CN102624519A - Wireless sensor network-oriented mutual interference compound chaos stream cipher implementation method - Google Patents

Wireless sensor network-oriented mutual interference compound chaos stream cipher implementation method Download PDF

Info

Publication number
CN102624519A
CN102624519A CN2012100635246A CN201210063524A CN102624519A CN 102624519 A CN102624519 A CN 102624519A CN 2012100635246 A CN2012100635246 A CN 2012100635246A CN 201210063524 A CN201210063524 A CN 201210063524A CN 102624519 A CN102624519 A CN 102624519A
Authority
CN
China
Prior art keywords
chaos
logistic
mapping
tent
stream cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100635246A
Other languages
Chinese (zh)
Other versions
CN102624519B (en
Inventor
陈铁明
葛亮
蔡家楣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN201210063524.6A priority Critical patent/CN102624519B/en
Publication of CN102624519A publication Critical patent/CN102624519A/en
Application granted granted Critical
Publication of CN102624519B publication Critical patent/CN102624519B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Complex Calculations (AREA)

Abstract

The invention relates to a wireless sensor network-oriented mutual inference compound chaos stream cipher implementation method, which comprises the following steps of: (1) converting typical Logistic mappings and Tent mapping into a discrete function on an integer field and enabling a chaos sequence integer model to be implemented on a sensing node of a wireless sensor network which supports integer computation; (2) on the basis of an integer chaos function, establishing three Logistic chaos mappings with different initial values as a main chaos system, and then establishing a Tent chaos mapping as a chaos controller; and (3) enabling the chaos controller to mutually interfere with the three Logistic mappings, and simultaneously, enabling the Tent chaos controller to be compounded with the three Logistic chaos mappings to form a safer random cipher stream with longer period to further form a complete chaos stream cipher. The wireless sensor network-oriented mutual interference compound chaos stream cipher implementation method has favorable chaos characteristic and enhanced safety and practicability.

Description

A kind ofly disturb composite chaotic stream cipher implementation method mutually towards wireless sensor network
Technical field
The present invention relates to a kind of chaos stream cipher implementation method.
Background technology
The original meaning of chaos is meant unordered and chaotic state (being translated from English Chaos), is the definite phenomenon in non-linear, but shows certain pseudo-randomness.Some fundamental characteristics that chaos system had can satisfy secure communication and cryptographic basic demand just: the certainty of chaotic dynamics equation has guaranteed communicating pair reliable in transmitting-receiving process or the encryption and decryption process; The ergodic of chaotic orbit just in time satisfies first basic principle of the cryptographic system design of Shannon proposition, promptly spreads principle; Chaos parameter and initial value sensitiveness just in time satisfy second basic principle of the cryptographic system design that Shannon proposes, and promptly obscure principle.
Just because of this, the digital chaos cryptographic system has caused showing great attention to of relevant scholar with research based on the synchronous secret signalling of chaos.Because chaos system has simple in structure usually; The characteristics that calculate, iteration efficient are high; Therefore if can be based on this; Make up cryptographic algorithm safely and efficiently, then not only can its as existing password technology be replenished, effectively solve the safety problem on the resource-constrained embedded platform and can be used as a kind of lightweight scheme.Still very limited in view of the alternative encryption technology on the present wireless sensor network, security intensity and calculated performance can't obtain balance, and therefore, the novel chaos cipher scheme that improvement and design is used towards wireless sensor network has great application value.
The present invention will propose a kind of novel chaos stream cipher scheme that is applicable to that wireless sensor network node is realized.Introduce the technological rudimentary knowledge of relevant chaos stream cipher below earlier.
In a complete encryption system, if the hypothesis plaintext M, ciphertext C and key K are formed by sequence of binary digits, and then stream cipher system is with regard to available (M, C, K, E k, D k, describe for Z) hexa-atomic group.Wherein, E kBe AES, D kBe decipherment algorithm, Z is the key stream generating algorithm.For each k ∈ K, confirm a binary keys sequence z (k)=z by algorithm Z 1, z 2, z 3..., as plaintext m=m 1, m 2..., m nThe time, the ciphering process under key k is: to i=1, and 2,3 ..., n calculates
Figure BDA0000142540220000021
Ciphertext is c=E k(m)=c 1, c 2, c 3..., c n, decrypting process similarly.Fig. 1 has provided stream cipher secure communication model.
Be not difficult to find that the fail safe of stream cipher mainly depends on key stream z (k)=z 1, z 2, z 3..., so the stream cipher system key for design is how to design the sequence with good stochastic behaviour.Utilize chaos system, can produce the random sequence of similar noise.For the user who grasps system parameters, this sequence can produce easily; Otherwise sequence will be difficult to reconstruct or prediction, thereby make that the assailant is difficult to decode.So as long as correctly be used, we can be used for chaology the design of stream cipher fully.The analysis of many related algorithms and performance thereof has also appearred in this respect.For continuous chaotic system, a lot of chaos pseudo random sequences have been proved to be has good statistical property.
As the core of stream cipher, the chaos pseudo random number generator is the key of system design, and the sequence of its output is used as key stream, is used for encrypting (generally adopting xor operation) expressly.Random sequence wherein extracts generally has following two kinds of methods: the part or all of binary bits that 1) extracts chaotic orbit; 2) interval of definition with chaos system is divided into m disjoint subregion, gives unique numeral 0,1 of each zone marker ..., m-1 is through judging which zone chaotic orbit gets into and generate pseudo random number.Most of chaos stream cipher based on the chaos pseudo random number generator has used single chaos system.Different chaotic maps, as: the Logistic mapping, piecewise linearity (Tent) chaotic maps, the Chebyshev mapping, piecewise nonlinear chaotic maps etc. can both make up sequencer.
When the concrete application of chaos stream cipher and Digital Realization, owing to receive the restriction of limited precision conditions, will there be certain deviation in its dynamics with notional result, when generating key stream and use with encryption system, possibly produce uncertain potential safety hazard.The realization precision that a kind of obvious solution is the increase system, thus overcome the problem of digitlization chaos system, prolong sequence period.But its shortcoming is also fairly obvious; Bigger precision has just been brought bigger requirement to the realization and the operation of system; Especially under the limited computational resource background of embedded chip; This problem can not rely on the raising precision to solve merely, and must in design, seek the dynamics that effective method keeps chaotic maps as much as possible, to increase the cycle of the random sequence that sequencer was produced.
The method of disturbing the reinforcement digital chaotic system dynamics that is one type of novelty mutually of chaos system.Existing disclosed research shows that two chaos systems implement to disturb mutually to overcome finite precision effect; Through testing initial value sensitiveness, distribution character, autocorrelation and the their cross correlation after two Logistic mappings are implemented to disturb mutually; And the pseudo-random characteristics of sequence before and after the comparison disturbance, proved that chaos disturbs model mutually and can solve the chaotic dynamics performance degradation problem that limited precision causes effectively.
Chaos is disturbed model mutually and can be used following formula to describe:
x(t+1)=F(x(t))
y(t+1)=G(y(t),φ)
F is main chaos system, and G is the disturbance chaos system, and the perturbation vector that G produces produces disturbance, the Control Parameter φ of the output disturbance G of main simultaneously chaos system F to the output of main chaos system F.This is a kind of vague generalization model that two chaos systems are disturbed mutually that is directed against.The concrete model structure can have different designs.
In addition, the stack of multi-chaos system and mixing then are another kind of commonly used and reliable sequence period prolongation methods.Through the mode of stack, cascade, will have the similar chaos system of different parameters, initial value, or several kinds of different chaos systems combine, and can obtain the better system of chaotic characteristic, thereby produce the better sequence of randomness.These class methods just are called as compound chaos system usually.
At present, chaos is disturbed the chaos stream cipher project study that effectively combines with compound chaotic two class methods mutually and used very few.
Summary of the invention
In order to overcome the relatively poor deficiency of relatively poor, the safe and practical property of chaotic characteristic of existing chaos stream cipher implementation method, the present invention provide a kind of chaotic characteristic good, improve safe and practical property disturb composite chaotic stream cipher implementation method mutually towards wireless sensor network.
The technical solution adopted for the present invention to solve the technical problems is:
A kind of towards wireless sensor network disturb composite chaotic stream cipher implementation method mutually, the said composite chaotic stream cipher implementation method of disturbing mutually may further comprise the steps:
1) Logistic mapping and the Tent mapping with classics changes into the discrete function on the integer field, and chaos sequence integer model is realized on the sensing node of supporting the wireless sensor network that integer is calculated;
2) on integer chaotic function basis, make up the different Logistic chaotic maps of 3 initial values as main chaos system, make up a Tent chaotic maps again as the chaos controlling device;
3) disturbing mutually of described 1 Tent chaos controlling device realization and 3 Logistic chaotic maps, promptly the chaos iteration process of the chaos iteration process of Tent controller and 3 Logistic main systems is carried out mutual interference mutually; Simultaneously; Above-mentioned 1 Tent chaos controlling device is realized compound with 3 Logistic chaotic maps; Be the final output of the output Ctr regulation and control key stream of Tent controller, form longer random keystream of safer cycle, constitute a complete chaos stream cipher thus.
Further, in the said step 1), Logitic is shone upon the integer type chaos system that is transformed into a kind of time domain and the equal discretization of amplitude domain, concrete operations are following:
The Logistic mapping, its form is following:
x n + 1 = 1 - λx n 2 - - - ( I - 1 )
Wherein, x nRepresent the result of the n time iteration, x N+1Represent the n+1 time iteration result, system iterative parameter lambda ∈ [0,2], x nSpan be [1,1];
(I-1) formula both sides are multiplied by a 2, a ≠ 0:
a 2x n+1=a 2-λ(ax n) 2 (I-2)
Make z n=ax n+ a, then:
x n = z n a - 1 x n + 1 = z n + 1 a - 1 - - - ( I - 3 )
(I-3) formula is updated in (I-2) formula, gets λ=2 again, abbreviation obtains:
z n + 1 = 4 z n - 2 a z n 2 - - - ( I - 4 )
Adopt novel segmentation Tent mapping, its function is expressed as follows:
T ( t ) = 2 32 T ( t ) / q 0 &le; T ( t ) < q 2 32 ( T ( t ) - q ) / ( 2 31 - q ) q &le; T ( t ) < 2 31 ( 2 32 - T ( t ) - q ) / ( 2 31 - q ) 2 31 &le; T ( t ) < 2 32 - q 2 32 ( 2 32 - T ( t ) ) / q 2 32 - q &le; T ( t ) &le; 2 32 - - - ( II - 3 ) .
Further again, in the said step 3), set up a chaos and disturb mechanism mutually based on Logistic mapping and Tent mapping; Logistic is shone upon as main chaos system; Segmentation Tent shines upon as perturbed system, the mutual disturbance of the output valve after both iteration, and disturbing function designs as follows:
L′(t)=[T(t)-T(t)×2 -n+L(t)]mod2 W (III-1)
Wherein, W=32 is the iterative value precision, and n is the disturbance figure place, selects n=2 for use, so (III-1) formula is simplified shown as:
L′(t)=[T(t)&0x03+L(t)]mod2 W (III-2)
& wherein is " press bit with " operation, and promptly low 2 place values of intercepting T (t) value are as disturbing source;
Reaction type renewal to 3 Logistic chaos system iterative value is provided with following rule:
The corresponding No. 1 Logistic mapping of Sect1, if the value of T (t) is in this section, then getting L (t) is L 1(t), according to (III-2) formula Log1 being carried out reaction type upgrades;
The corresponding No. 2 Logistic mapping of Sect2, if the value of T (t) is in this section, then getting L (t) is L 2(t), according to (III-2) formula Log2 being carried out reaction type upgrades;
The corresponding No. 3 Logistic mapping of Sect3, if the value of T (t) is in this section, then getting L (t) is L 3(t), according to (III-2) formula Log3 being carried out reaction type upgrades;
The Logistic mapping that Sect4 is corresponding whole if the value of T (t) is in this section, is then carried out reaction type according to (III-2) formula to Log1, Log2 and Log3 and is upgraded.
Likewise, design the output of main chaos system the chaos controlling system is carried out disturbance, i.e. the output of 3 Logistic mappings will influence the state of 1 Tent chaos controlling device jointly, and disturbing function designs as follows:
T′(t)=[L 1(t)&0x03+L 2(t)&0x03+L 3(t)&0x03+T(t)]mod2 W (III-3)。
Further; In the said step 3), set up a Logistic mapping multiple mechanism based on Tent mapping control, Tent that will (II-3) formula shines upon and is divided into 4 sections from top to bottom; Be designated as Sect1, Sect2, Sect3 and Sect4 respectively, remember that again the output valve of 3 Logistic is respectively L 1, L 2, L 3, compound rule is following:
The corresponding No. 1 Logistic mapping of Sect1, i.e. Log1, total being output as at this moment
L 1 &CirclePlus; RShift n ( L 2 ) &CirclePlus; RShift n ( L 3 ) ;
The corresponding No. 2 Logistic mapping of Sect2, i.e. Log2, total being output as at this moment
RShift n ( L 1 ) &CirclePlus; L 2 &CirclePlus; RShift n ( L 3 ) ;
The corresponding No. 3 Logistic mapping of Sect3, i.e. Log3, total being output as at this moment
RShift n ( L 1 ) &CirclePlus; RShift n ( L 2 ) &CirclePlus; L 3 ;
The Logistic mapping that Sect4 is corresponding whole, total being output as
Figure BDA0000142540220000064
at this moment
Wherein, RShift nRepresent the function of ring shift right n position.
Beneficial effect of the present invention mainly shows: (1) proposition is a kind of disturbs chaotic maps and the compound novel chaos stream cipher scheme that combines of chaotic maps mutually; Can effectively solve the degenerate problem that the discretization of digital chaos is caused the chaotic dynamics characteristic; Can prolong the cycle of chaotic flow key random sequence safely and reliably again, improve the safe and practical property of chaos stream cipher.
(2) the calculating integer method of Logisitc and two kinds of chaotic maps functions of Tent; Can make the related computational process of chaos stream cipher only limit to the adding of integer/subtraction, multiplication and shifting function accomplishes; Need not division arithmetic; And need not the support of floating type computing environment, make scheme disclosed by the invention have the scope of application widely to the wireless sensor network platform, for example support Mica2 that CrossBow company produces etc. only to have the sensing node of 8 bit processors.
(3) composite chaotic stream cipher scheme related all algorithms and the computing formula of disturbing mutually disclosed by the invention, simple and practical, be easy to exploitation, efficient low-consume, be easy on all kinds of wireless senser built-in network platforms to realize modular develop and field.。
(4) along with the popularization of using based on the Internet of Things of wireless sensor network; The wireless sensor network security problem is more and more outstanding; The data security transmission that the present invention can be wireless sensor network provides novel solution; Especially wireless sensor network image, video safe transmission aspect are with concrete wide application prospect.
Description of drawings
Fig. 1 is the sketch map of stream cipher secure communication model.
Fig. 2 disturbs compound chaos stream cipher system configuration sketch map mutually.
Embodiment
Below in conjunction with accompanying drawing the present invention is further described.
With reference to Fig. 2, a kind of towards wireless sensor network disturb composite chaotic stream cipher implementation method mutually, the said composite chaotic stream cipher implementation method of disturbing mutually may further comprise the steps:
1) Logistic mapping and the Tent mapping with classics changes into the discrete function on the integer field, and chaos sequence integer model is realized on the sensing node of supporting the wireless sensor network that integer is calculated;
2) on integer chaotic function basis, make up the different Logistic chaotic maps of 3 initial values as main chaos system, make up a Tent chaotic maps again as the chaos controlling device;
3) disturbing mutually of described 1 Tent chaos controlling device realization and 3 Logistic chaotic maps, promptly the chaos iteration process of the chaos iteration process of Tent controller and 3 Logistic main systems is carried out mutual interference mutually; Simultaneously; Above-mentioned 1 Tent chaos controlling device is realized compound with 3 Logistic chaotic maps; Be the final output of the output Ctr regulation and control key stream of Tent controller, form longer random keystream of safer cycle, constitute a complete chaos stream cipher thus.
The entire system structure of the stream cipher scheme of present embodiment is as shown in Figure 1.
Integer chaotic maps: the following integer method of introducing Logistic mapping and Tent mapping.
The present invention adopts common Logistic mapping, and its form is following:
x n + 1 = 1 - &lambda;x n 2 - - - ( I - 1 )
As known technology, x nRepresent the result of the n time iteration, x N+1Represent the n+1 time iteration result, system iterative parameter lambda ∈ [0,2], x nSpan be [1,1].
μ is a system parameters.When μ be in (3.57,4] during this segment, the Logistics mapping demonstrates the characteristic of chaos, the system iterative value of this moment has the character of similar white noise from statistics, demonstrate characteristics at random.Although but that Logistic is mapped on the time domain is discrete, be still continuously on its codomain, the operational capability of the flush bonding processor that adopts in view of wireless sensing node is limited, does not generally directly support floating number and division arithmetic.Therefore, we are transformed into the integer type chaos system of a kind of time domain and the equal discretization of amplitude domain with Logitic, and concrete operations are following:
(I-1) formula both sides are multiplied by a 2(a ≠ 0):
a 2x n+1=a 2-λ(ax n) 2 (I-2)
Make z n=ax n+ a, then:
x n = z n a - 1 x n + 1 = z n + 1 a - 1 - - - ( I - 3 )
(I-3) formula is updated in (I-2) formula, gets λ=2 again, abbreviation obtains:
z n + 1 = 4 z n - 2 a z n 2 - - - ( I - 4 )
Because x n∈ [1,1] therefore has:
z n∈[0,2a] (I-5)
Making the value in (I-5) formula all is integer, if get a=2 L-1, L is the length of machine byte, and then the Z value in (I-5) formula just in time is the whole signless integer scope that machine word-length can be represented, and then (I-4) formula is exactly the interative computation in the signless integer scope that machine word-length is represented.
For as (I-4) interative computation of formula, in embedded system, calculate z easily nValue.For example, if machine word-length is 16bits, then desirable a=2 16/ 2=2 15=32768, the z of this moment nThe signless integer scope that ∈ [0,65536] just in time can represent corresponding to 16bits.In the process of iteration, calculate 4z nIn time, only need z nMove to left two; Calculate
Figure BDA0000142540220000093
The time only need with
Figure BDA0000142540220000094
Move to right 14.Like this, for the interative computation of (I-4) formula, the process of The whole calculations only needs the adding of integer/subtraction, multiplication and shifting function.Therefore, adopt the chaos iteration of (I-4) formula extremely to be suitable for the realization on the wireless sensor network node embedded chip.
For Logistic mapping as main chaos system, consider from the balance between sequence period length and computational resource expense, can choose the precision that word length is 32 bits during realization, i.e. L=32.Chaos controlling device in the stream cipher system is chosen common chaos system equally, adopts linear segmented Tent mapping commonly used here, and its function is expressed as follows:
x n + 1 = x n / p 0 &le; x n < p ( x n - p ) / ( 0.5 - p ) p &le; x n < 0.5 ( 1 - x n - p ) / ( 0.5 - p ) 0.5 &le; x n < 1 - p ( 1 - x n ) / p 1 - p &le; x n &le; 1 - - - ( II - 1 )
Be the unified precision that realizes, the integer operation is also done in described Tent mapping to (II-1) formula, multiply by 2 together in both members 32, obtain:
2 32 &CenterDot; x n + 1 = 2 32 &CenterDot; x n / p 0 &le; x n < p ( 2 32 &CenterDot; x n - 2 32 &CenterDot; p ) / ( 0.5 - p ) p &le; x n < 0.5 ( 2 32 - 2 32 &CenterDot; x n - 2 32 &CenterDot; p ) / ( 0.5 - p ) 0.5 &le; x n < 1 - p ( 2 32 - 2 32 &CenterDot; x n ) / p 1 - p &le; x n &le; 1 - - - ( II - 2 )
Wherein, p ∈ (0,0.5).Make T (t)=2 32X n, T (t+1)=2 is then arranged 32X N+1Make q=2 32P.Substitution (II-2) formula abbreviation obtains (II-3) formula, and wherein p ∈ (0,2 31).
T ( t ) = 2 32 T ( t ) / q 0 &le; T ( t ) < q 2 32 ( T ( t ) - q ) / ( 2 31 - q ) q &le; T ( t ) < 2 31 ( 2 32 - T ( t ) - q ) / ( 2 31 - q ) 2 31 &le; T ( t ) < 2 32 - q 2 32 ( 2 32 - T ( t ) ) / q 2 32 - q &le; T ( t ) &le; 2 32 - - - ( II - 3 ) .
Can obtain being applicable to that by said method integer type Logistic mapping and Tent that sensing node is realized shine upon.As shown in Figure 1; The segmentation characteristic of integer type Tent mapping is used as the controlled condition of system; In conjunction with integer type Logistic master chaos system; Constitute the major part of key stream generator, be about to the each iterative value Ctr of Tent mapping as Control Parameter, the Logistic chaos system of choosing different initial values carries out iteration and output.
The integer type chaotic maps is compound: set up a Logistic mapping multiple mechanism based on Tent mapping control.The Tent mapping of (II-3) formula is divided into 4 sections from top to bottom, is designated as Sect1, Sect2, Sect3 and Sect4 respectively.The output valve of remembering 3 Logistic among Fig. 1 again is respectively L 1, L 2, L 3The compound rule of design is following:
The corresponding No. 1 Logistic mapping of Sect1, i.e. Log1, total being output as at this moment
L 1 &CirclePlus; RShift n ( L 2 ) &CirclePlus; RShift n ( L 3 ) ;
The corresponding No. 2 Logistic mapping of Sect2, i.e. Log2, total being output as at this moment
RShift n ( L 1 ) &CirclePlus; L 2 &CirclePlus; RShift n ( L 3 ) ;
The corresponding No. 3 Logistic mapping of Sect3, i.e. Log3, total being output as at this moment
RShift n ( L 1 ) &CirclePlus; RShift n ( L 2 ) &CirclePlus; L 3 ;
The Logistic mapping that Sect4 is corresponding whole, total being output as
Figure BDA0000142540220000114
at this moment
Wherein, RShift nRepresent the function of ring shift right n position, for example, RShift 3(L 1) represent L 13 of ring shift rights.Because iterative value is with 32 bit representations, so get n=T (t) &0x1F ∈ [0,31].
The integer type chaotic maps is disturbed mutually: set up a chaos based on Logistic mapping and Tent mapping and disturb mechanism mutually.As main chaos system, segmentation Tent shines upon as perturbed system, the mutual disturbance of the output valve after both iteration with the Logistic mapping.Disturbing function designs as follows:
L′(t)=[T(t)-T(t)×2 -n+L(t)]mod2 W (III-1)
Wherein, W=32 is the iterative value precision, and n is the disturbance figure place, and for exempting to influence the good The statistical properties of original chaos sequence, the amplitude of disturbing signal should be much smaller than the amplitude of chaotic signal.Therefore choose less n value, select n=2 here for use, so (III-1) formula can be simplified shown as:
L′(t)=[T(t)&0x03+L(t)]mod2 W (III-2)
& wherein is " press bit with " operation, and promptly low 2 place values of intercepting T (t) value are as disturbing source, and overflowing of data avoided in last mould operation.
Reaction type renewal to 3 Logistic chaos system iterative value is provided with following rule:
The corresponding No. 1 Logistic mapping of Sect1, if the value of T (t) is in this section, then getting L (t) is L 1(t), according to (III-2) formula Log1 being carried out reaction type upgrades;
The corresponding No. 2 Logistic mapping of Sect2, if the value of T (t) is in this section, then getting L (t) is L 2(t), according to (III-2) formula Log2 being carried out reaction type upgrades;
The corresponding No. 3 Logistic mapping of Sect3, if the value of T (t) is in this section, then getting L (t) is L 3(t), according to (III-2) formula Log3 being carried out reaction type upgrades;
The Logistic mapping that Sect4 is corresponding whole if the value of T (t) is in this section, is then carried out reaction type according to (III-2) formula to Log1, Log2 and Log3 and is upgraded.
Likewise, design the output of main chaos system the chaos controlling system is carried out disturbance, i.e. the output of 3 Logistic mappings will influence the state of 1 Tent chaos controlling device jointly.Disturbing function designs as follows:
T′(t)=[L 1(t)&0x03+L 2(t)&0x03+L 3(t)&0x03+T(t)]mod2 W (III-3)
Stream cipher scheme safety and performance evaluation: in the composite chaotic sequence that produces, choose some different subsequences, length is 1M (1000,000) bit, 1 number on all bits in the statistics subsequence, result such as table 1.Can see, in the sequence on each bit 0 and 1 probability that occurs satisfy the basic demand of pseudo random sequence all near 50%.
Sequence number 1 2 3 4 5 6 7 8
Number of times 499709 499669 500108 500344 500165 500179 500618 499986
Sequence number 9 10 11 12 13 14 15 16
Number of times 500408 500479 500164 499729 500211 499712 500421 500422
Sequence number 17 18 19 20 21 22 23 24
Number of times 499920 499500 499484 500140 499652 500524 499937 499772
Sequence number 25 26 27 28 29 30 31 32
Number of times 500174 499843 499373 500357 499749 500945 499909 499956
Table 1
American National Standard technical research institute (NIST) has formulated a whole set of sequence randomness examination criteria, and test is wherein treated the order-checking row from different perspectives and made assessment with the departure degree of desirable random sequence.Accomplish following several to the present invention program and tested and provided respective description:
1) single-bit frequency test (Frequency (Monobit) Test): 0 and 1 separately ratio is paid close attention in whole sequence in this test, judges the deviation of itself and desirable random sequence.
2) packet bit frequency test (Frequency Test within a Block): the ratio of m-bit tract Nepit 1 is paid close attention in this test, judges the deviation of itself and desirable random sequence.
3) accumulation and test (Cumulative Sums Test): this test pay close attention to subsequence accumulation and maximum and the departure degree of desirable random sequence.The accumulation of subsequence and calculate through revised (1,1) sequence, test be divided into forward direction (Forward) with afterwards to (Backward) two kinds.
4) distance of swimming test (Runs Test): the sum of the distance of swimming in sequence (continuous 0 and 1 length) is paid close attention in this test, judges the deviation of itself and desirable random sequence.
5) maximum run test (Test for the Longest Run of Ones in a Block): the maximum run of m-bit tract Nepit 1 is paid close attention in this test, judges the deviation of itself and desirable random sequence.
6) rank of matrix test (Binary Matrix Rank Test): the order of the non-intersect submatrix of whole sequence is paid close attention in this test, checks in its original series the linear correlation degree between the fixed length word string.
7) discrete fourier changes test (Discrete Fourier Transform (Spectral) Test): the peak value that sequence Fourier changes is paid close attention in this test, detects the departure degree of its cyclophysis and desirable random sequence.
8) overlapping word matching test (Overlapping Template Matching Test): the occurrence number of goal-selling word string in sequence to be measured paid close attention in this test; Sliding window with m-bit during test carries out the word string coupling, and matching and searching is next time carried out in the window reach when hitting.
9) the general statistical test of Maurer (Maurer ' s " Universal Statistical " Test): the bit number between match pattern is each other paid close attention in sequence in this test.The purpose of test is whether the check testing data can be by lossless compress, if can significantly compress its size, then sequence randomness is doubtful.
10) approximate entropy test (Approximate Entropy Test): the probability that the subsequence of two adjacent lengths of this test concern overlaps; The complexity that the size of utilizing chaotic motion to produce amount of information is measured chaos sequence, with approximate entropy as its big or small criterion of judgement.
11) Serial test (Serial Test): the frequency that all possible m-bit sequence pattern occurs in sequence is paid close attention in this test, judges the deviation of itself and desirable random sequence.
12) linear complexity test (Linear Complexity Test): the length of the equivalent linear feedback register (LFSR) of sequence is paid close attention in this test, and bigger length could guarantee randomicity of sequences.
A cross-talk sequence is extracted in all tests from sequence to be measured, test and calculate a corresponding p-value according to difference, when p-value >=α, thinks that sequence passes through randomness and detect, and wherein α is the level of signifiance, and the default value in the NIST protos test suite PROTOS is 0.01.
Choose single Logistics mapping (being designated as Log) respectively; 3 Logistics mappings compound merely (XOR stack) (being designated as 3Log); And the sequence (being designated as TLog) of the composite chaotic system of disturbing the mutually generation of the present invention's proposition, the sequence that produces one section 100Mbits respectively is as test source.Test subsequence row length is 1Mbits, logging test results such as table 2.
Figure BDA0000142540220000141
Figure BDA0000142540220000151
Table 2
Do not mark with (*) in the table through the data that detect; Can find out; The sequence of using single Logistics mapping to be produced is difficult to satisfy higher randomness requirement, and the TLog scheme that the present invention proposes has been passed through test, and the sequence of generation has randomness preferably; In addition, 3 simple compound sequences that produce (3Log) of Logistic mapping have also been passed through test basically.
For two kinds of schemes (3Log and TLog), further choose 100 cross-talk sequences and repeat above-mentioned test through preliminary test.Adopt following two kinds of experience judgment criterion, for desirable random sequence, the p-value that its subsequence records also should present even distribution, testing result such as table 3 in [0,1] interval except should satisfying certain percent of pass.
Figure BDA0000142540220000152
Table 3
The p-value value that p-value in the table characterizes subsequence distributes, and is 0.0001 through the lower limit of testing, and is meant the sequence number of checking through p-value in 100 sub-sequence through ratio, and ideal value is greater than 96, does not still mark with (*) through the data that detect.Know that by testing result the sequence that the composite chaotic system of disturbing mutually that utilizes the present invention to propose produces, its randomness obviously are superior to simple Logistics stack hybrid system.
The application implementation example of stream encryption scheme: the sequence of utilizing the present invention program to produce; Can accomplish enciphering/deciphering through simple xor operation, provide the encryption embodiment that a stream encryption scheme of utilizing the present invention to propose is accomplished below digital picture to data flow.Here choose the piece image data, by the pixel encrypted image, be about to image and be regarded as a data flow forming by the pixel point value with the chaos sequence that generates.Value after the encryption is converted into pixel again, the image after the encryption of forming thus.Images category after the encryption is similar to noise signal, single can't draw the information of original image fully from image, like profile, color etc., but actual verification the practicality of this composite chaotic sequence.
Further; Through the grey level histogram of comparison original image and encryption back image, find that each pixel of image distributes more even through behind the composite chaotic sequential encryption on gray value; Promptly this key stream can be covered statistical information expressly well, guarantees the fail safe of encryption system.

Claims (4)

  1. One kind towards wireless sensor network disturb composite chaotic stream cipher implementation method mutually, it is characterized in that: the said composite chaotic stream cipher implementation method of disturbing mutually may further comprise the steps:
    1) Logistic mapping and the Tent mapping with classics changes into the discrete function on the integer field, and chaos sequence integer model is realized on the sensing node of supporting the wireless sensor network that integer is calculated;
    2) on integer chaotic function basis, make up the different Logistic chaotic maps of 3 initial values as main chaos system, make up a Tent chaotic maps again as the chaos controlling device;
    3) disturbing mutually of described 1 Tent chaos controlling device realization and 3 Logistic chaotic maps, promptly the chaos iteration process of the chaos iteration process of Tent controller and 3 Logistic main systems is carried out mutual interference mutually; Simultaneously; Above-mentioned 1 Tent chaos controlling device is realized compound with 3 Logistic chaotic maps; Be the final output of the output Ctr regulation and control key stream of Tent controller, form longer random keystream of safer cycle, constitute a complete chaos stream cipher thus.
  2. 2. as claimed in claim 1ly disturb composite chaotic stream cipher implementation method mutually towards wireless sensor network; It is characterized in that: in the said step 1); Logitic is shone upon the integer type chaos system that is transformed into a kind of time domain and the equal discretization of amplitude domain, and concrete operations are following:
    The Logistic mapping, its form is following:
    x n + 1 = 1 - &lambda;x n 2 - - - ( I - 1 )
    Wherein, x nRepresent the result of the n time iteration, x N+1Represent the n+1 time iteration result, system iterative parameter lambda ∈ [0,2], x nSpan be [1,1];
    (I-1) formula both sides are multiplied by a 2, a ≠ 0:
    a 2x n+1=a 2-λ(ax n) 2 (I-2)
    Make z n=ax n+ a, then:
    x n = z n a - 1 x n + 1 = z n + 1 a - 1 - - - ( I - 3 )
    (I-3) formula is updated in (I-2) formula, gets λ=2 again, abbreviation obtains:
    z n + 1 = 4 z n - 2 a z n 2 - - - ( I - 4 )
    Adopt novel segmentation Tent mapping, its function is expressed as follows:
    T ( t ) = 2 32 T ( t ) / q 0 &le; T ( t ) < q 2 32 ( T ( t ) - q ) / ( 2 31 - q ) q &le; T ( t ) < 2 31 ( 2 32 - T ( t ) - q ) / ( 2 31 - q ) 2 31 &le; T ( t ) < 2 32 - q 2 32 ( 2 32 - T ( t ) ) / q 2 32 - q &le; T ( t ) &le; 2 32 - - - ( II - 3 ) .
  3. 3. as claimed in claim 2ly disturb composite chaotic stream cipher implementation method mutually towards wireless sensor network; It is characterized in that: in the said step 3); Set up a chaos based on Logistic mapping and Tent mapping and disturb mechanism mutually, as main chaos system, segmentation Tent shines upon as perturbed system with the Logistic mapping; The mutual disturbance of output valve after both iteration, disturbing function designs as follows:
    L′(t)=[T(t)-T(t)×2 -n+L(t)]mod2 W (III-1)
    Wherein, W=32 is the iterative value precision, and n is the disturbance figure place, selects n=2 for use, so (III-1) formula is simplified shown as:
    L′(t)=[T(t)&0x03+L(t)]mod2 W (III-2)
    & wherein is " press bit with " operation, and promptly low 2 place values of intercepting T (t) value are as disturbing source;
    Reaction type renewal to 3 Logistic chaos system iterative value is provided with following rule:
    The corresponding No. 1 Logistic mapping of Sect1, if the value of T (t) is in this section, then getting L (t) is L 1(t), according to (III-2) formula Log1 being carried out reaction type upgrades;
    The corresponding No. 2 Logistic mapping of Sect2, if the value of T (t) is in this section, then getting L (t) is L 2(t), according to (III-2) formula Log2 being carried out reaction type upgrades;
    The corresponding No. 3 Logistic mapping of Sect3, if the value of T (t) is in this section, then getting L (t) is L 3(t), according to (III-2) formula Log3 being carried out reaction type upgrades;
    The Logistic mapping that Sect4 is corresponding whole if the value of T (t) is in this section, is then carried out reaction type according to (III-2) formula to Log1, Log2 and Log3 and is upgraded.
    Likewise, design the output of main chaos system the chaos controlling system is carried out disturbance, i.e. the output of 3 Logistic mappings will influence the state of 1 Tent chaos controlling device jointly, and disturbing function designs as follows:
    T′(t)=[L 1(t)&0x03+L 2(t)&0x03+L 3(t)&0x03+T(t)]mod2 W (III-3)。
  4. 4. as claimed in claim 3ly disturb composite chaotic stream cipher implementation method mutually towards wireless sensor network; It is characterized in that: in the said step 3); Set up a Logistic mapping multiple mechanism based on Tent mapping control; The Tent mapping of (II-3) formula is divided into 4 sections from top to bottom, is designated as Sect1, Sect2, Sect3 and Sect4 respectively, remember that again the output valve of 3 Logistic is respectively L 1, L 2, L 3, compound rule is following:
    The corresponding No. 1 Logistic mapping of Sect1, i.e. Log1, total being output as at this moment
    L 1 &CirclePlus; RShift n ( L 2 ) &CirclePlus; RShift n ( L 3 ) ;
    The corresponding No. 2 Logistic mapping of Sect2, i.e. Log2, total being output as at this moment
    RShift n ( L 1 ) &CirclePlus; L 2 &CirclePlus; RShift n ( L 3 ) ;
    The corresponding No. 3 Logistic mapping of Sect3, i.e. Log3, total being output as at this moment
    RShift n ( L 1 ) &CirclePlus; RShift n ( L 2 ) &CirclePlus; L 3 ;
    The Logistic mapping that Sect4 is corresponding whole, total being output as
    Figure FDA0000142540210000034
    at this moment
    Wherein, RShift nRepresent the function of ring shift right n position.
CN201210063524.6A 2012-03-12 2012-03-12 Wireless sensor network-oriented mutual interference compound chaos stream cipher implementation method Active CN102624519B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210063524.6A CN102624519B (en) 2012-03-12 2012-03-12 Wireless sensor network-oriented mutual interference compound chaos stream cipher implementation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210063524.6A CN102624519B (en) 2012-03-12 2012-03-12 Wireless sensor network-oriented mutual interference compound chaos stream cipher implementation method

Publications (2)

Publication Number Publication Date
CN102624519A true CN102624519A (en) 2012-08-01
CN102624519B CN102624519B (en) 2014-12-17

Family

ID=46564212

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210063524.6A Active CN102624519B (en) 2012-03-12 2012-03-12 Wireless sensor network-oriented mutual interference compound chaos stream cipher implementation method

Country Status (1)

Country Link
CN (1) CN102624519B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103490845A (en) * 2013-09-16 2014-01-01 哈尔滨工程大学 Improved Logistic-Map chaos spreading sequence generation device and method based on weighting
CN104954117A (en) * 2015-06-29 2015-09-30 宋煜 Sequence cipher generation system based on Logistic chaotic mapping transfer orbit judgment
CN105049204A (en) * 2015-07-30 2015-11-11 苏州中科启慧软件技术有限公司 Lightweight stream cipher technology VHC based on CTR mode and block cipher VH
CN108234466A (en) * 2017-12-26 2018-06-29 ***通信集团江苏有限公司 Information encryption communication method, device, computing device and storage medium
CN110677236A (en) * 2019-11-01 2020-01-10 辽宁工程技术大学 OFDM encryption method based on composite chaotic system and XOR operation
CN111093098A (en) * 2019-12-30 2020-05-01 北京电子科技学院 Logistic mapping-based chaotic encryption method
CN112272091A (en) * 2020-09-24 2021-01-26 北京石油化工学院 Method for generating multidimensional integer chaotic pseudorandom sequence with uniformly distributed characteristics
CN113343609A (en) * 2021-06-21 2021-09-03 中国人民解放军陆军炮兵防空兵学院 Communication security circuit design method based on public chaotic stream cipher encryption
CN114389787A (en) * 2021-12-06 2022-04-22 中南大学 Carrier-free information hiding method and system based on chaotic system and computer storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768606B (en) * 2018-05-10 2021-09-17 深圳市汇星数字技术有限公司 Streaming media real-time encryption method and system based on video transmission

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330378A (en) * 2008-07-07 2008-12-24 武汉大学 Method for generating chaos sequence

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330378A (en) * 2008-07-07 2008-12-24 武汉大学 Method for generating chaos sequence

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
QIAN FANG 等: "A chaos-based secure cluster protocol for wireless sensor networks", 《KYBERNETIKA》 *
刘金梅: "多个混沌***构造密码算法的理论及应用研究", 《华南理工大学博士学位论文》 *
陈铁明 等: "T inyTCSec: 一种新的轻量级无线传感器网络链路加密协议", 《传感技术学报》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103490845A (en) * 2013-09-16 2014-01-01 哈尔滨工程大学 Improved Logistic-Map chaos spreading sequence generation device and method based on weighting
CN103490845B (en) * 2013-09-16 2015-09-30 哈尔滨工程大学 Based on Adaptive MPEG I Coding System Based on Structure Segmentation generation device and the method for weighting process
CN104954117A (en) * 2015-06-29 2015-09-30 宋煜 Sequence cipher generation system based on Logistic chaotic mapping transfer orbit judgment
CN104954117B (en) * 2015-06-29 2018-01-23 宋煜 Stream cipher based on the judgement of Logistic chaotic maps transfer orbit generates system
CN105049204A (en) * 2015-07-30 2015-11-11 苏州中科启慧软件技术有限公司 Lightweight stream cipher technology VHC based on CTR mode and block cipher VH
CN108234466A (en) * 2017-12-26 2018-06-29 ***通信集团江苏有限公司 Information encryption communication method, device, computing device and storage medium
CN110677236A (en) * 2019-11-01 2020-01-10 辽宁工程技术大学 OFDM encryption method based on composite chaotic system and XOR operation
CN110677236B (en) * 2019-11-01 2022-10-21 辽宁工程技术大学 OFDM encryption method based on composite chaotic system and XOR operation
CN111093098A (en) * 2019-12-30 2020-05-01 北京电子科技学院 Logistic mapping-based chaotic encryption method
CN112272091A (en) * 2020-09-24 2021-01-26 北京石油化工学院 Method for generating multidimensional integer chaotic pseudorandom sequence with uniformly distributed characteristics
CN112272091B (en) * 2020-09-24 2023-06-20 北京石油化工学院 Method for generating multidimensional integer chaotic pseudorandom sequence with uniform distribution characteristic
CN113343609A (en) * 2021-06-21 2021-09-03 中国人民解放军陆军炮兵防空兵学院 Communication security circuit design method based on public chaotic stream cipher encryption
CN113343609B (en) * 2021-06-21 2023-07-07 中国人民解放军陆军炮兵防空兵学院 Communication secret circuit design method based on publicable chaotic stream cipher encryption
CN114389787A (en) * 2021-12-06 2022-04-22 中南大学 Carrier-free information hiding method and system based on chaotic system and computer storage medium
CN114389787B (en) * 2021-12-06 2024-05-07 中南大学 Carrier-free information hiding method and system based on chaotic system and computer storage medium

Also Published As

Publication number Publication date
CN102624519B (en) 2014-12-17

Similar Documents

Publication Publication Date Title
CN102624519B (en) Wireless sensor network-oriented mutual interference compound chaos stream cipher implementation method
Zhu et al. A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing
Liu et al. A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its’ applications in image encryption
Chen et al. An efficient image encryption scheme using lookup table-based confusion and diffusion
Akhshani et al. Pseudo random number generator based on quantum chaotic map
US9892211B2 (en) Searchable code processing system and method
CN109981252B (en) Artificial intelligence processor security enhancement system and method based on key path encryption
Ayoup et al. Efficient selective image encryption
Wang et al. A New V‐Net Convolutional Neural Network Based on Four‐Dimensional Hyperchaotic System for Medical Image Encryption
KR20130056314A (en) Searchable encryption processing system
CN108055120B (en) Method for detecting AES-OTR algorithm to resist differential fault attack
Ngo et al. Breaking masked and shuffled CCA secure Saber KEM by power analysis
WO2015193789A1 (en) Differential power analysis countermeasures
CN107437266A (en) Image encryption method based on chaos system Yu DNA chain displacement model
CN109756322A (en) Digital image encryption method based on DES structure and DNA encoding
Liu et al. A highly secure image encryption algorithm based on conservative hyperchaotic system and dynamic biogenetic gene algorithms
CN106656459A (en) Side channel energy analysis method and device for SM3-HMAC
Bhattacharjee et al. Unified GPU technique to boost confidentiality, integrity and trim data loss in big data transmission
CN104766350A (en) Image encryption method based on splicing model and hyper-chaotic system
Ye et al. Reversible image hiding algorithm based on compressive sensing and deep learning
CN108804931B (en) Neural network model encryption protection system and method related to domain transformation data encryption
Bian et al. Research on computer 3D image encryption processing based on the nonlinear algorithm
Ning et al. Construction of new 5D Hamiltonian conservative hyperchaotic system and its application in image encryption
Wu et al. Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation
Gao et al. New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant