SM4 key scheme algorithm based on chaotic system

被引:10
|
作者
Wang Chuan-Fu [1 ]
Ding Qun [1 ]
机构
[1] Heilongjiang Univ, Coll Elect Engn, Harbin 150080, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
chaos; key scheme algorithm; field-programmable gate array;
D O I
10.7498/aps.66.020504
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Block cipher is a widely used encryption method. In order to improve the security of information in the network data encryption systems, the initial key should be guaranteed to be large enough. In order to overcome the threat of quantum computer to short initial keys, a key scheme based on chaotic map is proposed. The chaotic map is introduced into the original SM4 key scheme, which effectively increases the initial key space and greatly improves the resistance to key scheme attacks. Due to the limited logic resources in hardware implementation, a logistic map is chosen as a chaotic system in this paper. Although the logistic map has many excellent properties of chaotic system, such as initial value sensitivity, randomness, ergodic, etc, there are still a lot of problems that we need to pay attention to. The parameter mu is the system parameter in the logistic map. The value of mu controls chaotic characteristics in the logistic map. When mu is equal to 4, the dynamic characteristics of logistic map are best. The values of data transmitted in the network are all quantified as 0 and mu. In order to implement the logistic map in a digital circuit, the digital quantization is needed. The bit sequence design quantization is very simple and saves resource consumption. Compared with other quantization methods, bit sequence design quantization can be implemented in hardware parallelly. United States National Institute of Standards and Technology launched the test program package to test the random numbers. The test program package includes frequency detection, block frequency detection, run test, etc. Those tests are used to detect the randomness in binary sequence of arbitrary length. The test program package proves that the sequence generated by the logistic map has a great randomness characteristic. After the security analysis of logistic map, the hardware implementation of logistic map is carried out in this paper. Based on the theoretical analysis and hardware implementation in the logistic map, a new SM4 key scheme combined with the logistic map is proposed. The proposed key scheme has less hardware resource consumption, larger key space and higher security than other key schemes combined with chaotic systems. The output of key scheme in this paper is tested by the test program package. The results show that the random number produced by new key scheme is larger. In the end, a key scheme attack is introduced in this paper. It is proved that the new key scheme in this paper can effectively resist existing key scheme attacks.
引用
收藏
页数:9
相关论文
共 23 条
  • [1] Stability regions for linear fractional differential systems and their discretizations
    Cermak, Jan
    Kisela, Tomas
    Nechvatal, Ludek
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2013, 219 (12) : 7012 - 7022
  • [2] Chen Hong, 2009, Journal of Beijing Technology and Business University, V27, P57
  • [3] Ding Q, 2011, CHINESE J SCI INSTRU, V32, P231
  • [4] Dong B H, 2009, INFORM SECURITY COMM, V8, P327
  • [5] Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
    Fu, Zhangjie
    Wu, Xinle
    Guan, Chaowen
    Sun, Xingming
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2706 - 2716
  • [6] Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
    Fu, Zhangjie
    Ren, Kui
    Shu, Jiangang
    Sun, Xingming
    Huang, Fengxiao
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (09) : 2546 - 2559
  • [7] Structural Minimax Probability Machine
    Gu, Bin
    Sun, Xingming
    Sheng, Victor S.
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2017, 28 (07) : 1646 - 1656
  • [8] Hu X Y, 2006, NETWORK SECURITY TEC, V3, P69
  • [9] Jiang J, 2008, NETW SECUR TECHNOL A, V9, P92
  • [10] Asymmetric color image encryption scheme using 2D discrete-time map
    Liu, Hongjun
    Kadir, Abdurahman
    [J]. SIGNAL PROCESSING, 2015, 113 : 104 - 112