[go: up one dir, main page]

CN118890154A - Hyperchaotic key one-time pad transmission method, device, equipment, medium and product - Google Patents

Hyperchaotic key one-time pad transmission method, device, equipment, medium and product Download PDF

Info

Publication number
CN118890154A
CN118890154A CN202411165571.0A CN202411165571A CN118890154A CN 118890154 A CN118890154 A CN 118890154A CN 202411165571 A CN202411165571 A CN 202411165571A CN 118890154 A CN118890154 A CN 118890154A
Authority
CN
China
Prior art keywords
hyperchaotic
key
value
parameters
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202411165571.0A
Other languages
Chinese (zh)
Other versions
CN118890154B (en
Inventor
于乐
刘仲思
马禹昇
张高山
赵蓓
洪东
詹义
朱华
王雪
巴特尔
倪宁宁
方明星
尹子轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Design Institute Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Design Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Design Institute Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202411165571.0A priority Critical patent/CN118890154B/en
Publication of CN118890154A publication Critical patent/CN118890154A/en
Application granted granted Critical
Publication of CN118890154B publication Critical patent/CN118890154B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3033Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a one-time pad transmission method, a device, equipment, a medium and a product of a hyper-chaos key, wherein chaos parameters and large prime parameters are obtained according to decryption by using a generated symmetric key; determining a chaotic function according to the chaotic parameters, and generating a random number sequence by adopting the chaotic function; generating a key stream according to the generated random number sequence and the large prime number parameter; and carrying out one-time one-secret data transmission according to the key stream. According to the scheme, based on preliminary encryption by the symmetric key, the one-time encryption key streams are respectively generated at two ends by combining the chaos theory, one-time encryption data transmission is performed by adopting the generated key streams, and a third party cannot acquire plaintext information under the condition that encrypted data can be decrypted, so that the security risk caused by sharing the key streams can be avoided, and the security performance of key transmission is improved.

Description

超混沌密钥一次一密传输方法、装置、设备、介质及产品Hyperchaotic key one-time pad transmission method, device, equipment, medium and product

技术领域Technical Field

本发明涉及安全技术领域,具体地说,涉及一种超混沌密钥一次一密传输方法、装置、设备、介质及产品。The present invention relates to the field of security technology, and in particular to a hyperchaotic key one-time-one-pad transmission method, device, equipment, medium and product.

背景技术Background Art

在数据传输安全防护中,一次一密被认为是最安全的防护方式。香农发现并证明了一次一密方法的理论意义,苏联数学家科特尔尼科夫在同时期证明了一次一密的绝对安全性。一次一密为了保障数据传输的安全性,会在通信双方每一次进行数据传输时使用新密钥进行数据加解密。In the data transmission security protection, the one-time pad is considered to be the most secure protection method. Shannon discovered and proved the theoretical significance of the one-time pad method, and Soviet mathematician Kotelnikov proved the absolute security of the one-time pad at the same time. In order to ensure the security of data transmission, the one-time pad will use a new key to encrypt and decrypt data every time the two communicating parties transmit data.

现有的一次一密传输方案,通过真随机数的产生方式生成对称密钥流用于每次的数据加解密传输,但此方法需要将对称密钥在发送方和接收方之间进行密钥共享,这种直接分享对称密钥流的方式存在安全风险。The existing one-time pad transmission scheme generates a symmetric key stream by generating true random numbers for each data encryption and decryption transmission. However, this method requires the symmetric key to be shared between the sender and the receiver. This direct sharing of the symmetric key stream poses security risks.

发明内容Summary of the invention

为了解决上述问题,本发明提出一种超混沌密钥一次一密传输方法、装置、设备、介质及产品,避免密钥流分享产生的安全风险,提高密钥传输的安全性能。In order to solve the above problems, the present invention proposes a hyperchaotic key one-time one-pad transmission method, device, equipment, medium and product to avoid the security risks caused by key stream sharing and improve the security performance of key transmission.

本发明实施例提供一种超混沌密钥一次一密传输方法,包括:The embodiment of the present invention provides a hyperchaotic key one-time one-pad transmission method, comprising:

使用生成的对称密钥解密获取的混沌参数以及大素数参数;Use the generated symmetric key to decrypt the obtained chaotic parameters and large prime number parameters;

根据所述混沌参数确定混沌函数,采用所述混沌函数生成随机数列;Determine a chaotic function according to the chaotic parameters, and use the chaotic function to generate a random number sequence;

根据生成的随机数列以及所述大素数参数产生密钥流;Generate a key stream according to the generated random number sequence and the large prime number parameter;

根据所述密钥流进行一次一密数据传输。The one-time pad data transmission is performed according to the key stream.

优选地,根据所述混沌参数确定混沌函数,采用所述混沌函数生成随机数列,包括:Preferably, determining a chaotic function according to the chaotic parameter, and using the chaotic function to generate a random number sequence comprises:

根据所述混沌参数中的一维分支参数确定一维混沌函数,并根据所述混沌参数中的超混沌参数确定降维超混沌函数;Determining a one-dimensional chaotic function according to the one-dimensional branch parameters in the chaotic parameters, and determining a reduced-dimensional hyperchaotic function according to the hyperchaotic parameters in the chaotic parameters;

将所述对称密钥作为一维混沌的初始值,对所述一维混沌函数进行预设次数的迭代,确定输出序列;Using the symmetric key as the initial value of the one-dimensional chaos, iterating the one-dimensional chaotic function for a preset number of times to determine an output sequence;

根据所述输出序列确定超混沌的初始值,将确定的初始值输入所述降维超混沌函数中,生成所述随机数列。The initial value of the hyperchaos is determined according to the output sequence, and the determined initial value is input into the dimension reduction hyperchaos function to generate the random number sequence.

作为一种优选方案,所述对称密钥生成过程,包括:As a preferred solution, the symmetric key generation process includes:

在可信执行环境中由SRAM PUF生成的真随机数;True random numbers generated by SRAM PUF in a trusted execution environment;

根据所述真随机数生成所述对称密钥。The symmetric key is generated according to the true random number.

作为一种优选方案,根据所述输出序列确定超混沌的初始值,包括:As a preferred solution, determining the initial value of hyperchaos according to the output sequence includes:

采用倒序取值的方式从所述输出序列中选取超混沌的初始值。The initial value of the hyperchaos is selected from the output sequence in a reverse order.

作为一种优选方案,根据所述密钥流进行一次一密数据传输,包括:As a preferred solution, performing one-time one-key data transmission according to the key stream includes:

将所述密钥流存储在可信执行环境中;storing the keystream in a trusted execution environment;

当待加密数据为敏感数据时,在所述可信执行环境中采用所述密钥流对所述待加密数据进行加密;When the data to be encrypted is sensitive data, encrypting the data to be encrypted using the key stream in the trusted execution environment;

当待加密数据不为敏感数据时,从所述可信执行环境中取出所述密钥流,并在常规环境中采用所述密钥流对所述待加密数据进行加密。When the data to be encrypted is not sensitive data, the key stream is taken out from the trusted execution environment, and the key stream is used to encrypt the data to be encrypted in a conventional environment.

作为一种优选方案,所述超混沌参数确定过程具体包括:As a preferred solution, the hyperchaotic parameter determination process specifically includes:

选定预设两个二维超混沌函数的二维参数的初步值;Selecting and presetting preliminary values of two-dimensional parameters of two two-dimensional hyperchaotic functions;

根据两个二维超混沌函数的分布图确定降维超混沌函数的降维参数,得到降维超混沌函数;Determine the dimension reduction parameter of the dimension reduction hyperchaotic function according to the distribution diagrams of the two two-dimensional hyperchaotic functions, and obtain the dimension reduction hyperchaotic function;

根据预先训练的人工智能模型对所述降维超混沌函数的分布图进行识别;Identifying the distribution graph of the dimension-reduced hyperchaotic function according to a pre-trained artificial intelligence model;

当识别结果为无效图时,在预设的范围内对所述二维参数中的二维分支参数进行调整,重新确定降维超混沌函数,并对重新确定的降维超混沌函数的分布图进行识别;When the recognition result is an invalid graph, the two-dimensional branch parameters in the two-dimensional parameters are adjusted within a preset range, the dimension reduction hyperchaotic function is re-determined, and the distribution graph of the re-determined dimension reduction hyperchaotic function is recognized;

当识别结果为有效图时,将最新的二维参数作为所述超混沌参数。When the recognition result is a valid graph, the latest two-dimensional parameters are used as the hyperchaotic parameters.

进一步地,根据两个二维超混沌函数的分布图确定降维超混沌函数的降维参数,得到降维超混沌函数,包括:Furthermore, the dimension reduction parameter of the dimension reduction hyperchaotic function is determined according to the distribution diagrams of the two two-dimensional hyperchaotic functions, and the dimension reduction hyperchaotic function is obtained, including:

确定两个二维超混沌函数的分布图的相对聚集区的上下边界以及相对离散区的上下边界;Determine the upper and lower boundaries of the relative aggregation area and the upper and lower boundaries of the relative discrete area of the distribution diagrams of two two-dimensional hyperchaotic functions;

构建所述降维超混沌函数的相对聚集区的上下边界以及相对离散区的上下边界与两个二维超混沌函数的分布图的相对聚集区的上下边界、相对离散区的上下边界,以及降维参数之间的函数关系;Constructing the functional relationship between the upper and lower boundaries of the relative aggregation area and the upper and lower boundaries of the relative discrete area of the dimensionality reduction hyperchaotic function and the upper and lower boundaries of the relative aggregation area and the upper and lower boundaries of the relative discrete area of the distribution diagrams of two two-dimensional hyperchaotic functions, and the dimensionality reduction parameters;

根据对所述降维超混沌函数的边界约束对所述函数关系进行求解,确定所述降维参数,根据所述降维参数确定所述降维超混沌函数。The functional relationship is solved according to the boundary constraints of the dimension reduction hyperchaotic function, the dimension reduction parameters are determined, and the dimension reduction hyperchaotic function is determined according to the dimension reduction parameters.

进一步地,确定两个二维超混沌函数的分布图的相对聚集区的上下边界以及相对离散区的上下边界,包括:Further, determining the upper and lower boundaries of the relative aggregation area and the upper and lower boundaries of the relative discrete area of the distribution diagrams of the two two-dimensional hyperchaotic functions includes:

对不同二维超混沌函数,分别统计二维超混沌函数的分布图中最小值分布点的最小数量以及最大值的最大值分布点的最大数量;For different two-dimensional hyperchaotic functions, the minimum number of minimum value distribution points and the maximum number of maximum value distribution points in the distribution diagram of the two-dimensional hyperchaotic function are counted respectively;

根据所述最大数量和所述最小数量的大小关系,确定相对聚集区以及相对离散区的分布;Determine the distribution of relatively concentrated areas and relatively discrete areas according to the size relationship between the maximum number and the minimum number;

在所述最大值与所述最小值间搜索符合预设的分界条件的分界值,作为所述相对聚集区和所述相对离散区的分界点,确定所述相对聚集区的上下边界以及所述相对离散区的上下边界。A demarcation value that meets the preset demarcation condition is searched between the maximum value and the minimum value as the demarcation point between the relative clustering area and the relative discrete area, and the upper and lower boundaries of the relative clustering area and the upper and lower boundaries of the relative discrete area are determined.

进一步地,在所述最大值与所述最小值间搜索符合预设的分界条件的分界值,包括:Further, searching for a demarcation value that meets a preset demarcation condition between the maximum value and the minimum value includes:

当所述最大数量小于所述最小数量时,将所述最小值增加预设的第一步长,更新当前判断值,统计当前判断值的当前判断数量,判断所述当前判断数量是否大于所述最小数量;When the maximum number is less than the minimum number, the minimum value is increased by a preset first step length, the current judgment value is updated, the current judgment number of the current judgment value is counted, and it is determined whether the current judgment number is greater than the minimum number;

若是,将所述当前判断数量作为前一判断数量,将所述当前判断值增加所述第一步长,更新当前判断值,重新统计当前判断数量,并判断当前判断数量是否大于前一判断数量;If so, taking the current judgment quantity as the previous judgment quantity, increasing the current judgment value by the first step length, updating the current judgment value, re-counting the current judgment quantity, and determining whether the current judgment quantity is greater than the previous judgment quantity;

若否,计算前一判断数量与当前判断数量的差值与前一判断数量的分界比值;If not, calculate the ratio of the difference between the previous judgment quantity and the current judgment quantity to the cutoff value of the previous judgment quantity;

当所述分界比值不大于预设的第一阈值时,将所述当前判断数量作为前一判断数量,将所述当前判断值增加所述步长,更新当前判断值,重新统计当前判断数量,并重新计算分界比值;When the demarcation ratio is not greater than a preset first threshold, the current judgment quantity is used as the previous judgment quantity, the current judgment value is increased by the step length, the current judgment value is updated, the current judgment quantity is recounted, and the demarcation ratio is recalculated;

当所述分界比值大于所述第一阈值时,将当前判断值作为所述分界值。When the demarcation ratio is greater than the first threshold, the current judgment value is used as the demarcation value.

作为一种优选方案,在所述最大值与所述最小值间搜索符合预设的分界条件的分界值,包括:As a preferred solution, searching for a demarcation value that meets a preset demarcation condition between the maximum value and the minimum value includes:

当所述最大数量大于所述最小数量时,将所述最大值减小预设的第二步长,更新当前判断值,统计当前判断值的当前判断数量,判断所述当前判断数量是否大于所述最大数量;When the maximum number is greater than the minimum number, reducing the maximum value by a preset second step length, updating the current judgment value, counting the current judgment number of the current judgment value, and determining whether the current judgment number is greater than the maximum number;

若是,将所述当前判断数量作为前一判断数量,将所述当前判断值减小所述第一步长,更新当前判断值,重新统计当前判断数量,并判断当前判断数量是否大于前一判断数量;If so, taking the current judgment number as the previous judgment number, reducing the current judgment value by the first step length, updating the current judgment value, re-counting the current judgment number, and determining whether the current judgment number is greater than the previous judgment number;

若否,计算前一判断数量与当前判断数量的差值与前一判断数量的分界比值;If not, calculate the ratio of the difference between the previous judgment quantity and the current judgment quantity to the cutoff value of the previous judgment quantity;

当所述分界比值不大于预设的第二阈值时,将所述当前判断数量作为前一判断数量,将所述当前判断值减小所述步长,更新当前判断值,重新统计当前判断数量,并重新计算分界比值;When the demarcation ratio is not greater than a preset second threshold, the current judgment quantity is used as the previous judgment quantity, the current judgment value is reduced by the step length, the current judgment value is updated, the current judgment quantity is recounted, and the demarcation ratio is recalculated;

当所述分界比值大于所述第二阈值时,将当前判断值作为所述分界值。When the demarcation ratio is greater than the second threshold, the current judgment value is used as the demarcation value.

本发明实施例还提供一种超混沌密钥一次一密传输装置,所述装置包括:The embodiment of the present invention further provides a hyperchaotic key one-time pad transmission device, the device comprising:

对称模块,用于使用生成的对称密钥解密获取的混沌参数以及大素数参数;A symmetric module, used for decrypting the obtained chaotic parameters and large prime number parameters using the generated symmetric key;

混沌模块,用于根据所述混沌参数确定混沌函数,采用所述混沌函数生成随机数列;A chaos module, used for determining a chaos function according to the chaos parameters, and generating a random number sequence using the chaos function;

密钥生成模块,用于根据生成的随机数列以及所述大素数参数产生密钥流;A key generation module, used to generate a key stream according to the generated random number sequence and the large prime number parameter;

传输模块,用于根据所述密钥流进行一次一密数据传输。The transmission module is used to perform one-time one-key data transmission according to the key stream.

优选地,所述混沌模块具体用于:Preferably, the chaos module is specifically used for:

根据所述混沌参数中的一维分支参数确定一维混沌函数,并根据所述混沌参数中的超混沌参数确定降维超混沌函数;Determining a one-dimensional chaotic function according to the one-dimensional branch parameters in the chaotic parameters, and determining a reduced-dimensional hyperchaotic function according to the hyperchaotic parameters in the chaotic parameters;

将所述对称密钥作为一维混沌的初始值,对所述一维混沌函数进行预设次数的迭代,确定输出序列;Using the symmetric key as the initial value of the one-dimensional chaos, iterating the one-dimensional chaotic function for a preset number of times to determine an output sequence;

根据所述输出序列确定超混沌的初始值,将确定的初始值输入所述降维超混沌函数中,生成所述随机数列。The initial value of the hyperchaos is determined according to the output sequence, and the determined initial value is input into the dimension reduction hyperchaos function to generate the random number sequence.

优选地,所述对称模块生成所述对称密钥的过程包括:Preferably, the process of generating the symmetric key by the symmetric module includes:

在可信执行环境中由SRAM PUF生成的真随机数;True random numbers generated by SRAM PUF in a trusted execution environment;

根据所述真随机数生成所述对称密钥。The symmetric key is generated according to the true random number.

优选地,所述混沌模块具体用于:Preferably, the chaos module is specifically used for:

采用倒序取值的方式从所述输出序列中选取超混沌的初始值。The initial value of the hyperchaos is selected from the output sequence in a reverse order.

优选地,所述传输模块具体用于:Preferably, the transmission module is specifically used for:

将所述密钥流存储在可信执行环境中;storing the keystream in a trusted execution environment;

当待加密数据为敏感数据时,在所述可信执行环境中采用所述密钥流对所述待加密数据进行加密;When the data to be encrypted is sensitive data, encrypting the data to be encrypted using the key stream in the trusted execution environment;

当待加密数据不为敏感数据时,从所述可信执行环境中取出所述密钥流,并在常规环境中采用所述密钥流对所述待加密数据进行加密。When the data to be encrypted is not sensitive data, the key stream is taken out from the trusted execution environment, and the key stream is used to encrypt the data to be encrypted in a conventional environment.

优选地,所述超混沌参数确定过程具体包括:Preferably, the hyperchaotic parameter determination process specifically includes:

选定预设两个二维超混沌函数的二维参数的初步值;Selecting and presetting preliminary values of two-dimensional parameters of two two-dimensional hyperchaotic functions;

根据两个二维超混沌函数的分布图确定降维超混沌函数的降维参数,得到降维超混沌函数;Determine the dimension reduction parameter of the dimension reduction hyperchaotic function according to the distribution diagrams of the two two-dimensional hyperchaotic functions, and obtain the dimension reduction hyperchaotic function;

根据预先训练的人工智能模型对所述降维超混沌函数的分布图进行识别;Identifying the distribution graph of the dimension-reduced hyperchaotic function according to a pre-trained artificial intelligence model;

当识别结果为无效图时,在预设的范围内对所述二维参数中的二维分支参数进行调整,重新确定降维超混沌函数,并对重新确定的降维超混沌函数的分布图进行识别;When the recognition result is an invalid graph, the two-dimensional branch parameters in the two-dimensional parameters are adjusted within a preset range, the dimension reduction hyperchaotic function is re-determined, and the distribution graph of the re-determined dimension reduction hyperchaotic function is recognized;

当识别结果为有效图时,将最新的二维参数作为所述超混沌参数。When the recognition result is a valid graph, the latest two-dimensional parameters are used as the hyperchaotic parameters.

进一步地,根据两个二维超混沌函数的分布图确定降维超混沌函数的降维参数,得到降维超混沌函数,包括:Furthermore, the dimension reduction parameter of the dimension reduction hyperchaotic function is determined according to the distribution diagrams of the two two-dimensional hyperchaotic functions, and the dimension reduction hyperchaotic function is obtained, including:

确定两个二维超混沌函数的分布图的相对聚集区的上下边界以及相对离散区的上下边界;Determine the upper and lower boundaries of the relative aggregation area and the upper and lower boundaries of the relative discrete area of the distribution diagrams of two two-dimensional hyperchaotic functions;

构建所述降维超混沌函数的相对聚集区的上下边界以及相对离散区的上下边界与两个二维超混沌函数的分布图的相对聚集区的上下边界、相对离散区的上下边界,以及降维参数之间的函数关系;Constructing the functional relationship between the upper and lower boundaries of the relative aggregation area and the upper and lower boundaries of the relative discrete area of the dimensionality reduction hyperchaotic function and the upper and lower boundaries of the relative aggregation area and the upper and lower boundaries of the relative discrete area of the distribution diagrams of two two-dimensional hyperchaotic functions, and the dimensionality reduction parameters;

根据对所述降维超混沌函数的边界约束对所述函数关系进行求解,确定所述降维参数,根据所述降维参数确定所述降维超混沌函数。The functional relationship is solved according to the boundary constraints of the dimension reduction hyperchaotic function, the dimension reduction parameters are determined, and the dimension reduction hyperchaotic function is determined according to the dimension reduction parameters.

进一步地,确定两个二维超混沌函数的分布图的相对聚集区的上下边界以及相对离散区的上下边界,包括Furthermore, the upper and lower boundaries of the relative aggregation area and the upper and lower boundaries of the relative discrete area of the distribution diagrams of the two two-dimensional hyperchaotic functions are determined, including

对不同二维超混沌函数,分别统计二维超混沌函数的分布图中最小值分布点的最小数量以及最大值的最大值分布点的最大数量;For different two-dimensional hyperchaotic functions, the minimum number of minimum value distribution points and the maximum number of maximum value distribution points in the distribution diagram of the two-dimensional hyperchaotic function are counted respectively;

根据所述最大数量和所述最小数量的大小关系,确定相对聚集区以及相对离散区的分布;Determine the distribution of relatively concentrated areas and relatively discrete areas according to the size relationship between the maximum number and the minimum number;

在所述最大值与所述最小值间搜索符合预设的分界条件的分界值,作为所述相对聚集区和所述相对离散区的分界点,确定所述相对聚集区的上下边界以及所述相对离散区的上下边界。A demarcation value that meets the preset demarcation condition is searched between the maximum value and the minimum value as the demarcation point between the relative clustering area and the relative discrete area, and the upper and lower boundaries of the relative clustering area and the upper and lower boundaries of the relative discrete area are determined.

进一步地,在所述最大值与所述最小值间搜索符合预设的分界条件的分界值,包括:Further, searching for a demarcation value that meets a preset demarcation condition between the maximum value and the minimum value includes:

当所述最大数量小于所述最小数量时,将所述最小值增加预设的第一步长,更新当前判断值,统计当前判断值的当前判断数量,判断所述当前判断数量是否大于所述最小数量;When the maximum number is less than the minimum number, the minimum value is increased by a preset first step length, the current judgment value is updated, the current judgment number of the current judgment value is counted, and it is determined whether the current judgment number is greater than the minimum number;

若是,将所述当前判断数量作为前一判断数量,将所述当前判断值增加所述第一步长,更新当前判断值,重新统计当前判断数量,并判断当前判断数量是否大于前一判断数量;If so, taking the current judgment quantity as the previous judgment quantity, increasing the current judgment value by the first step length, updating the current judgment value, re-counting the current judgment quantity, and determining whether the current judgment quantity is greater than the previous judgment quantity;

若否,计算前一判断数量与当前判断数量的差值与前一判断数量的分界比值;If not, calculate the ratio of the difference between the previous judgment quantity and the current judgment quantity to the cutoff value of the previous judgment quantity;

当所述分界比值不大于预设的第一阈值时,将所述当前判断数量作为前一判断数量,将所述当前判断值增加所述步长,更新当前判断值,重新统计当前判断数量,并重新计算分界比值;When the demarcation ratio is not greater than a preset first threshold, the current judgment quantity is used as the previous judgment quantity, the current judgment value is increased by the step length, the current judgment value is updated, the current judgment quantity is recounted, and the demarcation ratio is recalculated;

当所述分界比值大于所述第一阈值时,将当前判断值作为所述分界值。When the demarcation ratio is greater than the first threshold, the current judgment value is used as the demarcation value.

作为一种优选方案,在所述最大值与所述最小值间搜索符合预设的分界条件的分界值,包括:As a preferred solution, searching for a demarcation value that meets a preset demarcation condition between the maximum value and the minimum value includes:

当所述最大数量大于所述最小数量时,将所述最大值减小预设的第二步长,更新当前判断值,统计当前判断值的当前判断数量,判断所述当前判断数量是否大于所述最大数量;When the maximum number is greater than the minimum number, reducing the maximum value by a preset second step length, updating the current judgment value, counting the current judgment number of the current judgment value, and determining whether the current judgment number is greater than the maximum number;

若是,将所述当前判断数量作为前一判断数量,将所述当前判断值减小所述第一步长,更新当前判断值,重新统计当前判断数量,并判断当前判断数量是否大于前一判断数量;If so, taking the current judgment number as the previous judgment number, reducing the current judgment value by the first step length, updating the current judgment value, re-counting the current judgment number, and determining whether the current judgment number is greater than the previous judgment number;

若否,计算前一判断数量与当前判断数量的差值与前一判断数量的分界比值;If not, calculate the ratio of the difference between the previous judgment quantity and the current judgment quantity to the cutoff value of the previous judgment quantity;

当所述分界比值不大于预设的第二阈值时,将所述当前判断数量作为前一判断数量,将所述当前判断值减小所述步长,更新当前判断值,重新统计当前判断数量,并重新计算分界比值;When the demarcation ratio is not greater than a preset second threshold, the current judgment quantity is used as the previous judgment quantity, the current judgment value is reduced by the step length, the current judgment value is updated, the current judgment quantity is recounted, and the demarcation ratio is recalculated;

当所述分界比值大于所述第二阈值时,将当前判断值作为所述分界值。When the demarcation ratio is greater than the second threshold, the current judgment value is used as the demarcation value.

本发明实施例还提供一种终端设备,包括处理器、存储器以及存储在所述存储器中且被配置为由所述处理器执行的计算机程序,所述处理器执行所述计算机程序时实现如上述任一项实施例所述的一种超混沌密钥一次一密传输方法。An embodiment of the present invention also provides a terminal device, including a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, and when the processor executes the computer program, it implements a hyper-chaotic key one-time one-pad transmission method as described in any of the above embodiments.

本发明实施例还提供一种计算机可读存储介质,所述计算机可读存储介质包括存储的计算机程序,其中,在所述计算机程序运行时控制所述计算机可读存储介质所在设备执行如上述任一项实施例所述的一种超混沌密钥一次一密传输方法。An embodiment of the present invention also provides a computer-readable storage medium, which includes a stored computer program, wherein when the computer program is running, the device where the computer-readable storage medium is located is controlled to execute a hyper-chaotic key one-time pad transmission method as described in any of the above embodiments.

本发明实施例还提供一种计算机程序产品,包括计算机程序/指令,该计算机程序/指令被处理器执行时实现上述任一项实施例所述方法的步骤。An embodiment of the present invention further provides a computer program product, including a computer program/instruction, which implements the steps of the method described in any of the above embodiments when executed by a processor.

与现有技术相比,本发明提供一种超混沌密钥一次一密传输方法、装置、设备、介质及产品,根据使用生成的对称密钥解密获取的混沌参数以及大素数参数;根据所述混沌参数确定混沌函数,采用所述混沌函数生成随机数列;根据生成的随机数列以及所述大素数参数产生密钥流;根据所述密钥流进行一次一密数据传输。本申请方案基于对称密钥进行初步加密的基础上,结合混沌理论在两端分别生成一次一密的密钥流,采用生成的密钥流进行一次一密数据传输,在保证加密数据可解密的情况下又使第三方无法获取明文信息,能够避免密钥流分享产生的安全风险,提高密钥传输的安全性能。Compared with the prior art, the present invention provides a hyperchaotic key one-time secret transmission method, device, equipment, medium and product, which obtains chaotic parameters and large prime number parameters by decrypting with a generated symmetric key; determines a chaotic function according to the chaotic parameters, and uses the chaotic function to generate a random number sequence; generates a key stream according to the generated random number sequence and the large prime number parameters; and performs one-time secret data transmission according to the key stream. The present application scheme is based on the preliminary encryption of symmetric keys, and combines chaos theory to generate a one-time secret key stream at both ends, and uses the generated key stream to perform one-time secret data transmission. While ensuring that the encrypted data can be decrypted, the third party cannot obtain the plaintext information, which can avoid the security risks caused by key stream sharing and improve the security performance of key transmission.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1是本发明实施例提供的超混沌密钥一次一密传输方法的流程示意图;1 is a schematic diagram of a flow chart of a hyperchaotic key one-time pad transmission method provided by an embodiment of the present invention;

图2是本发明实施例提供的分支参数对应分岔图;FIG2 is a bifurcation diagram corresponding to branch parameters provided in an embodiment of the present invention;

图3是本发明实施例提供的传输系统的结构示意图;3 is a schematic diagram of the structure of a transmission system provided in an embodiment of the present invention;

图4是本发明实施例提供的数据加解密传输流程示意图;FIG4 is a schematic diagram of a data encryption and decryption transmission process according to an embodiment of the present invention;

图5是本发明实施例提供的数据包加密过程的流程示意图;5 is a schematic diagram of a flow chart of a data packet encryption process provided by an embodiment of the present invention;

图6是本发明实施例提供的二维超混沌函数Xn的分布图;FIG6 is a distribution diagram of a two-dimensional hyperchaotic function Xn provided in an embodiment of the present invention;

图7是本发明实施例提供的二维超混沌函数Yn的分布图;FIG7 is a distribution diagram of a two-dimensional hyperchaotic function Yn provided in an embodiment of the present invention;

图8是本发明实施例提供的人工智能模型的结构示意图;FIG8 is a schematic diagram of the structure of an artificial intelligence model provided by an embodiment of the present invention;

图9是本发明实施例提供的降维超混沌函数的分布图;FIG9 is a distribution diagram of a dimensionality reduction hyperchaotic function provided in an embodiment of the present invention;

图10是本发明实施例提供的u=3.9,初始值取0.4时一维logistic函数的分布图;FIG10 is a distribution diagram of a one-dimensional logistic function when u=3.9 and the initial value is 0.4 provided by an embodiment of the present invention;

图11是本发明实施例提供的一种超混沌密钥一次一密传输装置的结构示意图;11 is a schematic diagram of the structure of a hyperchaotic key one-time pad transmission device provided in an embodiment of the present invention;

图12是本发明实施例提供的一种终端设备的结构示意图。FIG. 12 is a schematic diagram of the structure of a terminal device provided in an embodiment of the present invention.

具体实施方式DETAILED DESCRIPTION

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will be combined with the drawings in the embodiments of the present invention to clearly and completely describe the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of the present invention.

可以理解的,如下描述的各个实施例可以在符合逻辑的情况下进行结合或组合,本发明实施例对各种组合不再一一赘述。It can be understood that the various embodiments described below can be combined or combined in a logical manner, and the embodiments of the present invention will not describe various combinations one by one.

在数据传输中,需要对传输内容进行信息覆盖以防止被第三方获取。基于密钥体系的数据安全传输是现在通行的数据传输安全处理方式。将要传输的明文通过密钥进行加密,加密后的密文在对方无解密密钥的情况下无法获取明文内容。根据密钥的产生使用方式又分为了对称密钥和非对称密钥。对称密钥是加密和解密使用同一个密钥,而非对称密钥是在产生时生成一对密钥,分别叫公钥和私钥,用公钥进行加密,用私钥进行解密。In data transmission, the content needs to be covered with information to prevent it from being obtained by a third party. Secure data transmission based on a key system is now a common way to handle data transmission security. The plain text to be transmitted is encrypted with a key, and the encrypted ciphertext cannot be obtained without the decryption key of the other party. According to the generation and use of keys, they are divided into symmetric keys and asymmetric keys. Symmetric keys use the same key for encryption and decryption, while asymmetric keys generate a pair of keys when they are generated, called public keys and private keys, respectively. The public key is used for encryption and the private key is used for decryption.

现有使用较多的数据传输保密方案是使用非对称密钥的机制将生成的对称密钥进行秘密共享,在进行数据传输时一直使用此对称密钥,与一次一密是不同的,一次一密是在数据传输时没传输一次数据包就更性一次密钥,因此一直使用同一个密钥进行数据传输仍有安全风险。The currently more commonly used data transmission confidentiality scheme is to use an asymmetric key mechanism to secretly share the generated symmetric key, and always use this symmetric key during data transmission. This is different from a one-time pad, which is a key that is updated once every time a data packet is transmitted during data transmission. Therefore, there are still security risks in always using the same key for data transmission.

一次一密为了保障数据传输的安全性,会在通信双方每一次进行数据传输时使用新密钥进行数据加解密。In order to ensure the security of data transmission, a new key will be used to encrypt and decrypt data each time the two communicating parties transmit data.

现有的一次一密传输方案,通过真随机数的产生方式生成对称密钥流用于每次的数据加解密传输,但此方法需要将对称密钥在发送方和接收方之间进行密钥共享,这种直接分享对称密钥流的方式存在安全风险。The existing one-time pad transmission scheme generates a symmetric key stream by generating true random numbers for each data encryption and decryption transmission. However, this method requires the symmetric key to be shared between the sender and the receiver. This direct sharing of the symmetric key stream poses security risks.

针对上述技术问题,本申请提供一种超混沌密钥一次一密传输方法,参见图1,是本发明实施例提供的超混沌密钥一次一密传输方法的流程示意图,所述方法包括以下步骤:In view of the above technical problems, the present application provides a hyperchaotic key one-time one-pad transmission method. Referring to FIG1 , it is a flow chart of the hyperchaotic key one-time one-pad transmission method provided by an embodiment of the present invention. The method comprises the following steps:

步骤S1,使用生成的对称密钥解密获取的混沌参数以及大素数参数;Step S1, using the generated symmetric key to decrypt the obtained chaotic parameters and large prime number parameters;

步骤S2,根据所述混沌参数确定混沌函数,采用所述混沌函数生成随机数列;Step S2, determining a chaotic function according to the chaotic parameters, and using the chaotic function to generate a random number sequence;

步骤S3,根据生成的随机数列以及所述大素数参数产生密钥流;Step S3, generating a key stream according to the generated random number sequence and the large prime number parameter;

步骤S4,根据所述密钥流进行一次一密数据传输。Step S4, performing one-time one-key data transmission according to the key stream.

在本实施例具体实施时,本案在具体执行时,应用于通信端,在具体通信时,首先其通过生成对称密钥确定混沌参数以及大素数参数。When this embodiment is implemented specifically, this case is applied to the communication end during specific execution. During specific communication, it first determines the chaotic parameters and large prime number parameters by generating a symmetric key.

依据对称密钥的生成原理生成对称密钥keyg。对称密钥keyg主要用于保护通信双方首次握手时的数据传输安全问题,即通信双方握手时获取的混沌参数以及大素数参数采用对称密钥加密,因此需要通过对称密钥才能解密获取的混沌参数以及大素数参数,得到混沌参数以及大素数参数。The symmetric key keyg is generated according to the generation principle of the symmetric key. The symmetric key keyg is mainly used to protect the data transmission security problem when the communicating parties shake hands for the first time, that is, the chaotic parameters and large prime parameters obtained by the communicating parties during the handshake are encrypted with a symmetric key, so the symmetric key is needed to decrypt the obtained chaotic parameters and large prime parameters to obtain the chaotic parameters and large prime parameters.

大素数参数用于生成密钥流,根据离散对数数学原理,在一个很大的素数情况下,以下过程是很难被破解的。约定数据传输两端分别叫Client1和Client2Large prime number parameters are used to generate key streams. According to the mathematical principle of discrete logarithms, in the case of a large prime number, the following process is difficult to crack. The two ends of the data transmission are called Client1 and Client2.

首先在Client1和Client2之间共享大素数p和G,无需加密,可以明文公开。First, large prime numbers p and G are shared between Client1 and Client2 without encryption and can be made public in plain text.

Client1生成随机数a,计算A=Ga(mod p),将A与Client2共享,明文发送。Client1 generates a random number a, calculates A=G a (mod p), shares A with Client2, and sends it in plain text.

Client2生成随机数b,计算B=Gb(mod p),将B与Client1共享,明文发送。Client2 generates a random number b, calculates B = G b (mod p), shares B with Client1, and sends it in plain text.

对于Client1端的密钥Ka=Ba(mod p)=(Gb(mod p))a(mod p)=(Gba(mod p))(modp)。For the key of Client 1, Ka = Ba (mod p) = ( Gb (mod p)) a (mod p) = ( Gba (mod p))(modp).

对于Client2端的密钥Kb=Ab(mod p)=(Ga(mod p))b(mod p)=(Gab(mod p))(modp)。For the key of Client 2, K b =A b (mod p) =(G a (mod p)) b (mod p) =(G ab (mod p))(mod p).

因此在两端共享随机数的情况下,两端生成的密钥Ka=KbTherefore, when both ends share the random number, the key Ka = Kb generated by both ends.

在上述过程中,数学原理保证了对称密钥的不可见,同时实现了数据传输两端的密钥共享,但在整个过程中,需要双方进行多次的参数共享,会影响数据在传输过程中的效率要求。在非一次一密的要求下,此种方法无疑是优选的,但在一次一密的情况下,此种方法不适用,但却为整个任务的开始提供了比较高的安全性。In the above process, mathematical principles ensure that the symmetric key is invisible, and at the same time, key sharing is achieved at both ends of the data transmission. However, in the whole process, both parties need to share parameters many times, which will affect the efficiency requirements of data transmission. Under the requirement of non-one-time pad, this method is undoubtedly preferred, but in the case of one-time pad, this method is not applicable, but it provides a relatively high security for the start of the whole task.

现有的对称密钥产生机制使在大量产生对称密钥的情况下,产生效率往往达不到一次一密的需求。从对称密钥的产生机制中可以看出,按照现有体系,在产生对称密钥时,需要不停的进行大素数G和P以及相关中间过程的交互,将浪费大量的传输资源。如果采用非对称密钥传输的方式,每个数据包传输之前需要先把非对称密钥传过去,这显然是不合理的。在产生密钥流的模式中,往往是使用同一个密钥进行反复的加盐迭代,虽然加盐数保证了密钥的安全性但随着巨量密钥的产生将消耗很大的存储资源。The existing symmetric key generation mechanism often fails to meet the one-time pad requirement when a large number of symmetric keys are generated. It can be seen from the symmetric key generation mechanism that according to the existing system, when generating symmetric keys, it is necessary to continuously interact with large prime numbers G and P and related intermediate processes, which will waste a lot of transmission resources. If an asymmetric key transmission method is adopted, the asymmetric key needs to be transmitted before each data packet is transmitted, which is obviously unreasonable. In the mode of generating key streams, the same key is often used for repeated salting iterations. Although the number of salts ensures the security of the key, it will consume a lot of storage resources as a huge number of keys are generated.

本案在基于对称密钥进行初步加密的基础上,结合混沌理论在两端分别生成一次一密的密钥流,由混沌函数产生的随机数数量可控,速度快,因此无需进行密钥的加盐迭代,密钥的长度也可控,会节省存储空间。保证通信两端一次一密的同时,两端无需实时交互对称密钥,保证通信高效性和安全性。In this case, based on the initial encryption based on symmetric keys, chaos theory is combined to generate a one-time key stream at both ends. The number of random numbers generated by the chaos function is controllable and fast, so there is no need to iterate the key with salt, and the length of the key is also controllable, which will save storage space. While ensuring one-time encryption at both ends of the communication, there is no need for the two ends to exchange symmetric keys in real time, ensuring communication efficiency and security.

经典动力学方程多是基于线性方程建立来的,线性方程的一个特性是可列可加性,即通过相邻数的变化有着很强的规律,往往能够通过线性方程来获得整个方程变量与因变量之间的因果关系。基于非线性方程建立起来的动力学方程则具有很强的离散性,对初始值特别敏感。1963年洛伦兹在研究大气对流模型时发现了奇怪的吸引子上的混沌运动,意思是大气对流方程的解会被吸引到一个看起来比较奇怪的区域,在该区域内,方程的解根据初始值的不同,分布是完全随机的,不具有可预测的可能。在经过足够长的迭代后,方程解的位置完全随机分布在一个特定的区域内。Classical dynamic equations are mostly established based on linear equations. One of the characteristics of linear equations is that they are countable and additivity, that is, there is a strong regularity through the changes in adjacent numbers, and the causal relationship between the variables and the dependent variables of the entire equation can often be obtained through linear equations. The dynamic equations established based on nonlinear equations are highly discrete and particularly sensitive to initial values. In 1963, Lorenz discovered chaotic motion on strange attractors when studying the atmospheric convection model, which means that the solutions to the atmospheric convection equations will be attracted to a strange-looking area. In this area, the distribution of the solutions to the equations is completely random depending on the initial values, and there is no predictable possibility. After a sufficiently long iteration, the positions of the solutions to the equations are completely randomly distributed in a specific area.

混沌函数具有多种形式,以自变量个数划分系统维数,以一维logistic函数和二维超混沌函数进行说明。Chaotic functions have many forms. The system dimension is divided according to the number of independent variables, and can be explained by one-dimensional logistic function and two-dimensional hyperchaotic function.

一维logistic函数形式为:xn+1=xnu(1-xn),其中,0≤u≤4,0<xn≤1。The form of the one-dimensional logistic function is: xn+1 = xnu (1- xn ), where 0≤u≤4, 0< xn≤1 .

u作为分支参数,由其控制的结果分布的分岔,参见图2,是本发明实施例提供的分支参数对应分岔图。其中,横坐标为分支参数u,纵坐标为Xnu is used as a branch parameter, and the bifurcation of the result distribution controlled by it is shown in FIG2 , which is a bifurcation diagram corresponding to the branch parameter provided by an embodiment of the present invention, wherein the abscissa is the branch parameter u, and the ordinate is X n .

当3.5699456<u≤4时其进入混沌状态。当u值相同时,不同的初始值经过多次的迭代。When 3.5699456<u≤4, it enters a chaotic state. When the u value is the same, different initial values undergo multiple iterations.

从其解的分布图上可以看出,在方程进入混沌状态时,随着迭代次数的增加,方程解的位置越发的随机,相邻很近的初始值经过迭代之后,其解的位置越发的发散,完全不具备线性方程的可列可加性的性质。From the distribution diagram of its solutions, it can be seen that when the equation enters a chaotic state, as the number of iterations increases, the position of the solution of the equation becomes more and more random. After iterations of adjacent initial values, the positions of their solutions become more and more divergent, and it does not have the listable and additivity properties of linear equations at all.

由此可知,混沌函数的初始值以及分支参数等混沌参数对混沌函数的解影响非常大,在不清楚初始值以及分支参数的前提下,其他参数的混沌函数,基于其随机性,无法确定混沌函数的解。From this we can see that the chaotic parameters such as the initial value and branch parameters of the chaotic function have a great influence on the solution of the chaotic function. Without knowing the initial value and branch parameters, the chaotic function of other parameters cannot determine the solution of the chaotic function based on its randomness.

因此本案在获得混沌参数后,可以对应确定混沌函数,基于混沌函数生成随机数列,由于混沌参数是基于对称密钥交互获得的,通信双方获得的混沌函数相同。Therefore, in this case, after obtaining the chaotic parameters, the corresponding chaotic function can be determined, and a random number sequence can be generated based on the chaotic function. Since the chaotic parameters are obtained based on the interaction of symmetric keys, the chaotic functions obtained by the communicating parties are the same.

根据生成的随机数列以及所述大素数参数产生密钥流,基于相同初始值能够生成的随机数列作为的密钥流也相同。A key stream is generated according to the generated random number sequence and the large prime number parameter, and the random number sequence that can be generated based on the same initial value is also the same as the key stream.

而后采用生成的密钥流进行一次一密数据传输,在保证加密数据可解密的情况下又使第三方无法获取明文信息,解决了发送方数据既可解又不可解的问题。The generated key stream is then used to transmit secret data once, ensuring that the encrypted data can be decrypted while preventing a third party from obtaining the plaintext information, thus solving the problem of the sender's data being both decryptable and undecryptable.

在本发明提供的又一实施例中,本案采用的混沌函数包括一维混沌函数以及超混沌参数,所述步骤S2中确定混沌函数生成随机数列的过程具体包括:In another embodiment provided by the present invention, the chaotic function used in this case includes a one-dimensional chaotic function and a hyperchaotic parameter, and the process of determining the chaotic function to generate a random number sequence in step S2 specifically includes:

根据所述混沌参数中的一维分支参数确定一维混沌函数,并根据所述混沌参数中的超混沌参数确定降维超混沌函数;Determining a one-dimensional chaotic function according to the one-dimensional branch parameters in the chaotic parameters, and determining a reduced-dimensional hyperchaotic function according to the hyperchaotic parameters in the chaotic parameters;

其中一维混沌函数形式为:xn+1=xnu(1-xn),其中,0≤u≤4,0<xn≤1。The one-dimensional chaotic function is in the form of: xn+1 = xnu (1- xn ), where 0≤u≤4, 0< xn≤1 .

根据所述混沌参数中的一维分支参数u可唯一确定一维混沌函数。The one-dimensional chaotic function can be uniquely determined according to the one-dimensional branch parameter u in the chaotic parameters.

对于超混沌函数,一个方程是否为具备混沌的性质,可以由Lyapunov指数标识,一个方程的Lyapunov指数个数与方程维数相同,也就是一维的有一个Lyapunov指数,两维的有两个Lyapunov指数。当Lyapunov指数数据量大于等于2且全部Lyapunov指数都大于零时则称为超混沌。For hyperchaotic functions, whether an equation has chaotic properties can be identified by the Lyapunov index. The number of Lyapunov exponents of an equation is the same as the dimension of the equation, that is, one-dimensional has one Lyapunov index, and two-dimensional has two Lyapunov indexes. When the number of Lyapunov index data is greater than or equal to 2 and all Lyapunov indexes are greater than zero, it is called hyperchaos.

二维超混沌函数可如下式:xn+1=f1(xn,yn)、yn+1=f2(xn,yn)。The two-dimensional hyperchaotic function can be expressed as follows: xn+1 = f1 ( xn , yn ), yn +1 = f2 ( xn , yn ).

其中,f1(xn,yn)=a1+a2xn+a3xn 2+a4yn+a5yn 2+a6xnynAmong them, f 1 (x n , y n )=a 1 +a 2 x n +a 3 x n 2 +a 4 y n +a 5 y n 2 +a 6 x n y n .

f2(xn,yn)=b1+b2xn+b3xn 2+b4yn+b5yn 2+b6xnynf 2 (x n , y n )=b 1 +b 2 x n +b 3 x n 2 +b 4 y n +b 5 y n 2 +b 6 x n y n .

a1...a6,b1...b6为待求参数。a 1 ...a 6 , b 1 ...b 6 are the parameters to be determined.

由于方程混合项和二次项会影响计算速度,因此可以将上述方程进行简化,同时保留方程的超混沌特性,如下:f1(xn,yn)=a4yn+a5yn2、f2(xn,yn)=b2xn+b4ynSince the mixed terms and quadratic terms of the equation will affect the calculation speed, the above equations can be simplified while retaining the hyperchaotic characteristics of the equations , as follows : f1 ( xn , yn )= a4yn + a5yn2 , f2 ( xn , yn )= b2xn + b4yn .

二维数据在产生随机数的过程中仍需进行降维处理,为保证降维后的数据分布,可由下式进行降维处理。设降维后的数据超混沌函数Fn,则有:Two-dimensional data still needs to be reduced in dimension in the process of generating random numbers. To ensure the distribution of data after dimension reduction, the following formula can be used for dimension reduction. Assume that the hyperchaotic function of the data after dimension reduction is Fn, then:

Fn=m1Xn+m2Yn+m3F n =m 1 X n +m 2 Y n +m 3 .

根据所述混沌参数中的超混沌参数m1、m2与m3可以确定降维超混沌函数。According to the hyperchaotic parameters m 1 , m 2 and m 3 in the chaotic parameters, a dimension-reduced hyperchaotic function can be determined.

生成的对称密钥作为一维混沌函数的初始值,迭代20次以上,迭代次数根据实际任务数来确定。依据上述混沌函数的原理中可知,当迭代超过4、5次时就会造成结果差异化,为保障结果的随机性,设定一维混沌函数和超混沌的迭代次数最低20次。设一维混沌函数的输出序列为[o1,o2,...,on]。The generated symmetric key is used as the initial value of the one-dimensional chaotic function, and it is iterated for more than 20 times. The number of iterations is determined according to the actual number of tasks. According to the principle of the above chaotic function, when the iteration exceeds 4 or 5 times, the results will be differentiated. In order to ensure the randomness of the results, the number of iterations of the one-dimensional chaotic function and hyperchaos is set to a minimum of 20 times. Assume that the output sequence of the one-dimensional chaotic function is [o 1 , o 2 , ..., o n ].

当通信双方进行通信时,依据所需发送的任务数n,生成n个一维混沌序列,确定超混沌的初始值。When the two parties are communicating, n one-dimensional chaotic sequences are generated according to the number of tasks n to be sent, and the initial value of the hyperchaos is determined.

超混沌函数依据输入的初始值生成n+1个随机数列[t1,t2,...,tn+1],依据Ka=Kb=G1 timod p,i=1,...,n+1,产生密钥流key1,key2,...,keyn+1The hyperchaotic function generates n+1 random number sequences [t 1 , t 2 , ..., t n+1 ] according to the input initial value, and generates a key stream key 1 , key 2 , ..., key n+1 according to Ka = Kb = G1ti mod p, i = 1, ..., n+1.

一维混沌序列的u值事先通过对称密钥keyg共享。由于A、B双方的混沌参数都相同,所以由相同的初始值产生的序列也相同,因此A、B双方的密钥流也相同。The u value of the one-dimensional chaotic sequence is shared in advance through the symmetric key keyg. Since the chaotic parameters of both A and B are the same, the sequence generated by the same initial value is also the same, so the key stream of both A and B is also the same.

需要说明的是,在本实施例中提出的混沌参数采用一维混沌函数与超混沌函数结合的随机数生成方式,在其他实施例中,可采用根据混沌参数确定混沌函数生成随机数的方式,例如,单纯采独一维混沌函数或单独采用超混沌函数It should be noted that the chaotic parameters proposed in this embodiment use a random number generation method combining a one-dimensional chaotic function and a hyperchaotic function. In other embodiments, a method of generating random numbers by determining a chaotic function based on chaotic parameters may be used, for example, a one-dimensional chaotic function or a hyperchaotic function may be used alone.

现有基于混沌函数的随机数据产生方法中,所产生的密钥仍为原有机制密钥产生方法,产生的随机数只不过是作为原有随机数的平价替换,且一维混沌函数的结果分布性能相对二维超混沌的分布结果仍然较差。现有混沌函数的参数更新仍比较传统,靠人工或者在一定范围内的随机选数,造成的结果就是在需要无监督参数更新时,更新后的结果分布特性是否较符合需求处于未知状态。因此本案通过一维混沌函数与超混沌函数,使用一维logisitc混沌函数+二维超混沌函数的机制产生随机数,因此将在一次一密过程中使用一维logisitc混沌函数+二维超混沌函数产生随机数,单边形成对称密钥流,解决数据传输的二重性问题以及提升密钥的产生效率。In the existing random data generation method based on chaotic function, the generated key is still the original mechanism key generation method, and the generated random number is just a cheap replacement for the original random number, and the result distribution performance of the one-dimensional chaotic function is still relatively poor compared to the two-dimensional hyperchaotic distribution result. The parameter update of the existing chaotic function is still relatively traditional, relying on manual or random number selection within a certain range. The result is that when unsupervised parameter update is required, whether the distribution characteristics of the updated results are more in line with the requirements is unknown. Therefore, this case uses a one-dimensional chaotic function and a hyperchaotic function, and uses a one-dimensional logical chaotic function + a two-dimensional hyperchaotic function mechanism to generate random numbers. Therefore, a one-dimensional logical chaotic function + a two-dimensional hyperchaotic function will be used in the one-time one-key process to generate random numbers, and a symmetric key stream will be formed unilaterally to solve the duality problem of data transmission and improve the efficiency of key generation.

在本发明提供的又一实施例中,参见图3,是本发明实施例提供的传输系统的结构示意图。In yet another embodiment of the present invention, referring to FIG3 , it is a schematic diagram of the structure of a transmission system provided in an embodiment of the present invention.

本申请提供的方案基于可信执行环境的超混沌密钥一次一密传输方法用于数据一次一密数据传输。The solution provided in this application is a one-time one-pad transmission method of a hyperchaotic key based on a trusted execution environment for one-time one-pad data transmission.

可信执行环境的硬件依赖度较高,从而保证了较高的安全防护程度。在服务器或其他终端设备中,单独开辟一个基于内存和CPU的独立运行环境保护所需运行存储的应用和数据。可信执行环境通过在硬件设备中建立信任根来保障运行环境的安全,信任根和设备的独特物理特性直接相关,从提升了可信执行环境的安全程度。The trusted execution environment has a high degree of hardware dependence, thus ensuring a high level of security protection. In a server or other terminal device, a separate operating environment based on memory and CPU is opened up to protect the applications and data required for operation and storage. The trusted execution environment ensures the security of the operating environment by establishing a root of trust in the hardware device. The root of trust is directly related to the unique physical characteristics of the device, thereby improving the security of the trusted execution environment.

在密钥产生中,随机数决定了密钥的安全程度,一个好的随机数具备更高的安全特性。之所以由随机数来产生密钥是因为利用了随机数的不可测的特性,根据统计学特征分布理想的随机数分布相对均匀,不能够使用统计学手段统计出随机数的具体值是多少。现实生活中的噪声、电压瞬时值的变化特性等都具有此类特点。人们把根据噪声、电压瞬时值的变化等物理手段产生的随机数叫做真随机数,把通过数学原理和计算机原理产生的随机数叫伪随机数,包括线性同余法、多重递归法、斐波那契法、移位寄存法、反转同余法等。由于真随机数基于实际物理特性产生,所以真随机数的产生效率较低,但质量较高。伪随机数基于数学算法和计算机原理产生,产生效率较高但质量较低。在真随机数产生方案中,基于硬件自身物理特性而产生随机数的方式可称为PUF方式,PUF全称是PhysicallyUnclonable Function,即物理不可克隆函数。PUF中的函数并不是指数学上的函数概念,它是指物体所固有的不可克隆的特有物理特征,目前基于PUF的随机数有SRAM PUF和FLASHPUF两种。In key generation, random numbers determine the security of the key, and a good random number has higher security characteristics. The reason why random numbers are used to generate keys is that the unpredictable characteristics of random numbers are utilized. According to statistical characteristics, the ideal random number distribution is relatively uniform, and the specific value of the random number cannot be calculated using statistical methods. The noise and voltage instantaneous value change characteristics in real life all have such characteristics. People call random numbers generated by physical means such as noise and voltage instantaneous value changes true random numbers, and random numbers generated by mathematical principles and computer principles pseudo-random numbers, including linear congruential method, multiple recursive method, Fibonacci method, shift register method, inverse congruential method, etc. Since true random numbers are generated based on actual physical characteristics, the generation efficiency of true random numbers is low, but the quality is high. Pseudo-random numbers are generated based on mathematical algorithms and computer principles, with high generation efficiency but low quality. In the true random number generation scheme, the method of generating random numbers based on the physical characteristics of the hardware itself can be called PUF method. The full name of PUF is Physically Unclonable Function, which is physically unclonable function. The function in PUF does not refer to the concept of mathematical function. It refers to the unique physical characteristics of an object that cannot be cloned. Currently, there are two types of random numbers based on PUF: SRAM PUF and FLASH PUF.

在服务器的可信执行环境中,由PUF产生随机数生成的对称密钥作为一维混沌函数的初始值。In the trusted execution environment of the server, the symmetric key generated by the random number generated by the PUF is used as the initial value of the one-dimensional chaotic function.

由于真随机数的安全性很高,又是放在可信执行环境中不可在外访问直接获取,因此产生的对称密钥的安全性也是高的,同样在可信执行环境中不出域。将对称密钥作为一维混沌方程的初值产生的数据列也将是难以破解的,从外界的角度看,这些数据列的值是随机不定的。再将这些随机不定的值作为超混沌函数的初值,进一步保证了初值的随机性。Since the security of true random numbers is very high and they are placed in a trusted execution environment and cannot be directly accessed from outside, the security of the generated symmetric keys is also high and they will not leave the trusted execution environment. The data series generated by using the symmetric key as the initial value of the one-dimensional chaotic equation will also be difficult to crack. From the perspective of the outside world, the values of these data series are random. These random values are used as the initial values of the hyperchaotic function to further ensure the randomness of the initial values.

利用SRAM PUF生成真随机数,依据对称密钥的生成原理生成对称密钥keyg。对称密钥keyg主要用于保护通信双方首次握手时的数据传输安全问题。在对称密钥产后,使用对称密钥将超混沌和一维混沌函数相关参数以及用来产生密钥流的新大素数G1进行通信双方秘密安全共享,所有参数加解密保护操作都在双方的可信执行环境中进行,以保障参数的安全。SRAM PUF is used to generate true random numbers, and the symmetric key keyg is generated according to the principle of symmetric key generation. The symmetric key keyg is mainly used to protect the data transmission security of the first handshake between the two communicating parties. After the symmetric key is generated, the symmetric key is used to share the parameters related to the hyperchaotic and one-dimensional chaotic functions and the new large prime number G1 used to generate the key stream between the two communicating parties. All parameter encryption and decryption protection operations are performed in the trusted execution environment of both parties to ensure the security of the parameters.

在本发明提供的又一实施例中,本案在确定降维超混沌函数的初始值时,采用倒序取值的方式从所述输出序列中选取超混沌的初始值。In another embodiment provided by the present invention, when determining the initial value of the dimension reduction hyperchaotic function, the method of taking values in reverse order is adopted to select the initial value of the hyperchaotic function from the output sequence.

即在第一次双方正式通信数据时,选取一维混沌序列的最后一个作为超混沌的初始值。That is, when the two parties formally communicate data for the first time, the last one-dimensional chaotic sequence is selected as the initial value of hyperchaos.

在本发明提供的又一实施例中,在采用密钥流进行一次一密数据传输时,由于本案执行时在可信执行环境中执行,因此在使用密钥时,需要考虑可信执行环境,参见图4,是本发明实施例提供的数据加解密传输流程示意图。In another embodiment provided by the present invention, when a key stream is used for one-time data transmission, since this case is executed in a trusted execution environment, the trusted execution environment needs to be considered when using the key. See Figure 4, which is a schematic diagram of the data encryption and decryption transmission process provided by an embodiment of the present invention.

对于通信双方的A端服务器与B端服务器在进行一次一密传输时,在获得密钥流后,密钥流存放于可信执行环境TEE中。When the communicating parties A and B perform one-time secret transmission, after obtaining the key stream, the key stream is stored in the trusted execution environment TEE.

当加密的数据为敏感数据时,将数据加解密在可信执行环境中进行,在所述可信执行环境中采用所述密钥流对所述待加密数据进行加密,加密完成后通过数据网络进行传输。When the encrypted data is sensitive data, the data encryption and decryption are performed in a trusted execution environment, the key stream is used to encrypt the data to be encrypted in the trusted execution environment, and the data is transmitted through a data network after encryption.

当数据为非敏感常规数据时,可选择在常规环境中进行加解密操作,将密钥流需要从可信执行环境中取出,在常规环境中采用所述密钥流对所述待加密数据进行加密。When the data is non-sensitive regular data, encryption and decryption operations can be performed in a regular environment. The key stream needs to be taken out from the trusted execution environment, and the key stream is used to encrypt the data to be encrypted in the regular environment.

加解密算法按照现有加解密算法进行处理即可,参见图5,是本发明实施例提供的数据包加密过程的流程示意图。The encryption and decryption algorithm can be processed according to the existing encryption and decryption algorithm. See FIG5 , which is a flowchart of the data packet encryption process provided by an embodiment of the present invention.

将密钥流按标号顺序存放,所加密的传输数据包在加密完成后,附一个标号明文,用来标识是发送的第几个数据包,与对应密钥流对应。同时在数据包所需加密的明文中加入是否需要更改混沌参数的标志位,当此位为1时,表示将更改混沌参数,并附上要更改的混沌参数以及一维混沌的初始值,当为0时,表示不进行混沌函数数据更新。当对方收到并解密数据后发现需要更新混沌参数时,便可更新混沌参数后重新进行密钥更新。The key stream is stored in the order of labels. After the encryption is completed, the encrypted transmission data packet is attached with a label plaintext to identify the number of data packets sent, corresponding to the corresponding key stream. At the same time, a flag bit is added to the plaintext of the data packet to be encrypted to indicate whether the chaotic parameters need to be changed. When this bit is 1, it means that the chaotic parameters will be changed, and the chaotic parameters to be changed and the initial value of the one-dimensional chaos are attached. When it is 0, it means that the chaotic function data will not be updated. When the other party receives and decrypts the data and finds that the chaotic parameters need to be updated, the chaotic parameters can be updated and the key can be updated again.

在本发明提供的又一实施例中,在确定超混沌参数时,具体执行以下步骤:In another embodiment provided by the present invention, when determining the hyperchaotic parameters, the following steps are specifically performed:

二维超混沌函数可如下式:xn+1=f1(xn,yn)、yn+1=f2(xn,yn)。The two-dimensional hyperchaotic function can be expressed as follows: xn+1 = f1 ( xn , yn ), yn +1 = f2 ( xn , yn ).

其中,f1(xn,yn)=a1+a2xn+a3xn 2+a4yn+a5yn 2+a6xnynAmong them, f 1 (x n , y n )=a 1 +a 2 x n +a 3 x n 2 +a 4 y n +a 5 y n 2 +a 6 x n y n .

f2(xn,yn)=b1+b2xn+b3xn 2+b4yn+b5yn 2+b6xnynf 2 (x n , y n )=b 1 +b 2 x n +b 3 x n 2 +b 4 y n +b 5 y n 2 +b 6 x n y n .

由于方程混合项和二次项会影响计算速度,因此可以将上述方程进行简化,同时保留方程的超混沌特性,如下:Since the mixed terms and quadratic terms of the equation will affect the calculation speed, the above equation can be simplified while retaining the hyperchaotic characteristics of the equation, as follows:

f1(xn,yn)=a4yn+a5yn 2f 1 (x n , y n )=a 4 y n +a 5 y n 2 ;

f2(xn,yn)=b2xn+b4ynf 2 (x n , y n )=b 2 x n +b 4 y n ;

通过选定预设两个二维超混沌函数的二维参数的初步值,a4=1.55、a5=-1.3、b2=-1.1、b4=0.1,此时方程两个Lyapunov指数分别为0.238、0.166。Lyapunov指数全部大于零,说明系统具备混沌特性。将a4作为变量,由分岔图可知当1.55≤a4<=1.6时,方程进入混沌状态。所以在进行随机数产生时,可通过调节a4值的大小来更新方程参数,进而提升随机数产生方程的安全特性。By selecting the initial values of the two-dimensional parameters of the two-dimensional hyperchaotic functions, a 4 = 1.55, a 5 = -1.3, b 2 = -1.1, b 4 = 0.1, the two Lyapunov exponents of the equation are 0.238 and 0.166 respectively. All Lyapunov exponents are greater than zero, indicating that the system has chaotic characteristics. Taking a 4 as a variable, it can be seen from the bifurcation diagram that when 1.55≤a4<=1.6, the equation enters a chaotic state. Therefore, when generating random numbers, the equation parameters can be updated by adjusting the value of a4, thereby improving the security characteristics of the random number generation equation.

由混沌函数的原理可知,在改变a4的数值时,整个混沌结果的分布也会有所改变,从通过改变a4进而改变整个超混沌函数的分布性质,可以提高安全水平。From the principle of chaotic function, we know that when the value of a 4 is changed, the distribution of the entire chaotic result will also change. By changing a 4 and then changing the distribution properties of the entire hyperchaotic function, the safety level can be improved.

令状态量Xn和Yn产生的迭代序列分别为[X1,X2,...,Xn],[Y1,Y2,...,Yn],参见图6,是本发明实施例提供的二维超混沌函数Xn的分布图,参见图7,是本发明实施例提供的二维超混沌函数Yn的分布图。Suppose the iterative sequences generated by the state quantities Xn and Yn are [ X1 , X2 , ..., Xn ], [ Y1 , Y2 , ..., Yn ] respectively. See Figure 6, which is a distribution diagram of the two-dimensional hyperchaotic function Xn provided by an embodiment of the present invention. See Figure 7, which is a distribution diagram of the two-dimensional hyperchaotic function Yn provided by an embodiment of the present invention.

通过上述过程可获得Xn和Yn的分布,再根据混沌函数部分所述降维公式可获得降维后的分布FnThe distribution of Xn and Yn can be obtained through the above process, and the distribution Fn after dimensionality reduction can be obtained according to the dimensionality reduction formula described in the chaotic function part.

对于生成的Fn是否符合分布要求,使用人工智能模型对Fn的分布图进行识别,当识别通过后,就可以完成对超函数参数的更新。利用Alexnet架构训练人工智能模型。To determine whether the generated F n meets the distribution requirements, an artificial intelligence model is used to identify the distribution graph of F n . Once the identification is passed, the hyperfunction parameters can be updated. The artificial intelligence model is trained using the Alexnet architecture.

在进行人工智能模型训练时,数据集将Fn分布的有效图和无效图以及一维混沌分布视为无效图作为物料。在1.55≤a4≤1.6范围内,生成多个Fn的分布图,标注有效图为01,无效图标注为00,在一维混沌函数3.5699456<u≤4,不同初始值下,生成分布图,标注为00。训练人工智能模型并获得能够分辨Fn分布是否有效。When training the artificial intelligence model, the data set considers the valid and invalid graphs of the Fn distribution and the one-dimensional chaotic distribution as invalid graphs as materials. In the range of 1.55≤a4≤1.6, multiple Fn distribution graphs are generated, with valid graphs marked as 01 and invalid graphs marked as 00. Under the one-dimensional chaotic function 3.5699456<u≤4, distribution graphs are generated with different initial values and marked as 00. The artificial intelligence model is trained and the ability to distinguish whether the Fn distribution is valid is obtained.

在获得降维超混沌函数Fn的分布特性后,通过训练好的人工智能模型识别Fn的分布特性是否符合随机数分布要去,如果满足,则保留现有设置的相关参数,如果不满足,由程序对对所述二维参数中的二维分支参数进行调整,即调整a4进行微调,直到Fn的分布满足要求,识别结果为有效图时,将最新的二维参数作为所述超混沌参数,将参数固定后送进可信执行环境中。After obtaining the distribution characteristics of the reduced-dimensional hyperchaotic function Fn , the trained artificial intelligence model is used to identify whether the distribution characteristics of Fn meet the requirements of random number distribution. If so, the relevant parameters of the existing settings are retained. If not, the program adjusts the two-dimensional branch parameters in the two-dimensional parameters, that is, adjusts a 4 for fine-tuning until the distribution of Fn meets the requirements. When the recognition result is a valid graph, the latest two-dimensional parameters are used as the hyperchaotic parameters, and the parameters are fixed and sent to the trusted execution environment.

在可信执行环境中,通过拿到的确定超混沌参数生成超混沌函数以及降维方程,并将这些通过参数使用对称密钥key与通信双方进行共享。In a trusted execution environment, hyperchaotic functions and dimensionality reduction equations are generated by obtaining the determined hyperchaotic parameters, and these parameters are shared with the communicating parties using a symmetric key.

需要说明的是,参见图8,是本发明实施例提供的人工智能模型的结构示意图,整个模型共有8层卷积神经网络,前5层是卷积层,后三层是全连接层。It should be noted that, referring to Figure 8, which is a structural diagram of the artificial intelligence model provided by an embodiment of the present invention, the entire model has a total of 8 layers of convolutional neural networks, the first 5 layers are convolutional layers, and the last three layers are fully connected layers.

将分布原图处理成227*227大小的图片,经过随机处理后为224*224。The original distribution image is processed into a 227*227 image, and after random processing it becomes 224*224.

卷积层C1的卷积输入为227*227*3,卷积核大小为11*11*3,数量为96个,不扩充边缘,即padding=0,步长stride=4,FeatureMap大小为55*55*96。激活函数为Relu;池化层池化核大小为3*3,不扩充边缘,即即padding=0,步长stride=2,FeatureMap即C1的输出为27*27*96。The convolution input of the convolution layer C1 is 227*227*3, the convolution kernel size is 11*11*3, the number is 96, the edge is not expanded, that is, padding=0, stride=4, and the FeatureMap size is 55*55*96. The activation function is Relu; the pooling kernel size of the pooling layer is 3*3, the edge is not expanded, that is, padding=0, stride=2, and the output of FeatureMap C1 is 27*27*96.

卷积层C2的卷积输入为27*27*96,卷积核大小为5*5*96,数量为256个,扩充边缘padding=2,步长stride=1,FeatureMap大小为27*27*256;激活函数为Relu;池化层池化核大小为3*3,不扩充边缘,即即padding=0,步长stride=2,FeatureMap即C2的输出为13*13*256;The convolution input of the convolution layer C2 is 27*27*96, the convolution kernel size is 5*5*96, the number is 256, the padding of the expanded edge is 2, the stride is 1, and the FeatureMap size is 27*27*256; the activation function is Relu; the pooling kernel size of the pooling layer is 3*3, the edge is not expanded, that is, padding=0, the stride is 2, and the output of FeatureMap, that is, C2, is 13*13*256;

卷积层C3的卷积输入为13*13*256,卷积核大小为3*3*256,数量为384个,扩充边缘padding=1,步长stride=1,FeatureMap大小为13*13*384;激活函数为Relu;无池化层,即C3的输出为13*13*384;The convolution input of convolution layer C3 is 13*13*256, the convolution kernel size is 3*3*256, the number is 384, the padding edge is 1, the stride is 1, the FeatureMap size is 13*13*384; the activation function is Relu; there is no pooling layer, that is, the output of C3 is 13*13*384;

卷积层C4的卷积输入为13*13*384,卷积核大小为3*3*384,数量为384个,扩充边缘即padding=1,步长stride=1,FeatureMap大小为13*13*384;激活函数为Relu;无池化层,即C4的输出为13*13*384;The convolution input of convolution layer C4 is 13*13*384, the convolution kernel size is 3*3*384, the number is 384, the expansion edge is padding=1, the step length is stride=1, the FeatureMap size is 13*13*384; the activation function is Relu; there is no pooling layer, that is, the output of C4 is 13*13*384;

卷积层C5的卷积输入为13*13*384,卷积核大小为3*3*384,数量为256个,扩充边缘padding=1,步长stride=1,FeatureMap大小为13*13*256;激活函数为Relu;池化层池化核大小为3X3,不扩充边缘,即即padding=0,步长stride=2,FeatureMap即C1的输出为6*6*256;The convolution input of the convolution layer C5 is 13*13*384, the convolution kernel size is 3*3*384, the number is 256, the padding of the expanded edge is 1, the stride is 1, and the FeatureMap size is 13*13*256; the activation function is Relu; the pooling kernel size of the pooling layer is 3X3, the edge is not expanded, that is, padding=0, the stride is 2, and the output of FeatureMap, that is, C1, is 6*6*256;

全连接层FC1由卷积实现,输入为6*6*256,卷积核大小为6*6*256,数量为4096个,不扩充边缘padding=0,步长stride=1,FeatureMap大小为1*1*4096;激活函数为Relu;dropout处理中去掉了一些神经节点,防止过拟合,FC1的输出为1*1*4096;The fully connected layer FC1 is implemented by convolution, with an input of 6*6*256, a convolution kernel size of 6*6*256, a number of 4096, no edge expansion padding = 0, stride = 1, and a FeatureMap size of 1*1*4096; the activation function is Relu; some neural nodes are removed in the dropout process to prevent overfitting, and the output of FC1 is 1*1*4096;

全连接层FC2由卷积实现,输入为1*1*4096;激活函数为Relu;dropout处理中去掉了一些神经节点,防止过拟合,FC2的输出为1*1*4096;The fully connected layer FC2 is implemented by convolution, with an input of 1*1*4096; the activation function is Relu; some neural nodes are removed in the dropout process to prevent overfitting, and the output of FC2 is 1*1*4096;

全连接层FC3由卷积实现,输入为1*1*4096;激活函数为softmax,softmax为2,FC3的输出为1*1*2。The fully connected layer FC3 is implemented by convolution, with an input of 1*1*4096; the activation function is softmax, the softmax is 2, and the output of FC3 is 1*1*2.

需要说明的是,上述人工智能模型的具体结构仅作为一种优选实施方式,不构成对本方案人工智能模型的具体限制,在本案采用的其他实施例中,亦可采用采用其他模型进行分布图识别。It should be noted that the specific structure of the above-mentioned artificial intelligence model is only used as a preferred implementation method and does not constitute a specific limitation on the artificial intelligence model of this scheme. In other embodiments adopted in this case, other models may also be used for distribution map recognition.

依据混沌原理直接计算生成对称密钥,有效节约了密钥的产生时间,以及能够有效增加密钥的产生数量,且密钥的计算在可信执行环境中进行,具有更高的安全性以及更高的密钥产生效率的优点。Symmetric keys are directly calculated and generated based on the chaos principle, which effectively saves the time of key generation and can effectively increase the number of keys generated. The key calculation is performed in a trusted execution environment, which has the advantages of higher security and higher key generation efficiency.

使用人工智能模型自动化处理参数更新,但其更新的频率仍为人为控制,此自动化参数处理过程主要是为了提高模型的安全性,在安全性有保证的情况下可以不进行参数更新,一直保持参数稳定。在通信双方刚开始进行通信时在确定安全性及函数性能的情况下也可以指定方程参数。根据混沌理论的原理,即使方程参数公开,只要保证初始值选取的安全,整个体系的安全仍有保证,但为了提升整个系统的安全性能,在此添加了依据人工智能模型更新参数的能力。但整个更新过程需要一定消耗,此过程的更新是属于通信任务之外的操作过程,不影响实时的通信。The artificial intelligence model is used to automatically process parameter updates, but the frequency of updates is still manually controlled. This automated parameter processing process is mainly to improve the security of the model. When security is guaranteed, parameter updates can be omitted and parameters can be kept stable. When the two parties in communication just start communicating, equation parameters can also be specified while ensuring security and function performance. According to the principles of chaos theory, even if the equation parameters are public, the security of the entire system is still guaranteed as long as the initial value selection is safe. However, in order to improve the security performance of the entire system, the ability to update parameters based on the artificial intelligence model is added. However, the entire update process requires a certain amount of consumption. The update of this process is an operation process outside the communication task and does not affect real-time communication.

通过人工智能模型更新混沌函数参数,提升了自动化处理能力,使方程参数更具不可预测性。提升了无监督方程参数更新的能力。简化了密钥产生流程,并在可信执行环境中进行操作,增加了密钥的安全性以及产生效率。整个方案能够有效的提升一次一密的使用性能。The AI model is used to update the parameters of the chaotic function, which improves the automatic processing capability and makes the equation parameters more unpredictable. The unsupervised equation parameter update capability is improved. The key generation process is simplified and the operation is performed in a trusted execution environment, which increases the security and generation efficiency of the key. The entire solution can effectively improve the performance of the one-time pad.

在本发明提供的又一实施例中,降维超混沌函数Fn=m1Xn+m2Yn+m3 In yet another embodiment provided by the present invention, the dimension-reduced hyperchaotic function Fn = m1Xn + m2Yn + m3 .

根据所述混沌参数中的超混沌参数m1、m2与m3可以确定降维超混沌函数。According to the hyperchaotic parameters m 1 , m 2 and m 3 in the chaotic parameters, a dimension-reduced hyperchaotic function can be determined.

为了求解m1、m2和m3,需要将Xn和Yn的分布图分为相对聚集区和相对离散区,确定两个二维超混沌函数的分布图的相对聚集区的上下边界以及相对离散区的上下边界。In order to solve m 1 , m 2 and m 3 , it is necessary to divide the distribution diagrams of X n and Y n into relatively concentrated areas and relatively discrete areas, and determine the upper and lower boundaries of the relatively concentrated areas and the upper and lower boundaries of the relatively discrete areas of the distribution diagrams of the two two-dimensional hyperchaotic functions.

对相应区域给出数值范围,假设第一二维超混沌函数Xn的相对聚集区的上下边界分别为X12和X11,离散区的上下边界分别为X22和X21,第二二维超混沌函数Yn的相对聚集区的上下边界分别为Y12和Y11,相对离散区的上下边界分别为Y22和Y21Give a numerical range for the corresponding area. Assume that the upper and lower boundaries of the relative aggregation area of the first two-dimensional hyperchaotic function Xn are X12 and X11 , and the upper and lower boundaries of the discrete area are X22 and X21 ; the upper and lower boundaries of the relative aggregation area of the second two-dimensional hyperchaotic function Yn are Y12 and Y11 , and the upper and lower boundaries of the relative discrete area are Y22 and Y21 .

转换后的降维超混沌函数Fn的相对聚集区上下边界分别为F12和F11,相对离散区的上下边界分别为F22和F21The upper and lower boundaries of the relative aggregation area of the transformed reduced-dimensional hyperchaotic function Fn are F12 and F11 , respectively, and the upper and lower boundaries of the relative discrete area are F22 and F21 , respectively.

构建F12、F11、F22和F21同X22、X21、X12、X11、Y22、Y21、Y12和Y11之间的函数关系,则有:Constructing the functional relationship between F12 , F11 , F22 and F21 and X22 , X21 , X12 , X11 , Y22 , Y21 , Y12 and Y11 , we have:

F21=X21*m1+Y21*m2+m3F 21 =X 21 *m 1 +Y 21 *m 2 +m 3 ;

F22=X22*m1+Y22*m2+m3F 22 =X 22 *m 1 +Y 22 *m 2 +m 3 ;

F11=X11*m1+Y11*m2+m3F 11 =X 11 *m 1 +Y 11 *m 2 +m 3 ;

对Fn的边界进行边界约束,降维超混沌函数相对离散区边界镜像对称,则有:F22=-F21,相对聚集区下边界不小于相对离散区上边界,即F11≥F22The boundary of Fn is constrained, and the dimension-reduced hyperchaotic function is mirror-symmetric to the boundary of the relative discrete region, so: F 22 =-F 21 , the lower boundary of the relative clustering region is not less than the upper boundary of the relative discrete region, that is, F 11 ≥F 22 .

经过分析,只存在X11≤X22,Y11≤Y22的情况,则After analysis, there is only the case of X 11 ≤X 22 , Y 11 ≤Y 22 , then

当X11=X22且Y11=Y22时,对m1、m2无约束;When X 11 =X 22 and Y 11 =Y 22 , there is no constraint on m1 and m2;

当Y11≠Y22时,有m2<((X11-X22)*m1/(Y22-Y11));When Y 11 ≠Y 22 , m 2 <((X 11 -X 22 )*m 1 /(Y 22 -Y 11 ));

当Y11=Y22且X11!=X22时,有m1<0。When Y 11 =Y 22 and X 11 !=X 22 , m 1 <0.

从上述约束关系可以看出,m1与m2正负性相反,在进行取值时,由于得出的数据分布不一定是扩散度特别符要求,在考虑计算性能的情况下,可在1附近进行取值微调。在得出一维生成序列后,经过归一化处理,将数据限制到[0,1]区间。From the above constraints, we can see that m1 and m2 have opposite positive and negative values. When selecting values, since the obtained data distribution may not meet the diffusion requirements, the value can be fine-tuned around 1 in consideration of computing performance. After obtaining the one-dimensional generated sequence, the data is normalized and restricted to the interval [0,1].

取X11=-0.1,X12=0.5,Y11=-0.5,Y12=0.2,X21=-1.2,X22=-0.1,Y21=0.2,Y22=1.5,m1=1,m2=-1计算得m3=1.5,经归一化后,则有Fn=(Xn-Yn+1.5)/2.5。Taking X11 = -0.1, X12 = 0.5, Y11 = -0.5, Y12 = 0.2, X21 = -1.2, X22 = -0.1, Y21 = 0.2, Y22 = 1.5, m1 = 1, m2 = -1, we obtain m3 = 1.5. After normalization, we have Fn = ( Xn - Yn + 1.5)/2.5.

参见图9,是本发明实施例提供的降维超混沌函数的分布图,参见图10,是本发明实施例提供的u=3.9,初始值取0.4时一维logistic函数的分布图。See FIG. 9 , which is a distribution diagram of a dimensionality reduction hyperchaotic function provided in an embodiment of the present invention. See FIG. 10 , which is a distribution diagram of a one-dimensional logistic function provided in an embodiment of the present invention when u=3.9 and the initial value is 0.4.

通过分布图对比可知,降维超混沌函数的分布的随机性明显优于一维logistic函数。By comparing the distribution diagrams, it can be seen that the randomness of the distribution of the reduced-dimensional hyperchaotic function is significantly better than that of the one-dimensional logistic function.

通过求解确定所述降维参数,根据所述降维参数确定所述降维超混沌函数,降维超混沌函数的随机性由于一维混沌函数,由此生成的随机数安全性更高。The dimension reduction parameters are determined by solving, and the dimension reduction hyperchaotic function is determined according to the dimension reduction parameters. The randomness of the dimension reduction hyperchaotic function is higher than that of the one-dimensional chaotic function, and the random numbers generated thereby are more secure.

在本发明提供的又一实施例中,在确定相对聚集区的上下边界以及相对离散区的上下边界时,参考Xn和Yn的分布图,横轴为迭代次数,纵轴为各自分布值,为了能够对聚集区和离散区做一个划分,选择以每一行数据点的个数为密度指标,进行数据统计,当每一行的点数变化超过一定阈值时,即作为划分边界,具体地,以Xn的分布为例说明边界确定方法,流程如下:In another embodiment provided by the present invention, when determining the upper and lower boundaries of the relative clustered area and the upper and lower boundaries of the relative discrete area, the distribution diagrams of Xn and Yn are referred to, the horizontal axis is the number of iterations, and the vertical axis is the respective distribution value. In order to be able to divide the clustered area and the discrete area, the number of data points in each row is selected as the density index, and data statistics are performed. When the number of points in each row changes by more than a certain threshold, it is used as the dividing boundary. Specifically, the boundary determination method is described by taking the distribution of Xn as an example, and the process is as follows:

统计数据分布的最大值Xmax和最小值XminThe maximum value X max and minimum value X min of the statistical data distribution.

分别计算在最大值Xmax和最小值Xmin处的数据点个数分别为最大数量numberXmax以及最小数量numberXminThe number of data points at the maximum value X max and the minimum value X min are calculated as the maximum number numberX max and the minimum number numberX min respectively.

根据最大数量numberXmax以及最小数量numberXmin的大小关系,确定相对聚集区以及相对离散区的分布;According to the size relationship between the maximum number numberX max and the minimum number numberX min , the distribution of the relatively concentrated area and the relatively discrete area is determined;

如果最大数量numberXmax小于最小数量numberXmin,则相对聚集区位于相对离散区的下方,则令X12=Xmax,X21=Xmin,将分布图的最小值作为相对聚集区的下边界,将分布图的最大值作为相对离散区的上边界。If the maximum number numberX max is less than the minimum number numberX min , the relative clustering area is below the relative discrete area. Let X 12 =X max , X 21 =X min , take the minimum value of the distribution graph as the lower boundary of the relative clustering area, and take the maximum value of the distribution graph as the upper boundary of the relative discrete area.

如果最大数量numberXmax等于最小数量numberXmin时,则以预设的步长增大最小值,减小最大值,更新最大值和最小值,重新确定最大数量与最小数量进行判断。If the maximum number numberX max is equal to the minimum number numberX min , the minimum value is increased and the maximum value is decreased by a preset step size, the maximum value and the minimum value are updated, and the maximum number and the minimum number are re-determined for judgment.

如果最大数量numberXmax大于最小数量numberXmin,则相对聚集区位于相对离散区的上方,则令X11=Xmin,X22=Xmax,将分布图的最小值作为相对离散区的下边界,将分布图的最大值作为相对聚集区的上边界。If the maximum number numberX max is greater than the minimum number numberX min , the relative clustering region is above the relative discrete region. Let X 11 =X min , X 22 =X max , take the minimum value of the distribution graph as the lower boundary of the relative discrete region, and take the maximum value of the distribution graph as the upper boundary of the relative clustering region.

而后根据预设的分界条件,在最大值与最小值间搜索相对离散区与相对聚集区的分界值,边界条件具体限制边界值所在为止的分布点的统计数量。Then, according to the preset boundary conditions, the boundary value between the relatively discrete area and the relatively concentrated area is searched between the maximum value and the minimum value. The boundary conditions specifically limit the statistical number of distribution points up to the boundary value.

根据确定相对聚集区以及相对离散区的分布,以及分界点的所在为止,确定所述相对聚集区的上下边界以及所述相对离散区的上下边界。According to the distribution of the relatively concentrated area and the relatively discrete area, and the location of the dividing point, the upper and lower boundaries of the relatively concentrated area and the upper and lower boundaries of the relatively discrete area are determined.

需要说明的时,本实施例以Xn分布图为例说明相对聚集区的上下边界以及相对离散区的上下边界具体确定方法,对于Yn分布图采用相同方案亦可求解。It should be noted that this embodiment uses the Xn distribution graph as an example to illustrate the specific method for determining the upper and lower boundaries of the relatively concentrated area and the upper and lower boundaries of the relatively discrete area. The same solution can also be used for the Yn distribution graph.

在本发明提供的又一实施例中,在搜索相对离散区与相对聚集区的分界值时,相对聚集区位于相对离散区的下方时,具体执行以下步骤In another embodiment provided by the present invention, when searching for the boundary value between the relative discrete area and the relative concentrated area, when the relative concentrated area is located below the relative discrete area, the following steps are specifically performed:

即最大数量numberXmax小于最小数量numberXmin时,相对聚集区位于相对离散区的下方,则选取预设的第一步长d,令当前判断值Xnew=Xmin+d,统计当前判断值Xnew所在行的数据点个数,即当前判断数量numberXnew,判断所述当前判断数量numberXnew是否大于最小数量numberXminThat is, when the maximum number numberX max is less than the minimum number numberX min , the relative clustering area is located below the relative discrete area, then the preset first step length d is selected, and the current judgment value X new =X min +d is set, and the number of data points in the row where the current judgment value X new is located is counted, that is, the current judgment number numberX new , and it is determined whether the current judgment number numberX new is greater than the minimum number numberX min ;

如果当前判断数量numberXnew≤最小数量numberXmin,则计算分界比值T=(numberXmin-numberXnew)/numberXmin,当T≤50%时,则将当前判断数量numberXnew作为前一判断数量numberXnew1,继续增加Xnew的值,Xnew=Xnew+d,重新计算分界比值T=(numberXnew1-numberXnew)/numberXnew1,当T>50%时,则认为Xnew为相对聚集区和相对离散区的分界点。If the current judgment number numberX new ≤ the minimum number numberX min , then the demarcation ratio T = (numberX min - numberX new )/numberX min is calculated. When T ≤ 50%, the current judgment number numberX new is taken as the previous judgment number numberX new1 , and the value of X new is continued to be increased, X new = X new + d, and the demarcation ratio T = (numberX new1 - numberX new )/numberX new1 is recalculated. When T > 50%, X new is considered to be the demarcation point between the relatively clustered area and the relatively discrete area.

如果当前判断数量numberXnew>最小数量numberXmin,则将当前判断数量numberXnew作为前一判断数量numberXnew1,继续增加Xnew的值,Xnew=Xnew+d;统计当前判断值Xnew所在行的数据点个数,即当前判断数量numberXnew,判断所述当前判断数量numberXnew是否大于前一判断数量numberXnew1If the current judgment number numberX new > the minimum number numberX min , the current judgment number numberX new is taken as the previous judgment number numberX new1 , and the value of X new is continued to be increased, X new =X new +d; the number of data points in the row where the current judgment value X new is located is counted, that is, the current judgment number numberX new , and it is determined whether the current judgment number numberX new is greater than the previous judgment number numberX new1 .

如果当前判断数量numberXnew大于前一判断数量numberXnew1,则计算分界比值T=(numberXnew1-numberXnew)/numberXnew1,当T≤50%时,则将当前判断数量numberXnew作为前一判断数量numberXnew1,继续增加Xnew的值,Xnew=Xnew+d,重新计算分界比值T=(numberXnew1-numberXnew)/numberXnew1,当T>50%时,则认为Xnew为相对聚集区和相对离散区的分界点。If the current judgment number numberX new is greater than the previous judgment number numberX new1 , the demarcation ratio T = (numberX new1 - numberX new )/numberX new1 is calculated. When T≤50%, the current judgment number numberX new is taken as the previous judgment number numberX new1 , and the value of X new is continued to be increased, X new = X new + d, and the demarcation ratio T = (numberX new1 - numberX new )/numberX new1 is recalculated. When T>50%, X new is considered to be the demarcation point between the relatively clustered area and the relatively discrete area.

当Xnew为分界点时,在numberXmax<numberXmin情况下,令X22=X11=Xnew,则对应确定相对聚集区的上下边界以及相对离散区的上下边界。When X new is the dividing point, in the case of numberX max <numberX min , let X 22 =X 11 =X new , then the upper and lower boundaries of the relatively concentrated area and the upper and lower boundaries of the relatively discrete area are determined accordingly.

在本发明提供的又一实施例中,在搜索相对离散区与相对聚集区的分界值时,相对聚集区位于相对离散区的上方时,具体执行以下步骤In another embodiment provided by the present invention, when searching for the boundary value between the relative discrete area and the relative concentrated area, when the relative concentrated area is located above the relative discrete area, the following steps are specifically performed:

即最大数量numberXmax大于最小数量numberXmin时,相对聚集区位于相对离散区的上方,则选取预设的第二步长k,令当前判断值Xnew=Xma-k,统计当前判断值Xnew所在行的数据点个数,即当前判断数量numberXnew,判断所述当前判断数量numberXnew是否大于最大数量numberXmaxThat is, when the maximum number numberX max is greater than the minimum number numberX min , the relative clustering area is located above the relative discrete area, then the preset second step length k is selected, and the current judgment value X new is set to be X ma -k, and the number of data points in the row where the current judgment value X new is located is counted, that is, the current judgment number numberX new , and it is determined whether the current judgment number numberX new is greater than the maximum number numberX max ;

如果当前判断数量numberXnew≤最大数量numberXmax,则计算分界比值T=(numberXmax-numberXnew)/numberXmax,当T≤50%时,则将当前判断数量numberXnew作为前一判断数量numberXnew1,继续减小Xnew的值,Xnew=Xnew-k,重新计算分界比值T=(numberXnew1-numberXnew)/numberXnew1,当T>50%时,则认为Xnew为相对聚集区和相对离散区的分界点。If the current judgment number numberX new ≤ the maximum number numberX max , then the demarcation ratio T = (numberX max - numberX new )/numberX max is calculated. When T ≤ 50%, the current judgment number numberX new is taken as the previous judgment number numberX new1 , and the value of X new is continued to be reduced, X new = X new - k, and the demarcation ratio T = (numberX new1 - numberX new )/numberX new1 is recalculated. When T > 50%, X new is considered to be the demarcation point between the relatively clustered area and the relatively discrete area.

如果当前判断数量numberXnew>最大数量numberXmax,则将当前判断数量numberXnew作为前一判断数量numberXnew1,继续减小Xnew的值,Xnew=Xnew-k;统计当前判断值Xnew所在行的数据点个数,即当前判断数量numberXnew,判断所述当前判断数量numberXnew是否大于前一判断数量numberXnew1If the current judgment number numberX new > the maximum number numberX max , the current judgment number numberX new is taken as the previous judgment number numberX new1 , and the value of X new is continuously reduced, X new =X new −k; the number of data points in the row where the current judgment value X new is located is counted, that is, the current judgment number numberX new , and it is determined whether the current judgment number numberX new is greater than the previous judgment number numberX new1 .

如果当前判断数量numberXnew大于前一判断数量numberXnew1,则计算分界比值T=(numberXnew1-numberXnew)/numberXnew1,当T≤50%时,则将当前判断数量numberXnew作为前一判断数量numberXnew1,继续减小Xnew的值,Xnew=Xnew-k,重新计算分界比值T=(numberXnew1-numberXnew)/numberXnew1,当T>50%时,则认为Xnew为相对聚集区和相对离散区的分界点。If the current judgment number numberX new is greater than the previous judgment number numberX new1 , the demarcation ratio T = (numberX new1 - numberX new )/numberX new1 is calculated. When T≤50%, the current judgment number numberX new is taken as the previous judgment number numberX new1 , and the value of X new is continued to be reduced, X new = X new -k, and the demarcation ratio T = (numberX new1 - numberX new )/numberX new1 is recalculated. When T>50%, X new is considered to be the demarcation point between the relatively clustered area and the relatively discrete area.

当Xnew为分界点时,在numberXmax>numberXmin情况下,令X21=X12=Xnew,则对应确定相对聚集区的上下边界以及相对离散区的上下边界。When X new is the dividing point, in the case of numberX max > numberX min , let X 21 =X 12 =X new , then the upper and lower boundaries of the relatively concentrated area and the upper and lower boundaries of the relatively discrete area are determined accordingly.

参见图11,是本发明实施例提供的一种超混沌密钥一次一密传输装置的结构示意图,所述装置包括:Referring to FIG. 11 , it is a schematic diagram of the structure of a hyperchaotic key one-time pad transmission device provided by an embodiment of the present invention, the device comprising:

对称模块,用于使用生成的对称密钥解密获取的混沌参数以及大素数参数;A symmetric module, used for decrypting the obtained chaotic parameters and large prime number parameters using the generated symmetric key;

混沌模块,用于根据所述混沌参数确定混沌函数,采用所述混沌函数生成随机数列;A chaos module, used for determining a chaos function according to the chaos parameters, and generating a random number sequence using the chaos function;

密钥生成模块,用于根据生成的随机数列以及所述大素数参数产生密钥流;A key generation module, used to generate a key stream according to the generated random number sequence and the large prime number parameter;

传输模块,用于根据所述密钥流进行一次一密数据传输。The transmission module is used to perform one-time one-key data transmission according to the key stream.

本实施例提供的超混沌密钥一次一密传输装置,能够执行上述任一实施例提供的超混沌密钥一次一密传输方法的所有步骤与功能,在此对该装置的具体功能不作赘述。The hyperchaotic key one-time pad transmission device provided in this embodiment can execute all the steps and functions of the hyperchaotic key one-time pad transmission method provided in any of the above embodiments, and the specific functions of the device will not be described in detail here.

参见图12,是本发明实施例提供的一种终端设备的结构示意图。所述终端设备包括:处理器、存储器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,例如一种超混沌密钥一次一密传输程序。所述处理器执行所述计算机程序时实现上述各个一种超混沌密钥一次一密传输方法实施例中的步骤,例如图1所示的步骤S1~S4。或者,所述处理器执行所述计算机程序时实现上述各装置实施例中各模块的功能。Referring to FIG. 12 , it is a schematic diagram of the structure of a terminal device provided by an embodiment of the present invention. The terminal device includes: a processor, a memory, and a computer program stored in the memory and executable on the processor, such as a hyperchaotic key one-time-one-pad transmission program. When the processor executes the computer program, the steps in each of the above-mentioned embodiments of the hyperchaotic key one-time-one-pad transmission method are implemented, such as steps S1 to S4 shown in FIG. 1 . Alternatively, when the processor executes the computer program, the functions of each module in the above-mentioned device embodiments are implemented.

示例性的,所述计算机程序可以被分割成一个或多个模块,所述一个或者多个模块被存储在所述存储器中,并由所述处理器执行,以完成本发明。所述一个或多个模块可以是能够完成特定功能的一系列计算机程序指令段,该指令段用于描述所述计算机程序在所述终端设备中的执行过程。例如,所述计算机程序可以被分割成若干模块,各模块具体功能在上述任一实施例提供的一种超混沌密钥一次一密传输方法中已作详细说明,在此对该装置的具体功能不作赘述。Exemplarily, the computer program may be divided into one or more modules, and the one or more modules are stored in the memory and executed by the processor to complete the present invention. The one or more modules may be a series of computer program instruction segments capable of completing specific functions, and the instruction segments are used to describe the execution process of the computer program in the terminal device. For example, the computer program may be divided into several modules, and the specific functions of each module have been described in detail in a hyperchaotic key one-time pad transmission method provided in any of the above embodiments, and the specific functions of the device will not be repeated here.

所述终端设备可以是桌上型计算机、笔记本、掌上电脑及云端服务器等计算设备。所述终端设备可包括,但不仅限于,处理器、存储器。本领域技术人员可以理解,所述示意图仅仅是一种终端设备的示例,并不构成对一种终端设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述终端设备还可以包括输入输出设备、网络接入设备、总线等。The terminal device may be a computing device such as a desktop computer, a notebook, a PDA, and a cloud server. The terminal device may include, but is not limited to, a processor and a memory. Those skilled in the art will appreciate that the schematic diagram is merely an example of a terminal device and does not constitute a limitation on a terminal device. The terminal device may include more or fewer components than shown in the diagram, or may combine certain components, or different components. For example, the terminal device may also include an input/output device, a network access device, a bus, etc.

所称处理器可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等,所述处理器是所述终端设备的控制中心,利用各种接口和线路连接整个终端设备的各个部分。The processor may be a central processing unit (CPU), other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (ASIC), field-programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. The general-purpose processor may be a microprocessor or any conventional processor, etc. The processor is the control center of the terminal device, and uses various interfaces and lines to connect various parts of the entire terminal device.

所述存储器可用于存储所述计算机程序和/或模块,所述处理器通过运行或执行存储在所述存储器内的计算机程序和/或模块,以及调用存储在存储器内的数据,实现所述一种超混沌密钥一次一密传输装置的各种功能。所述存储器可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器可以包括高速随机存取存储器,还可以包括非易失性存储器,例如硬盘、内存、插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(SecureDigital,SD)卡,闪存卡(Flash Card)、至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory can be used to store the computer program and/or module, and the processor realizes various functions of the one-time one-pad transmission device of the hyper-chaotic key by running or executing the computer program and/or module stored in the memory and calling the data stored in the memory. The memory can mainly include a program storage area and a data storage area, wherein the program storage area can store an operating system, an application required for at least one function (such as a sound playback function, an image playback function, etc.), etc.; the data storage area can store data created according to the use of the mobile phone (such as audio data, a phone book, etc.), etc. In addition, the memory can include a high-speed random access memory, and can also include a non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a smart memory card (Smart Media Card, SMC), a secure digital (SecureDigital, SD) card, a flash card (Flash Card), at least one disk storage device, a flash memory device, or other volatile solid-state storage devices.

其中,所述一种超混沌密钥一次一密传输装置集成的模块如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实现上述实施例方法中的全部或部分流程,也可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一计算机可读存储介质中,该计算机程序在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机程序包括计算机程序代码,所述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-OnlyMemory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质等。Wherein, if the module integrated in the one-time transmission device of a hyper-chaotic key is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on such an understanding, the present invention implements all or part of the processes in the above-mentioned embodiment method, and can also be completed by instructing the relevant hardware through a computer program. The computer program can be stored in a computer-readable storage medium, and when the computer program is executed by the processor, the steps of the above-mentioned various method embodiments can be implemented. Wherein, the computer program includes computer program code, and the computer program code can be in source code form, object code form, executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U disk, mobile hard disk, magnetic disk, optical disk, computer memory, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium, etc.

本发明实施例还提供一种计算机程序产品,包括计算机程序/指令,该计算机程序/指令被处理器执行时实现上述实施例中任一所述方法的步骤。An embodiment of the present invention further provides a computer program product, including a computer program/instruction, which implements the steps of any method described in the above embodiments when executed by a processor.

应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也视为本发明的保护范围。It should be pointed out that for ordinary technicians in this technical field, several improvements and modifications can be made without departing from the principles of the present invention, and these improvements and modifications are also considered to be within the scope of protection of the present invention.

Claims (14)

1.一种超混沌密钥一次一密传输方法,其特征在于,所述方法包括:1. A one-time transmission method for a hyperchaotic key, characterized in that the method comprises: 使用生成的对称密钥解密获取的混沌参数以及大素数参数;Use the generated symmetric key to decrypt the obtained chaotic parameters and large prime number parameters; 根据所述混沌参数确定混沌函数,采用所述混沌函数生成随机数列;Determine a chaotic function according to the chaotic parameters, and use the chaotic function to generate a random number sequence; 根据生成的随机数列以及所述大素数参数产生密钥流;Generate a key stream according to the generated random number sequence and the large prime number parameter; 根据所述密钥流进行一次一密数据传输。The one-time pad data transmission is performed according to the key stream. 2.根据权利要求1所述的超混沌密钥一次一密传输方法,其特征在于,根据所述混沌参数确定混沌函数,采用所述混沌函数生成随机数列,包括:2. The hyperchaotic key one-time pad transmission method according to claim 1 is characterized in that a chaotic function is determined according to the chaotic parameter, and a random number sequence is generated using the chaotic function, comprising: 根据所述混沌参数中的一维分支参数确定一维混沌函数,并根据所述混沌参数中的超混沌参数确定降维超混沌函数;Determining a one-dimensional chaotic function according to the one-dimensional branch parameters in the chaotic parameters, and determining a reduced-dimensional hyperchaotic function according to the hyperchaotic parameters in the chaotic parameters; 将所述对称密钥作为一维混沌的初始值,对所述一维混沌函数进行预设次数的迭代,确定输出序列;Using the symmetric key as the initial value of the one-dimensional chaos, iterating the one-dimensional chaotic function for a preset number of times to determine an output sequence; 根据所述输出序列确定超混沌的初始值,将确定的初始值输入所述降维超混沌函数中,生成所述随机数列。The initial value of the hyperchaos is determined according to the output sequence, and the determined initial value is input into the dimension reduction hyperchaos function to generate the random number sequence. 3.根据权利要求1所述的超混沌密钥一次一密传输方法,其特征在于,所述对称密钥生成过程,包括:3. The hyperchaotic key one-time pad transmission method according to claim 1, characterized in that the symmetric key generation process comprises: 在可信执行环境中由SRAM PUF生成的真随机数;True random numbers generated by SRAM PUF in a trusted execution environment; 根据所述真随机数生成所述对称密钥。The symmetric key is generated according to the true random number. 4.根据权利要求2所述的超混沌密钥一次一密传输方法,其特征在于,根据所述输出序列确定超混沌的初始值,包括:4. The hyperchaotic key one-time pad transmission method according to claim 2, characterized in that the initial value of the hyperchaotic key is determined according to the output sequence, comprising: 采用倒序取值的方式从所述输出序列中选取超混沌的初始值。The initial value of the hyperchaos is selected from the output sequence in a reverse order. 5.根据权利要求1所述的超混沌密钥一次一密传输方法,其特征在于,根据所述密钥流进行一次一密数据传输,包括:5. The method for transmitting a hyperchaotic key one-time pad according to claim 1, characterized in that the one-time pad data transmission according to the key stream comprises: 将所述密钥流存储在可信执行环境中;storing the keystream in a trusted execution environment; 当待加密数据为敏感数据时,在所述可信执行环境中采用所述密钥流对所述待加密数据进行加密;When the data to be encrypted is sensitive data, encrypting the data to be encrypted using the key stream in the trusted execution environment; 当待加密数据不为敏感数据时,从所述可信执行环境中取出所述密钥流,并在常规环境中采用所述密钥流对所述待加密数据进行加密。When the data to be encrypted is not sensitive data, the key stream is taken out from the trusted execution environment, and the key stream is used to encrypt the data to be encrypted in a conventional environment. 6.根据权利要求1所述的超混沌密钥一次一密传输方法,其特征在于,所述超混沌参数确定过程具体包括:6. The hyperchaotic key one-time pad transmission method according to claim 1, characterized in that the hyperchaotic parameter determination process specifically comprises: 选定预设两个二维超混沌函数的二维参数的初步值;Selecting and presetting preliminary values of two-dimensional parameters of two two-dimensional hyperchaotic functions; 根据两个二维超混沌函数的分布图确定降维超混沌函数的降维参数,得到降维超混沌函数;Determine the dimension reduction parameter of the dimension reduction hyperchaotic function according to the distribution diagrams of the two two-dimensional hyperchaotic functions, and obtain the dimension reduction hyperchaotic function; 根据预先训练的人工智能模型对所述降维超混沌函数的分布图进行识别;Identifying the distribution graph of the dimension-reduced hyperchaotic function according to a pre-trained artificial intelligence model; 当识别结果为无效图时,在预设的范围内对所述二维参数中的二维分支参数进行调整,重新确定降维超混沌函数,并对重新确定的降维超混沌函数的分布图进行识别;When the recognition result is an invalid graph, the two-dimensional branch parameters in the two-dimensional parameters are adjusted within a preset range, the dimension reduction hyperchaotic function is re-determined, and the distribution graph of the re-determined dimension reduction hyperchaotic function is recognized; 当识别结果为有效图时,将最新的二维参数作为所述超混沌参数。When the recognition result is a valid graph, the latest two-dimensional parameters are used as the hyperchaotic parameters. 7.根据权利要求6所述的超混沌密钥一次一密传输方法,其特征在于,根据两个二维超混沌函数的分布图确定降维超混沌函数的降维参数,得到降维超混沌函数,包括:7. The hyperchaotic key one-time pad transmission method according to claim 6, characterized in that the dimension reduction parameter of the dimension reduction hyperchaotic function is determined according to the distribution diagrams of the two two-dimensional hyperchaotic functions to obtain the dimension reduction hyperchaotic function, comprising: 确定两个二维超混沌函数的分布图的相对聚集区的上下边界以及相对离散区的上下边界;Determine the upper and lower boundaries of the relative aggregation area and the upper and lower boundaries of the relative discrete area of the distribution diagrams of two two-dimensional hyperchaotic functions; 构建所述降维超混沌函数的相对聚集区的上下边界以及相对离散区的上下边界与两个二维超混沌函数的分布图的相对聚集区的上下边界、相对离散区的上下边界,以及降维参数之间的函数关系;Constructing the functional relationship between the upper and lower boundaries of the relative aggregation area and the upper and lower boundaries of the relative discrete area of the dimensionality reduction hyperchaotic function and the upper and lower boundaries of the relative aggregation area and the upper and lower boundaries of the relative discrete area of the distribution diagrams of two two-dimensional hyperchaotic functions, and the dimensionality reduction parameters; 根据对所述降维超混沌函数的边界约束对所述函数关系进行求解,确定所述降维参数,根据所述降维参数确定所述降维超混沌函数。The functional relationship is solved according to the boundary constraints of the dimension reduction hyperchaotic function, the dimension reduction parameters are determined, and the dimension reduction hyperchaotic function is determined according to the dimension reduction parameters. 8.根据权利要求7所述的超混沌密钥一次一密传输方法,其特征在于,确定两个二维超混沌函数的分布图的相对聚集区的上下边界以及相对离散区的上下边界,包括:8. The one-time one-pad transmission method for a hyperchaotic key according to claim 7 is characterized in that determining the upper and lower boundaries of the relative clustering area and the upper and lower boundaries of the relative discrete area of the distribution diagrams of the two two-dimensional hyperchaotic functions comprises: 对不同二维超混沌函数,分别统计二维超混沌函数的分布图中最小值分布点的最小数量以及最大值的最大值分布点的最大数量;For different two-dimensional hyperchaotic functions, the minimum number of minimum value distribution points and the maximum number of maximum value distribution points in the distribution diagram of the two-dimensional hyperchaotic function are counted respectively; 根据所述最大数量和所述最小数量的大小关系,确定相对聚集区以及相对离散区的分布;Determine the distribution of relatively concentrated areas and relatively discrete areas according to the size relationship between the maximum number and the minimum number; 在所述最大值与所述最小值间搜索符合预设的分界条件的分界值,作为所述相对聚集区和所述相对离散区的分界点,确定所述相对聚集区的上下边界以及所述相对离散区的上下边界。A demarcation value that meets the preset demarcation condition is searched between the maximum value and the minimum value as the demarcation point between the relative clustering area and the relative discrete area, and the upper and lower boundaries of the relative clustering area and the upper and lower boundaries of the relative discrete area are determined. 9.根据权利要求8所述的超混沌密钥一次一密传输方法,其特征在于,在所述最大值与所述最小值间搜索符合预设的分界条件的分界值,包括:9. The hyperchaotic key one-time pad transmission method according to claim 8, characterized in that searching for a demarcation value that meets a preset demarcation condition between the maximum value and the minimum value comprises: 当所述最大数量小于所述最小数量时,将所述最小值增加预设的第一步长,更新当前判断值,统计当前判断值的当前判断数量,判断所述当前判断数量是否大于所述最小数量;When the maximum number is less than the minimum number, the minimum value is increased by a preset first step length, the current judgment value is updated, the current judgment number of the current judgment value is counted, and it is determined whether the current judgment number is greater than the minimum number; 若是,将所述当前判断数量作为前一判断数量,将所述当前判断值增加所述第一步长,更新当前判断值,重新统计当前判断数量,并判断当前判断数量是否大于前一判断数量;If so, taking the current judgment quantity as the previous judgment quantity, increasing the current judgment value by the first step length, updating the current judgment value, re-counting the current judgment quantity, and determining whether the current judgment quantity is greater than the previous judgment quantity; 若否,计算前一判断数量与当前判断数量的差值与前一判断数量的分界比值;If not, calculate the ratio of the difference between the previous judgment quantity and the current judgment quantity to the cutoff value of the previous judgment quantity; 当所述分界比值不大于预设的第一阈值时,将所述当前判断数量作为前一判断数量,将所述当前判断值增加所述步长,更新当前判断值,重新统计当前判断数量,并重新计算分界比值;When the demarcation ratio is not greater than a preset first threshold, the current judgment quantity is used as the previous judgment quantity, the current judgment value is increased by the step length, the current judgment value is updated, the current judgment quantity is recounted, and the demarcation ratio is recalculated; 当所述分界比值大于所述第一阈值时,将当前判断值作为所述分界值。When the demarcation ratio is greater than the first threshold, the current judgment value is used as the demarcation value. 10.根据权利要求8所述的超混沌密钥一次一密传输方法,其特征在于,在所述最大值与所述最小值间搜索符合预设的分界条件的分界值,包括:10. The hyperchaotic key one-time pad transmission method according to claim 8, characterized in that searching for a demarcation value that meets a preset demarcation condition between the maximum value and the minimum value comprises: 当所述最大数量大于所述最小数量时,将所述最大值减小预设的第二步长,更新当前判断值,统计当前判断值的当前判断数量,判断所述当前判断数量是否大于所述最大数量;When the maximum number is greater than the minimum number, reducing the maximum value by a preset second step length, updating the current judgment value, counting the current judgment number of the current judgment value, and determining whether the current judgment number is greater than the maximum number; 若是,将所述当前判断数量作为前一判断数量,将所述当前判断值减小所述第一步长,更新当前判断值,重新统计当前判断数量,并判断当前判断数量是否大于前一判断数量;If so, taking the current judgment number as the previous judgment number, reducing the current judgment value by the first step length, updating the current judgment value, re-counting the current judgment number, and determining whether the current judgment number is greater than the previous judgment number; 若否,计算前一判断数量与当前判断数量的差值与前一判断数量的分界比值;If not, calculate the ratio of the difference between the previous judgment quantity and the current judgment quantity to the cutoff value of the previous judgment quantity; 当所述分界比值不大于预设的第二阈值时,将所述当前判断数量作为前一判断数量,将所述当前判断值减小所述步长,更新当前判断值,重新统计当前判断数量,并重新计算分界比值;When the demarcation ratio is not greater than a preset second threshold, the current judgment quantity is used as the previous judgment quantity, the current judgment value is reduced by the step length, the current judgment value is updated, the current judgment quantity is recounted, and the demarcation ratio is recalculated; 当所述分界比值大于所述第二阈值时,将当前判断值作为所述分界值。When the demarcation ratio is greater than the second threshold, the current judgment value is used as the demarcation value. 11.一种超混沌密钥一次一密传输装置,其特征在于,所述装置包括:11. A hyperchaotic key one-time pad transmission device, characterized in that the device comprises: 对称模块,用于使用生成的对称密钥解密获取的混沌参数以及大素数参数;A symmetric module, used for decrypting the obtained chaotic parameters and large prime number parameters using the generated symmetric key; 混沌模块,用于根据所述混沌参数确定混沌函数,采用所述混沌函数生成随机数列;A chaos module, used for determining a chaos function according to the chaos parameters, and generating a random number sequence using the chaos function; 密钥生成模块,用于根据生成的随机数列以及所述大素数参数产生密钥流;A key generation module, used to generate a key stream according to the generated random number sequence and the large prime number parameter; 传输模块,用于根据所述密钥流进行一次一密数据传输。The transmission module is used to perform one-time one-key data transmission according to the key stream. 12.一种电子设备,其特征在于,包括处理器、存储器以及存储在所述存储器中且被配置为由所述处理器执行的计算机程序,所述处理器执行所述计算机程序时实现如权利要求1至10中任意一项所述的超混沌密钥一次一密传输方法。12. An electronic device, characterized in that it comprises a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, wherein when the processor executes the computer program, the one-time transmission method of a hyper-chaotic key as described in any one of claims 1 to 10 is implemented. 13.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括存储的计算机程序,其中,在所述计算机程序运行时控制所述计算机可读存储介质所在设备执行如权利要求1至10中任意一项所述的超混沌密钥一次一密传输方法。13. A computer-readable storage medium, characterized in that the computer-readable storage medium includes a stored computer program, wherein when the computer program is running, the device where the computer-readable storage medium is located is controlled to execute the hyper-chaotic key one-time-one-pad transmission method as described in any one of claims 1 to 10. 14.一种计算机程序产品,包括计算机程序/指令,其特征在于,该计算机程序/指令被处理器执行时实现权利要求1~10中任一所述方法的步骤。14. A computer program product, comprising a computer program/instruction, characterized in that when the computer program/instruction is executed by a processor, the steps of the method according to any one of claims 1 to 10 are implemented.
CN202411165571.0A 2024-08-23 2024-08-23 Hyperchaotic key one-time pad transmission method, device, equipment, medium and product Active CN118890154B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411165571.0A CN118890154B (en) 2024-08-23 2024-08-23 Hyperchaotic key one-time pad transmission method, device, equipment, medium and product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411165571.0A CN118890154B (en) 2024-08-23 2024-08-23 Hyperchaotic key one-time pad transmission method, device, equipment, medium and product

Publications (2)

Publication Number Publication Date
CN118890154A true CN118890154A (en) 2024-11-01
CN118890154B CN118890154B (en) 2025-10-03

Family

ID=93226317

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411165571.0A Active CN118890154B (en) 2024-08-23 2024-08-23 Hyperchaotic key one-time pad transmission method, device, equipment, medium and product

Country Status (1)

Country Link
CN (1) CN118890154B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119945660A (en) * 2025-04-10 2025-05-06 中国电信股份有限公司 Signal encryption processing method, signal decryption processing method and signal processing system
CN119995832A (en) * 2025-04-10 2025-05-13 中国电信股份有限公司 Data transmission method and related equipment

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1020783A (en) * 1996-06-28 1998-01-23 Meteoola Syst Kk Random number generating device, random number generating system and cipher communication system
US20080063185A1 (en) * 2006-01-31 2008-03-13 Tansu Alpcan Symmetric cryptosystem using cascaded chaotic maps
US20100211787A1 (en) * 2009-02-19 2010-08-19 Leonid Bukshpun Chaotic cipher system and method for secure communication
CN102437912A (en) * 2012-01-06 2012-05-02 厦门博鼎智文传媒科技有限公司 Digital copyright protection method of N-RSA encryption algorithm based on chaotic algorithm
CN102644419A (en) * 2012-02-23 2012-08-22 杭州电子科技大学 Dynamic password remote control lock based on chaos technology
CN104618091A (en) * 2015-02-16 2015-05-13 哈尔滨理工大学 Dual-chaotic system dynamic key and RSA jointed streaming media secret communication method
WO2017019507A1 (en) * 2015-07-29 2017-02-02 Los Alamos National Security, Llc Quantum random number generators
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
CN110313146A (en) * 2016-12-27 2019-10-08 赫尔德·西尔维斯特·佩瓦·菲盖拉 Blur enhancement
CN111988144A (en) * 2020-08-18 2020-11-24 大连大学 DNA one-time pad image encryption method based on multiple keys
CN115051794A (en) * 2022-05-18 2022-09-13 广州瀚信通信科技股份有限公司 Key generation method and information transmission method
CN117978362A (en) * 2024-04-02 2024-05-03 深圳市海域达赫科技有限公司 Data encryption method, system, computer device and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1020783A (en) * 1996-06-28 1998-01-23 Meteoola Syst Kk Random number generating device, random number generating system and cipher communication system
US20080063185A1 (en) * 2006-01-31 2008-03-13 Tansu Alpcan Symmetric cryptosystem using cascaded chaotic maps
US20100211787A1 (en) * 2009-02-19 2010-08-19 Leonid Bukshpun Chaotic cipher system and method for secure communication
CN102437912A (en) * 2012-01-06 2012-05-02 厦门博鼎智文传媒科技有限公司 Digital copyright protection method of N-RSA encryption algorithm based on chaotic algorithm
CN102644419A (en) * 2012-02-23 2012-08-22 杭州电子科技大学 Dynamic password remote control lock based on chaos technology
CN104618091A (en) * 2015-02-16 2015-05-13 哈尔滨理工大学 Dual-chaotic system dynamic key and RSA jointed streaming media secret communication method
WO2017019507A1 (en) * 2015-07-29 2017-02-02 Los Alamos National Security, Llc Quantum random number generators
CN110313146A (en) * 2016-12-27 2019-10-08 赫尔德·西尔维斯特·佩瓦·菲盖拉 Blur enhancement
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
CN111988144A (en) * 2020-08-18 2020-11-24 大连大学 DNA one-time pad image encryption method based on multiple keys
CN115051794A (en) * 2022-05-18 2022-09-13 广州瀚信通信科技股份有限公司 Key generation method and information transmission method
CN117978362A (en) * 2024-04-02 2024-05-03 深圳市海域达赫科技有限公司 Data encryption method, system, computer device and storage medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
QINGXIN SHENG等: "A one-time-pad-like chaotic image encryption scheme using data steganography", JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, vol. 78, 31 December 2023 (2023-12-31) *
TAKAYA MIYANO等: "Chaos-based one-time pad cryptography", 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 6 February 2017 (2017-02-06) *
ZAID A ABAD等: "Chaos-based speech steganography and quantum one time pad", JOURNAL OF ENGINEERING AND APPLIED SCIENCES, vol. 13, no. 3, 31 December 2018 (2018-12-31) *
李孟婷: "密钥流生成算法及其应用研究", 中国优秀硕士学位论文全文数据库 信息科技辑, no. 09, 15 September 2011 (2011-09-15) *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119945660A (en) * 2025-04-10 2025-05-06 中国电信股份有限公司 Signal encryption processing method, signal decryption processing method and signal processing system
CN119995832A (en) * 2025-04-10 2025-05-13 中国电信股份有限公司 Data transmission method and related equipment
CN119945660B (en) * 2025-04-10 2025-08-19 中国电信股份有限公司 Signal encryption processing method, signal decryption processing method and signal processing system

Also Published As

Publication number Publication date
CN118890154B (en) 2025-10-03

Similar Documents

Publication Publication Date Title
Acar et al. A survey on homomorphic encryption schemes: Theory and implementation
Guruprakash et al. EC-ElGamal and Genetic algorithm-based enhancement for lightweight scalable blockchain in IoT domain
Talhaoui et al. A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme
CN111461952B (en) Image encryption method, computer device, and computer-readable storage medium
Chase et al. Security of homomorphic encryption
CN118890154A (en) Hyperchaotic key one-time pad transmission method, device, equipment, medium and product
CN112231742B (en) Model joint training method and device based on privacy protection
KR101639051B1 (en) A method for secure communication in a network, a communication device, a network and a computer program therefor
CN110601821A (en) OFDM communication signal physical layer encryption method and device
CN113468601B (en) Data privacy fusion method and device
CN111464284A (en) A three-dimensional optical probability shaping encryption method based on deep chaotic system
CN108650085B (en) Block chain-based group member expansion method, device, equipment and medium
WO2021129470A1 (en) Polynomial-based system and method for fully homomorphic encryption of binary data
CN113806795B (en) Two-party privacy set union calculation method and device
CN117114959B (en) Image encryption method based on key feedback mechanism of multi-parameter one-dimensional chaotic system
CN118734940A (en) A model training method based on lossless federated learning and related equipment
CN118350452A (en) Federal learning method, client, server and system based on attention mechanism
Yin et al. A new image encryption algorithm with feedback key mechanism using two-dimensional dual discrete quadratic chaotic map
CN111339562B (en) Order preserving/de-ordering ciphertext recovery method and device
Akleylek et al. Fast NTRU encryption in GPU for secure IoP communication in post-quantum era
CN117171202A (en) Data query method and device
Ferrara et al. An information-theoretic approach to the access control problem
CN113630448B (en) Distributed encryption storage method and system, computer device, and readable storage medium
Mobin et al. Cryptanalysis of RSA Cryptosystem: Prime Factorization using Genetic Algorithm
Abiodun et al. Performance Evaluation of Selected Encryption Algorithms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant