Search

Article

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

SM4 key scheme algorithm based on chaotic system

Wang Chuan-Fu Ding Qun

Citation:

SM4 key scheme algorithm based on chaotic system

Wang Chuan-Fu, Ding Qun
PDF
Get Citation

(PLEASE TRANSLATE TO ENGLISH

BY GOOGLE TRANSLATE IF NEEDED.)

  • Block cipher is a widely used encryption method. In order to improve the security of information in the network data encryption systems, the initial key should be guaranteed to be large enough. In order to overcome the threat of quantum computer to short initial keys, a key scheme based on chaotic map is proposed. The chaotic map is introduced into the original SM4 key scheme, which effectively increases the initial key space and greatly improves the resistance to key scheme attacks.#br#Due to the limited logic resources in hardware implementation, a logistic map is chosen as a chaotic system in this paper. Although the logistic map has many excellent properties of chaotic system, such as initial value sensitivity, randomness, ergodic, etc, there are still a lot of problems that we need to pay attention to. The parameter μ is the system parameter in the logistic map. The value of μ controls chaotic characteristics in the logistic map. When μ is equal to 4, the dynamic characteristics of logistic map are best. The values of data transmitted in the network are all quantified as 0 and 1. In order to implement the logistic map in a digital circuit, the digital quantization is needed. The bit sequence design quantization is very simple and saves resource consumption. Compared with other quantization methods, bit sequence design quantization can be implemented in hardware parallelly. United States National Institute of Standards and Technology launched the test program package to test the random numbers. The test program package includes frequency detection, block frequency detection, run test, etc. Those tests are used to detect the randomness in binary sequence of arbitrary length. The test program package proves that the sequence generated by the logistic map has a great randomness characteristic. After the security analysis of logistic map, the hardware implementation of logistic map is carried out in this paper. Based on the theoretical analysis and hardware implementation in the logistic map, a new SM4 key scheme combined with the logistic map is proposed. The proposed key scheme has less hardware resource consumption, larger key space and higher security than other key schemes combined with chaotic systems. The output of key scheme in this paper is tested by the test program package. The results show that the random number produced by new key scheme is larger. In the end, a key scheme attack is introduced in this paper. It is proved that the new key scheme in this paper can effectively resist existing key scheme attacks.
      Corresponding author: Ding Qun, qunding@aliyun.com
    • Funds: Project supported by the National Natural Science Foundation of China (Grant No. 61471158) and the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20132301110004).
    [1]

    Shen C X, Zhamg H G, Feng D G, Chao Z F, Huang J W 2007 Sci. China Ser. E 37 129 (in Chinese)[沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武2007中国科学37 129]

    [2]

    Wu G C, Baleanu D 2014 Signal Process. 102 96

    [3]

    Wang E F, Wang Z, Jing M A, Ding Q 2011 J. Net. 6 1025

    [4]

    Liu H, Kadir A 2015 Signal Process. 113 104

    [5]

    Tang S, Chen H F, Hwang S K, Liu J M 2002 IEEE T. Circuits-I. 49 163

    [6]

    Quan A J, Jiang G P, Zuo T, Chen T 2005 J. Nanjing University of Posts and Telecommunications 25 80 (in Chinese)[权安静, 蒋国平, 左涛, 陈婷2005南京邮电大学学报25 80]

    [7]

    Zhao R, Wang Q S, Wen H P 2006 Network Security Technology & Application 3 69 (in Chinese)[胡祥义, 刘彤2006网络安全技术与应用3 69]

    [8]

    Jiang J Y, Liu T, Hu X Y 2008 Network Security Technology & Application 9 92 (in Chinese)[蒋继娅, 刘彤, 胡祥义2008网络安全技术与应用9 92]

    [9]

    Zhou S Y, P M M, Xiao X H 2011 Microelectronics & Computer 28 86 (in Chinese)[周术洋, 彭蔓蔓, 肖小欢2011微电子学与计算机28 86]

    [10]

    Pan J, Qi N, Xue B B, Ding Q 2012 Acta Phys. Sin. 61 180504 (in Chinese)[潘晶, 齐娜, 薛兵兵, 丁群2012物理学报61 180504]

    [11]

    Zhao G, Zheng D L, Dong J Y 2001 J. University of Science and Technology Beijing 23 173 (in Chinese)[赵耿, 郑德玲, 董冀媛2001北京科技大学学报23 173]

    [12]

    Dong B H, Zhou J Y, Huang J Y 2009 Information Security and Communications Privacy 8 327 (in Chinese)[董斌辉, 周健勇, 黄金源2009信息安全与通信保密8 327]

    [13]

    Cermak J, Kisela T, Nechvatal L 2013 Appl. Math. Comput. 219 7012

    [14]

    Ding Q, Wang L 2011 Chinese J. Scientific Instrument 32 231 6 (in Chinese)[丁群, 王路2011仪器仪表学报231 6]

    [15]

    Yu N, Ding Q, Chen H 2007 J. Communs. 28 73 (in Chinese)[于娜, 丁群, 陈红2007通信学报28 73]

    [16]

    Zhang Y H, Sun X M, Wang B W 2016 China Commun. 13 16

    [17]

    Gu B, Sheng V S 2016 IEEE T. Neur. Net. Lear. 1 1

    [18]

    Li W, Wu D G 2008 J. Communs. 29 135 (in Chinese)[李玮, 谷大武2008通信学报29 135]

    [19]

    Sheng L Y, Wen J, Cao L L, Xiao Y Y 2007 Acta Phys. Sin. 56 78 (in Chinese)[盛利元, 闻姜, 曹莉凌, 肖燕予2007物理学报56 78]

    [20]

    Fu Z, Ren K, Shu J, Sun X 2016 IEEE T. Parall. Distr. 27 2546

    [21]

    Fu Z J, Wu X L, Guan C W, Sun X M, Ren K 2016 IEEE T. Inf. Foren. Sec. 11 2706

  • [1]

    Shen C X, Zhamg H G, Feng D G, Chao Z F, Huang J W 2007 Sci. China Ser. E 37 129 (in Chinese)[沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武2007中国科学37 129]

    [2]

    Wu G C, Baleanu D 2014 Signal Process. 102 96

    [3]

    Wang E F, Wang Z, Jing M A, Ding Q 2011 J. Net. 6 1025

    [4]

    Liu H, Kadir A 2015 Signal Process. 113 104

    [5]

    Tang S, Chen H F, Hwang S K, Liu J M 2002 IEEE T. Circuits-I. 49 163

    [6]

    Quan A J, Jiang G P, Zuo T, Chen T 2005 J. Nanjing University of Posts and Telecommunications 25 80 (in Chinese)[权安静, 蒋国平, 左涛, 陈婷2005南京邮电大学学报25 80]

    [7]

    Zhao R, Wang Q S, Wen H P 2006 Network Security Technology & Application 3 69 (in Chinese)[胡祥义, 刘彤2006网络安全技术与应用3 69]

    [8]

    Jiang J Y, Liu T, Hu X Y 2008 Network Security Technology & Application 9 92 (in Chinese)[蒋继娅, 刘彤, 胡祥义2008网络安全技术与应用9 92]

    [9]

    Zhou S Y, P M M, Xiao X H 2011 Microelectronics & Computer 28 86 (in Chinese)[周术洋, 彭蔓蔓, 肖小欢2011微电子学与计算机28 86]

    [10]

    Pan J, Qi N, Xue B B, Ding Q 2012 Acta Phys. Sin. 61 180504 (in Chinese)[潘晶, 齐娜, 薛兵兵, 丁群2012物理学报61 180504]

    [11]

    Zhao G, Zheng D L, Dong J Y 2001 J. University of Science and Technology Beijing 23 173 (in Chinese)[赵耿, 郑德玲, 董冀媛2001北京科技大学学报23 173]

    [12]

    Dong B H, Zhou J Y, Huang J Y 2009 Information Security and Communications Privacy 8 327 (in Chinese)[董斌辉, 周健勇, 黄金源2009信息安全与通信保密8 327]

    [13]

    Cermak J, Kisela T, Nechvatal L 2013 Appl. Math. Comput. 219 7012

    [14]

    Ding Q, Wang L 2011 Chinese J. Scientific Instrument 32 231 6 (in Chinese)[丁群, 王路2011仪器仪表学报231 6]

    [15]

    Yu N, Ding Q, Chen H 2007 J. Communs. 28 73 (in Chinese)[于娜, 丁群, 陈红2007通信学报28 73]

    [16]

    Zhang Y H, Sun X M, Wang B W 2016 China Commun. 13 16

    [17]

    Gu B, Sheng V S 2016 IEEE T. Neur. Net. Lear. 1 1

    [18]

    Li W, Wu D G 2008 J. Communs. 29 135 (in Chinese)[李玮, 谷大武2008通信学报29 135]

    [19]

    Sheng L Y, Wen J, Cao L L, Xiao Y Y 2007 Acta Phys. Sin. 56 78 (in Chinese)[盛利元, 闻姜, 曹莉凌, 肖燕予2007物理学报56 78]

    [20]

    Fu Z, Ren K, Shu J, Sun X 2016 IEEE T. Parall. Distr. 27 2546

    [21]

    Fu Z J, Wu X L, Guan C W, Sun X M, Ren K 2016 IEEE T. Inf. Foren. Sec. 11 2706

  • [1] Quan Xu, Qiu Da, Sun Zhi-Peng, Zhang Gui-Zhong, Liu Song. Dynamic analysis and FPGA implementation of a fourth-order chaotic system with coexisting attractor. Acta Physica Sinica, 2023, 72(19): 190502. doi: 10.7498/aps.72.20230795
    [2] Zhang Gui-Zhong, Quan Xu, Liu Song. Analysis and FPGA implementation of memristor chaotic system with extreme multistability. Acta Physica Sinica, 2022, 71(24): 240502. doi: 10.7498/aps.71.20221423
    [3] Wang Meng-Jiao, Wu Zhong-Tang, Feng Jiu-Chao. A parameter optimization nonlinear adaptive denoising algorithm for chaotic signals. Acta Physica Sinica, 2015, 64(4): 040503. doi: 10.7498/aps.64.040503
    [4] Wang Xing-Yuan, Zhang Ji-Ming. A novel image authentication and recovery algorithm based on chaos and Hamming code. Acta Physica Sinica, 2014, 63(2): 020701. doi: 10.7498/aps.63.020701
    [5] Wang Yue-Gang, Wen Chao-Bin, Zuo Zhao-Yang, Yang Jia-Sheng, Guo Zhi-Bin. Adaptive chaotic ant colony optimization-RD based gravity matching aided navigation. Acta Physica Sinica, 2014, 63(8): 089101. doi: 10.7498/aps.63.089101
    [6] Shao Shu-Yi, Min Fu-Hong, Wu Xue-Hong, Zhang Xin-Guo. Implementation of a new chaotic system based on field programmable gate array. Acta Physica Sinica, 2014, 63(6): 060501. doi: 10.7498/aps.63.060501
    [7] Liang Jun-Sheng, Wu Yuan, Wang An-Bang, Wang Yun-Cai. Extracting the external-cavity key of a chaotic semiconductor laser with double optical feedback by spectrum analyzer. Acta Physica Sinica, 2012, 61(3): 034211. doi: 10.7498/aps.61.034211
    [8] Chai Zheng-Yi, Zheng Li-Ping, Zhu Si-Feng. Chaotic immune optimization based resource allocation in cognitive radio network. Acta Physica Sinica, 2012, 61(11): 118801. doi: 10.7498/aps.61.118801
    [9] Chai Zheng-Yi, Chen Liang, Zhu Si-Feng. Parameter optimization of cognitive engine based on chaos multi-objective immune algorithm. Acta Physica Sinica, 2012, 61(5): 058801. doi: 10.7498/aps.61.058801
    [10] Liu Qiang, Fang Jin-Qing, Zhao Geng, Li Yong. Research of Chaotic encryption system based on FPGA technology. Acta Physica Sinica, 2012, 61(13): 130508. doi: 10.7498/aps.61.130508
    [11] Zheng Hao-Zhou, Hu Jin-Feng, Liu Li-Dong, He Zi-Shu. Study on fast synchronization of chaos. Acta Physica Sinica, 2011, 60(11): 110507. doi: 10.7498/aps.60.110507
    [12] Zhang Wei-Wei, Wang Jing, Wang Hui, Zhao Yun-Tao. Research on the variable universe fuzzy algorithm of chaotic systems. Acta Physica Sinica, 2011, 60(1): 010511. doi: 10.7498/aps.60.010511
    [13] Zhou Wu-Jie, Yu Si-Min. Chaotic digital communication system based on field programmable gate array technology—Design and implementation. Acta Physica Sinica, 2009, 58(1): 113-119. doi: 10.7498/aps.58.113
    [14] Zou Lu-Juan, Wang Bo, Feng Jiu-Chao. A digital watermarking algorithm based on chaos and fractional Fourier transformation. Acta Physica Sinica, 2008, 57(5): 2750-2754. doi: 10.7498/aps.57.2750
    [15] Wang Ji-Zhi, Wang Mei-Qin, Wang Ying-Long. The collision of one keyed Hash function based on chaotic map and analysis. Acta Physica Sinica, 2008, 57(5): 2737-2742. doi: 10.7498/aps.57.2737
    [16] Xu Shu-Jiang, Wang Ji-Zhi. An improved block cryptosystem based on iterating chaotic map. Acta Physica Sinica, 2008, 57(1): 37-41. doi: 10.7498/aps.57.37
    [17] Zhou Wu-Jie, Yu Si-Min. Design and implementation of chaotic generators based on IEEE-754 standard and field programmable gate array technology. Acta Physica Sinica, 2008, 57(8): 4738-4747. doi: 10.7498/aps.57.4738
    [18] Yan Hua, Wei Ping, Xiao Xian-Ci. An adaptive approach based on Bernstein polynomial to predict chaotic time series. Acta Physica Sinica, 2007, 56(9): 5111-5118. doi: 10.7498/aps.56.5111
    [19] He Hong-Jie, Zhang Jia-Shu. A chaos-based self-embedding secure watermarking algorithm. Acta Physica Sinica, 2007, 56(6): 3092-3100. doi: 10.7498/aps.56.3092
    [20] Wang Dong-Feng. Genetic algorithm optimization based proportional-integral-derivative controller for unified chaotic system. Acta Physica Sinica, 2005, 54(4): 1495-1499. doi: 10.7498/aps.54.1495
Metrics
  • Abstract views:  5517
  • PDF Downloads:  336
  • Cited By: 0
Publishing process
  • Received Date:  21 August 2016
  • Accepted Date:  06 November 2016
  • Published Online:  20 January 2017

/

返回文章
返回