e ( t ) L 2 ; in addition, formula (6) shows ( t ) L ∞ because e ( t ) L ∞ ∩ L 2 and ( t ) L ∞, according Barbalat's theory, as t → ∞ then e (t) → 0.
此即可證明本發明之接收端超混沌安全傳輸模組(22)與發送端超混沌安全傳輸模組(12)漸趨於同步。 This proves that the receiving end hyperchaotic secure transmission module (22) of the present invention and the transmitting end hyperchaotic secure transmission module (12) are gradually synchronized.
請配合參閱第二圖,其係揭示本發明實施例之抗外干擾與參數擾動的超混沌訊號適應同步之網路資料安全傳輸加密保護方法流程示意圖,此流程說明如下: (A)在所述發送端將原始資訊明文混沌加密形成超混沌密文訊號,使所述原始資訊明文以所述超混沌密文訊號為遮罩或載具而隱藏於所述超混沌密文訊號中傳輸; (B)在所述發送端經由複數個異質系統參數的設定產生複數個超混沌狀態訊號,用以將超混沌密文訊號混沌調變載於所述複數個超混沌狀態訊號形成超混沌金鑰訊息,並輸出該超混沌金鑰訊息; (C)所述接收端接收所述超混沌金鑰訊息; (D)所述接收端響應發送端輸出的超混沌金鑰訊息,經由複數個異質系統參數的設定產生複數個超混沌狀態估測訊號,並藉由適應控制器調整系統參數,以使超混沌狀態估測訊號適應同步於發送端之超混沌狀態訊號,以解調出超混沌密文訊號; (E)接著將所述超混沌密文訊號經超混沌解密,以還原得到正確之原始資訊明文。 Please refer to the second figure, which is a schematic flowchart for revealing a method for encrypting and protecting a network data security transmission of a super-chaotic signal that is resistant to external disturbances and parametric disturbances according to an embodiment of the present invention. The flow is described as follows: (A) chaotically encrypting the original information in the plaintext to form a hyperchaotic ciphertext signal, so that the original information plaintext is hidden in the hyperchaotic ciphertext by using the hyperchaotic ciphertext signal as a mask or a carrier. Transmission in the signal; (B) generating, by the transmitting end, a plurality of hyperchaotic state signals by setting a plurality of heterogeneous system parameters, wherein the chaotic modulation of the hyperchaotic ciphertext signal is carried on the plurality of hyperchaotic state signals to form a hyperchaotic key Message and output the hyperchaotic key message; (C) the receiving end receives the hyperchaotic key information; (D) the receiving end responds to the hyperchaotic key information outputted by the transmitting end, generates a plurality of hyperchaotic state estimation signals through setting of a plurality of heterogeneous system parameters, and adjusts system parameters by adapting the controller to make hyperchaos The state estimation signal is adapted to the hyperchaotic state signal synchronized with the transmitting end to demodulate the hyperchaotic ciphertext signal; (E) Then the hyperchaotic ciphertext signal is decrypted by hyperchaos to restore the correct original information plaintext.
其中,發送端的混沌動態方程式為:
z 1,z 2,z 3是接收端的超混沌狀態估測訊號,,,是所述接收端的超混沌狀態估測訊號的瞬時變化量,β為接收端的系統參數,透過β的變化,便能令接收端產生不可預測的超混沌狀態估測訊號z 1,z 2,z 3;適應控制器的方程式為:
其中,e i =z i -x i ,即e i 是所述接收端的超混沌狀態估測訊號和所述發送端的超混沌狀態訊號的誤差,是e i =z i -x i 的瞬時變化量,且發送端受擾動限制表示為:n(t)=[n 1,n 2,n 3] T ,且∥n∥ D b ,其中,∥n∥為噪音n(t)之歐幾里德範數,D b 為噪音界限;和是在發送端與接收端中分別針對受擾動之未知參數α和β的估算值;發送端與接收端參數更新規則定義為:
其中,在將原始資訊明文混沌加密形成超混沌密文訊號的步驟中,係將圖片之RGB像素值或文字之ASC Ⅱ碼轉換成二進位得到B={B 1,B 2,...,B M×N };以超混沌訊號產生加密訊息,所述加密訊息再轉換成二進位金鑰,其中,T=abs(x ik )-floor(abs(x ik )),x ik 為超混沌訊號;所述二進位金鑰與上述所得到之二進位B={B 1,B 2,...,B M×N }做行列置換與同餘運算進行加密,加密 後得到C={C 1,C 2,...,C M×N },其中進行XOR互斥運算;將加密後資訊轉回十進位的圖片之RGB像素值或文字之ASC Ⅱ碼,即可將原始資訊明文隱藏於加密後的圖片或文字形成超混沌密文訊號。 Wherein, in the step of encrypting the original information plaintext to form a hyperchaotic ciphertext signal, converting the RGB pixel value of the picture or the ASC II code of the character into a binary bit to obtain B = { B 1 , B 2 , ..., B M × N }; generating an encrypted message with a hyperchaotic signal, which is then converted into a binary key Where T = abs ( x ik )- floor ( abs ( x ik )), x ik is a hyperchaotic signal; the binary key and the resulting binary B = { B 1 , B 2 ,. .., B M × N } performs row-column permutation and congruence operations for encryption, and obtains C = { C 1 , C 2 ,..., C M × N } after encryption. Perform XOR mutual exclusion operation; convert the encrypted information back to the RGB pixel value of the decimal image or the ASC II code of the text, and then hide the original information plaintext in the encrypted picture or text to form a hyperchaotic ciphertext signal.
其中,在將超混沌密文訊號經超混沌解密,以還原得到正確之原始資訊明文的步驟中,係將超混沌密文訊號圖片十進位之RGB像素值或加密後文字十進位之ASC Ⅱ碼轉換為二進位,得到C={C 1,C 2,...,C M×N },並以進行XOR互斥運算,其中二進位金鑰,其中,T=abs(x ik )-floor(abs(x ik )),x ik 為超混沌訊號;接著將解密後得到之二進位B={B 1,B 2,...,B M×N }之圖片RGB像素值或文字ASC Ⅱ碼轉換成十進位,即能得到解密後的圖片或文字而還原原始資訊明文。 Wherein, in the step of decrypting the hyperchaotic ciphertext signal by hyperchaos to restore the correct original information plaintext, the RGB pixel value of the hyperchaotic ciphertext signal image or the ASC II code of the encrypted text decimal digit is used. Convert to binary, get C = { C 1 , C 2 ,..., C M × N }, and Perform an XOR mutual exclusion operation, where the binary key , where T = abs ( x ik )- floor ( abs ( x ik )), x ik is a hyperchaotic signal; then the binary obtained by decryption B = { B 1 , B 2 ,..., B M × N } Picture RGB pixel value or text ASC II code is converted to decimal, that is, the decrypted picture or text can be obtained to restore the original information plaintext.
以上所舉者僅係本發明之部份實施例,並非用以限制本發明,致依本發明之創意精神及特徵,稍加變化修飾而成者,亦應包括在本專利範圍之內。 The above is only a part of the embodiments of the present invention, and is not intended to limit the present invention. It is intended to be included in the scope of the present invention.
綜上所述,本發明實施例確能達到所預期之使用功效,又其所揭露之具體技術手段,不僅未曾見諸於同類產品中,亦未曾公開於申請前,誠已完全符合專利法之規定與要求,爰依法提出發明專利之申請,懇請惠予審查,並賜准專利,則實感德便。 In summary, the embodiments of the present invention can achieve the expected use efficiency, and the specific technical means disclosed therein have not been seen in similar products, nor have they been disclosed before the application, and have completely complied with the patent law. The regulations and requirements, the application for invention patents in accordance with the law, and the application for review, and the grant of patents, are truly sensible.
(1)‧‧‧發送端 (1) ‧‧‧Send
(11)‧‧‧超混沌加密模組 (11)‧‧‧Superchaotic Encryption Module
(12)‧‧‧發送端超混沌安全傳輸模組 (12)‧‧‧Send Hyperchaotic Security Transmission Module
(2)‧‧‧接收端 (2) ‧‧‧ receiving end
(21)‧‧‧適應控制器 (21) ‧‧‧Adapted controller
(22)‧‧‧接收端超混沌安全傳輸模組 (22)‧‧‧ Receiver Hyperchaotic Security Transmission Module
(23)‧‧‧超混沌解密模組 (23)‧‧‧Superchaotic Decryption Module
(3)‧‧‧公開傳輸通道 (3) ‧ ‧ public transmission channel
Claims (8)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW104129287A TWI571092B (en) | 2015-09-04 | 2015-09-04 | Encryption system for safe transmission of network data with adaptive synchronization of hyperchaotic signals free from external interference and parameter disturbance, and method for the same |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW104129287A TWI571092B (en) | 2015-09-04 | 2015-09-04 | Encryption system for safe transmission of network data with adaptive synchronization of hyperchaotic signals free from external interference and parameter disturbance, and method for the same |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TWI571092B true TWI571092B (en) | 2017-02-11 |
| TW201711418A TW201711418A (en) | 2017-03-16 |
Family
ID=58608189
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW104129287A TWI571092B (en) | 2015-09-04 | 2015-09-04 | Encryption system for safe transmission of network data with adaptive synchronization of hyperchaotic signals free from external interference and parameter disturbance, and method for the same |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI571092B (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112865874A (en) * | 2021-01-12 | 2021-05-28 | 上海交通大学 | Self-adaptive decryption optical encryption transmission system and method based on optical self-interference elimination |
| CN113141250A (en) * | 2021-05-19 | 2021-07-20 | 齐鲁工业大学 | Secret communication synchronous control method and device for chaotic system of sending end and receiving end |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI694708B (en) * | 2019-05-21 | 2020-05-21 | 樹德科技大學 | Network data encryption system based on chaos theory |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW200822662A (en) * | 2006-11-10 | 2008-05-16 | Wen-Wei Lin | Robust hyper-chaotic encryption-decryption system and method for digital secure-communication |
| TW201001966A (en) * | 2008-06-20 | 2010-01-01 | Univ Shu Te | Secure communication system and data transmission method thereof |
| TW201308967A (en) * | 2011-08-05 | 2013-02-16 | Univ Shu Te | Secure communication system and method having capability of estimating nonlinear signals |
| CN103888637A (en) * | 2014-04-08 | 2014-06-25 | 广东工业大学 | Method for chaotic encryption of multi-path image digital information |
| CN104410489A (en) * | 2014-12-25 | 2015-03-11 | 遵义国正科技有限责任公司 | Password processing method based on multiple chaotic systems |
| TW201528754A (en) * | 2014-01-13 | 2015-07-16 | Wen-Wei Lin | Encryption and decryption system and method using chaotic mapping with spatial-temporal perturbation |
-
2015
- 2015-09-04 TW TW104129287A patent/TWI571092B/en not_active IP Right Cessation
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW200822662A (en) * | 2006-11-10 | 2008-05-16 | Wen-Wei Lin | Robust hyper-chaotic encryption-decryption system and method for digital secure-communication |
| TW201001966A (en) * | 2008-06-20 | 2010-01-01 | Univ Shu Te | Secure communication system and data transmission method thereof |
| TW201308967A (en) * | 2011-08-05 | 2013-02-16 | Univ Shu Te | Secure communication system and method having capability of estimating nonlinear signals |
| TW201528754A (en) * | 2014-01-13 | 2015-07-16 | Wen-Wei Lin | Encryption and decryption system and method using chaotic mapping with spatial-temporal perturbation |
| CN103888637A (en) * | 2014-04-08 | 2014-06-25 | 广东工业大学 | Method for chaotic encryption of multi-path image digital information |
| CN104410489A (en) * | 2014-12-25 | 2015-03-11 | 遵义国正科技有限责任公司 | Password processing method based on multiple chaotic systems |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112865874A (en) * | 2021-01-12 | 2021-05-28 | 上海交通大学 | Self-adaptive decryption optical encryption transmission system and method based on optical self-interference elimination |
| CN112865874B (en) * | 2021-01-12 | 2022-07-01 | 上海交通大学 | Adaptive decryption optical encryption transmission system and method based on optical self-interference cancellation |
| CN113141250A (en) * | 2021-05-19 | 2021-07-20 | 齐鲁工业大学 | Secret communication synchronous control method and device for chaotic system of sending end and receiving end |
| CN113141250B (en) * | 2021-05-19 | 2022-04-22 | 齐鲁工业大学 | Secret communication synchronous control method and device for chaotic system of sending end and receiving end |
Also Published As
| Publication number | Publication date |
|---|---|
| TW201711418A (en) | 2017-03-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN115668867B (en) | Method and system for secure data sharing through granular access control | |
| US9641331B2 (en) | Method for converting a conditional access content and receiver for the implementation for said method | |
| CN105100115A (en) | Data storage method for privacy protection based on encryption password and data fractionation | |
| US10348502B2 (en) | Encrypting and decrypting data on an electronic device | |
| US20190199722A1 (en) | Systems and methods for networked computing | |
| CN113726725A (en) | Data encryption and decryption method and device, electronic equipment and storage medium | |
| CN108134671A (en) | A kind of transparent encryption system and its encipher-decipher method based on quantum true random number | |
| CN108075879A (en) | The method, apparatus and system of a kind of data encryption and decryption | |
| CN112653719A (en) | Automobile information safety storage method and device, electronic equipment and storage medium | |
| TWI571092B (en) | Encryption system for safe transmission of network data with adaptive synchronization of hyperchaotic signals free from external interference and parameter disturbance, and method for the same | |
| CN116501694A (en) | Data storage method, data reading method, electronic device and program product | |
| CN103561023A (en) | Method and device for sending and receiving communication information | |
| Jeong et al. | MonoPass: a password manager without master password authentication | |
| CN113691369B (en) | A Fibre Channel Secure Transmission System Based on Neural Network | |
| CN108494554A (en) | A kind of data symmetric encryption method based on double plaintexts | |
| TW202339460A (en) | Method and apparatus for provisioning node-locking confidential data | |
| CN112907247B (en) | Block chain authorization calculation control method | |
| KR101793528B1 (en) | Certificateless public key encryption system and receiving terminal | |
| US20100014670A1 (en) | One-Way Hash Extension for Encrypted Communication | |
| CN119109576A (en) | A white box key processing method and terminal based on quantum key distribution | |
| CN115296809B (en) | Data transmission method of intelligent engineering construction information system supporting asynchronous decryption at two ends | |
| CN110176985A (en) | A kind of information ciphering method, device and storage medium | |
| CN103532958A (en) | Method for encrypting website resources | |
| CN113691373A (en) | A quantum-resistant key escrow system and method based on consortium blockchain | |
| CN113507468A (en) | Encryption method, decryption method and authorization method based on block chain technology |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |