Computer Science ›› 2022, Vol. 49 ›› Issue (4): 376-384.doi: 10.11896/jsjkx.210300116

;

• Information Security • Previous Articles    

Chaotic Sequence Cipher Algorithm Based on Discrete Anti-control

ZHAO Geng1,2, LI Wen-jian1,2, MA Ying-jie2   

  1. 1 School of Telecommunication Engineering, Xidian University, Xi'an 710071, China;
    2 Department of Cryptography, Beijing Electronic Science and Technology Institute, Beijing 100070, China
  • Received:2021-03-11 Revised:2021-07-22 Published:2022-04-01
  • About author:ZHAO Geng,born in 1964,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include chaotic secure communication and information security.LI Wen-jian,born in 1996,postgra-duate.His main research interests include chaotic sequence and information secu-rity.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China(61772047) and “High-Precision” Program Construction Project in Beijing Universities (3201017).

Abstract: Aiming at the degeneracy problem of discrete chaotic dynamics system in the digital domain, an algorithm that can configure the Lyapunov exponents of the system to be all positive is proposed.The algorithm is based on the principle of chaos anti-control.First, a feedback matrix is introduced.All the parameters in the set are specified carefully, and it is proved from a theore-tical point of view that the algorithm can configure the Lyapunov exponent to be fully positive.Subsequently, the boundedness of the system orbit and the finiteness of the Lyapunov exponent are proved, and the numerical simulation analysis and performance comparison of the configuration are carried out through several examples, so as to verify that the algorithm can produce a discrete chaotic system without degenerate.There are certain advantages in numerical accuracy and algorithm running time.The configured chaotic system is then used to generate the sequence and then quantized.The quantization scheme is to take out the effective digital combination of the sequence.Some dynamic transformation processing on the sequence can enhance the randomness and complexity of the output sequence.We convert the transformed output sequence into a binary sequence, perform a number of randomness and statistical tests, and compare the performance with the general chaotic sequence.The test results show that the sequence has better random characteristics and can be used in a chaotic sequence cipher system.

Key words: Anti-control, Chaotic system, Lyapunov exponent, Sequence cipher

CLC Number: 

  • TN918.91
[1] CUI J,WANG Y,ZHANG J.Full Session Key AgreementScheme Based on Chaotic Map in Vehicular Ad hoc Networks[J].IEEE Transactions on Vehicular Technology,2020,69(8):8914-8924.
[2] SURESHKUMAR V,AMIN R,OBAIDAT M S,et al.An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map[J].Journal of Information Security and Applications,2020,53:102539.
[3] CHEN S K,YU S M,LÜ J H,et al.Design and FPGA-based realization of a chaotic secure video communication system[J].IEEE Transactions on Circuits and Systems for Video Techno-logy,2018,28(9):2359-2371.
[4] ZHOU S,WANG X Y.Simple estimation method for the largest Lyapunov exponent of continuous fractional-order differential equations[J].Physica A:Statistical Mechanics and its Applications,2021,563:125478.
[5] CHEN H K,LEE C I.Anti-control of chaos in rigid body motion[J].Chaos Solitons & Fractals,2004,21(4):957-965.
[6] CHEN G R,WANG X F.Chaos of Dynamical System—Theory,Method and Application [M].Shanghai:Shanghai Jiaotong University Press,2006.
[7] WANG C,FAN C,DING Q.Constructing Discrete Chaotic Systems with Positive Lyapunov Exponents[J].International Journal of Bifurcation & Chaos,2018,28(7):1850084.
[8] ZHANG L,TANG J S,OUYANG K J.Anti-control of perioddoubling bifurcation for a variable substitution model of Logistic map[J].Optik-International Journal for Light and Electron Optics,2017,130:1327-1332.
[9] YUAN C G,CHEN X.Generalized Chaos Control of Discrete Systems[J].Mathematics in Practice and Knowledge,2013,43(23):206-212.
[10] LIU N.Research on chaos anti-control of a class of linear systems[J].China Science and Technology Information,2012(12):60-61.
[11] ZHAO G,LI H,MA Y J,et al.Discrete dynamic system withoutdegradation-configuration of N positive Lyapunov exponents[J].Journal of Electronics and Information,2019,41(9):2280-2286.
[12] ZHAO L.Research on Anti-degradation Sequence Cipher[D].Xi’an:Xidian University,2020.
[13] XIANG H Y,LIU L F.A new perturbation-feedback hybridcontrol method for reducing the dynamic degradation of digital chaotic systems and its application in image encryption[J].Multimedia Tools and Applications,2021,80(1):1-25.
[14] WU T,JIN J G,WEI M J.A Hash function algorithm based on variable parameter cascade chaos[J].Computer Research and Development,2016,53(3):674-681.
[15] SHI J P,YANG L T.Design and circuit simulation of a switched chaotic system[J].Modern Electronic Technology,2019,42(8):59-62,67.
[16] YU S M,LU J H,CHEN G R.Anti-control method of power system and its application[M].Beijing:Science Press,2013.
[17] WEN H P,YU S M,LU J H.Encryption algorithm based on Hadoop big data platform and non-degenerate high-dimensional discrete hyperchaotic system[J].Acta Physica Sinica,2017,66(23):76-89.
[18] GAN Q Y.Voice chaotic secure communication based on multicast and WAN transmission and ARM implementation [D].Guangdong University of Technology,2016.
[19] OZKAYNAK F.Brief review on application of nonlinear dyna-mics in image encryption[J].Nonlinear Dynamics,2018,92(2):305-313.
[20] PREISHUBER M,HUTTER T,KATZENBEISSER S,et al.Depreciating motivation and empirical security analysis of chaos-based image and encryption[J].IEEE Transactions on Information Forensics And Security,2018,13(9):2137-2150.
[1] HOU Pei-guo, WANG Zhi-xuan, YAN Chen. Improvement of Anti-collision Algorithm Based on RFID Tag [J]. Computer Science, 2019, 46(11A): 359-362.
[2] WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472.
[3] ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487.
[4] YAN Bo, HE Shao-bo. Dynamics and Complexity Analysis of Fractional-order Unified Chaotic System [J]. Computer Science, 2019, 46(11A): 539-543.
[5] LI Xiu-yun and CHEN Shuai. Improved Maximal Lyapunov Exponent Chaotic Forecasting Method Based on Markov Chain Theory [J]. Computer Science, 2016, 43(4): 270-273.
[6] CHAI Xiu-li and GAN Zhi-hua. New Bit-level Self-adaptive Color Image Encryption Algorithm Based on Hyperchaotic System [J]. Computer Science, 2016, 43(4): 134-139.
[7] CHAI Xiu-li and GAN Zhi-hua. Self-adaptive Bit-level Colour Image Encryption Algorithm Based on Spatiotemporal Chaotic System [J]. Computer Science, 2015, 42(7): 204-209.
[8] CHAI Xiu-li, GAN Zhi-hua and WANG Jun. Modified Function Projective Quasisynchronization of a Class of Delayed Chaotic System [J]. Computer Science, 2015, 42(5): 169-172.
[9] CHENG Ping-guang, MA Yue, HUANG Jun-jian and LIU Ji. Finite Time Control of Memristor Chaotic Systems [J]. Computer Science, 2015, 42(2): 260-262.
[10] FANG Ying and XU Bing-ji. Charge-controlled Memristor-based Chaotic Circuit [J]. Computer Science, 2014, 41(Z11): 447-450.
[11] CHAI Xiu-li,WANG Yu-jing,YUAN Guang-yao and SHI Chun-xiao. Modified Function Projective Lag Synchronization of Chaotic Systems Subject to Unknown Disturbance [J]. Computer Science, 2014, 41(4): 283-286.
[12] . Synchronization between Different Hyperchaotic Systems and Dimensions and its Application in Secret Communication [J]. Computer Science, 2012, 39(4): 220-222.
[13] LU Hui-bin,SUN Yan. Image Encryption Scheme Based on Novel Hyperchaotic System [J]. Computer Science, 2011, 38(6): 149-152.
[14] ZHANG Xiang-hua. Modified Algorithm for Hash Function Based on the Spatiotemporal Chaotic System [J]. Computer Science, 2009, 36(7): 252-255.
[15] . [J]. Computer Science, 2008, 35(12): 196-199.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!