A round function based on chaos is designed combining Feistel structure’s pseudo-randomness, chaotic system’s parameter sensitivity and image data characteristics. The round function composes of two parts--data tran...A round function based on chaos is designed combining Feistel structure’s pseudo-randomness, chaotic system’s parameter sensitivity and image data characteristics. The round function composes of two parts--data transformation based on Feistel(abbreviated as FST) and sampling output based on chaos(abbreviated as SMP). FST bases on Feistel structure and several efficient operations including bitwise xor, permutation and circulating shift. SMP is a chaos based pseudo-random sampling algorithm. It is from theoretical analysis that the round function is a pseudo-random function. The upper bounds of the average maximum differential probability and average maximum linear probability are p^2 and q^2 respectively. Finally, the good pseudo-randomness of the round function is examined with the NIST random test. The design of this round function provides an important cryptographic component for the design of chaotic image encryption algorithm.展开更多
In this paper, we study the computative structure of computable function - a structure of computative tree, and, by analysis on it, got the most general algorithm and model for computation on computable functions.
Source-generated energy in seismic vibrator records high frequency harmonic behavior. Conventional vibrator-earth coupling model was set up on the linear system. Some assumptions in the application of linear theory to...Source-generated energy in seismic vibrator records high frequency harmonic behavior. Conventional vibrator-earth coupling model was set up on the linear system. Some assumptions in the application of linear theory to the vibrator problem play an insignificant role in the overall coupling structure. Obviously, non-linear behaviors can be modeled using a “hard-spring” form of the Duffing equation. Model dedicates that a qualitatively similar harmonic component is present for a broad range of possible mathematical descriptions. After some qualitative analysis about the non-linear system, some conclusion can be drawn. Firstly, The design of the vibrator weight should be abided by two points as followed: In order to avoid decoupling for the vibrator to the earth, the weight should be greater than the peak of the driving force amplitude as to keep the resultant force pointing to the earth’s core. On the other hand, for the limited energy output, the vibrator overweight may damage the system high-frequency ability.Secondly, as the driving force frequency approaching to the ground hard-spring inherent frequency, the energy transmission was found to climb its peak from the system energy absorbed curve. At last, due to the non-linear coupling model system, its load curve would come into unstable frequency range, which might limit the application of the Vibroseis conventional sweeping pattern-linear sweep. A new sweeping pattern was listed: the driving signal was the pseudo-random sequence modulated by a fixed frequency cosine signal satisfying with the exploration precision and absorbing efficiency. The synthesized signal was ready to be realized by the electromagnetic driven system. Even the side-lobes noise of its auto-correlation function was restrained well. The theory coming from the Vibrator-earth coupling model was applied to the design of the Portable High-frequency Vibrator System (PHVS), and the good result was obtained. By the analysis of the vibrator base plate signal, the model was proved to be true. The exploration research on PHVS made a first step on its following optimal design.展开更多
In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or join...In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or joins the group, group center (GC) immediately changes the common encryption key and sends the new key to all valid members for forward and backward secrecy. If valid members are not on-line, they will miss the re-keying messages and will not be able to decrypt any ciphertext. Therefore, group members must be able to store the state of the system. In some applications, like global positioning systems (GPS) or pay-per-view systems, it is not reasonable to ask group members to stay on-line all the time and save the changes to the system. A hierarchical binary tree-based key management scheme are proposed for a secure group communication. This scheme reduces the key storage requirement of GC to a constant size and the group members are not required to be on-line constantly (stateless).展开更多
Pseudo-random sequences with long period, low correlation, high linear complexity, and uniform distribution of bit patterns are widely used in the field of information security and cryptography. This paper proposes an...Pseudo-random sequences with long period, low correlation, high linear complexity, and uniform distribution of bit patterns are widely used in the field of information security and cryptography. This paper proposes an approach for generating a pseudo-random multi-value sequence (including a binary sequence) by utilizing a primitive polynomial, trace function, and k-th power residue symbol over the sub extension field. All our previous sequences are defined over the prime field, whereas, proposed sequence in this paper is defined over the sub extension field. Thus, it’s a new and innovative perception to consider the sub extension field during the sequence generation procedure. By considering the sub extension field, two notable outcomes are: proposed sequence holds higher linear complexity and more uniform distribution of bit patterns compared to our previous work which defined over the prime field. Additionally, other important properties of the proposed multi-value sequence such as period, autocorrelation, and cross-correlation are theoretically shown along with some experimental results.展开更多
Existing works for securing network coding against wiretapping either incur high coding complexity or bring large bandwidth overhead. For exploiting the lightweight security mechanism for resource-constrained networks...Existing works for securing network coding against wiretapping either incur high coding complexity or bring large bandwidth overhead. For exploiting the lightweight security mechanism for resource-constrained networks, an efficient secure coding scheme is proposed in conjunction with the inherent mix- ing characteristic of network coding. The key idea is to minimize the randomizing operations to the entire plaintext data. The pro- posed scheme is shown to have properties of lightweight security complexity and lower communication overhead compared with the existing traditional solutions, and can be easy in implementation and combination with classical cryptography techniques.展开更多
基金the National Natural Science Foundation of China (Grant No. 61601517)basic and advanced technology research project of Henan Province, China (Grant No. 2014302703)
文摘A round function based on chaos is designed combining Feistel structure’s pseudo-randomness, chaotic system’s parameter sensitivity and image data characteristics. The round function composes of two parts--data transformation based on Feistel(abbreviated as FST) and sampling output based on chaos(abbreviated as SMP). FST bases on Feistel structure and several efficient operations including bitwise xor, permutation and circulating shift. SMP is a chaos based pseudo-random sampling algorithm. It is from theoretical analysis that the round function is a pseudo-random function. The upper bounds of the average maximum differential probability and average maximum linear probability are p^2 and q^2 respectively. Finally, the good pseudo-randomness of the round function is examined with the NIST random test. The design of this round function provides an important cryptographic component for the design of chaotic image encryption algorithm.
基金Project supported by National Natural Science Foundation of China.
文摘In this paper, we study the computative structure of computable function - a structure of computative tree, and, by analysis on it, got the most general algorithm and model for computation on computable functions.
文摘Source-generated energy in seismic vibrator records high frequency harmonic behavior. Conventional vibrator-earth coupling model was set up on the linear system. Some assumptions in the application of linear theory to the vibrator problem play an insignificant role in the overall coupling structure. Obviously, non-linear behaviors can be modeled using a “hard-spring” form of the Duffing equation. Model dedicates that a qualitatively similar harmonic component is present for a broad range of possible mathematical descriptions. After some qualitative analysis about the non-linear system, some conclusion can be drawn. Firstly, The design of the vibrator weight should be abided by two points as followed: In order to avoid decoupling for the vibrator to the earth, the weight should be greater than the peak of the driving force amplitude as to keep the resultant force pointing to the earth’s core. On the other hand, for the limited energy output, the vibrator overweight may damage the system high-frequency ability.Secondly, as the driving force frequency approaching to the ground hard-spring inherent frequency, the energy transmission was found to climb its peak from the system energy absorbed curve. At last, due to the non-linear coupling model system, its load curve would come into unstable frequency range, which might limit the application of the Vibroseis conventional sweeping pattern-linear sweep. A new sweeping pattern was listed: the driving signal was the pseudo-random sequence modulated by a fixed frequency cosine signal satisfying with the exploration precision and absorbing efficiency. The synthesized signal was ready to be realized by the electromagnetic driven system. Even the side-lobes noise of its auto-correlation function was restrained well. The theory coming from the Vibrator-earth coupling model was applied to the design of the Portable High-frequency Vibrator System (PHVS), and the good result was obtained. By the analysis of the vibrator base plate signal, the model was proved to be true. The exploration research on PHVS made a first step on its following optimal design.
文摘In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or joins the group, group center (GC) immediately changes the common encryption key and sends the new key to all valid members for forward and backward secrecy. If valid members are not on-line, they will miss the re-keying messages and will not be able to decrypt any ciphertext. Therefore, group members must be able to store the state of the system. In some applications, like global positioning systems (GPS) or pay-per-view systems, it is not reasonable to ask group members to stay on-line all the time and save the changes to the system. A hierarchical binary tree-based key management scheme are proposed for a secure group communication. This scheme reduces the key storage requirement of GC to a constant size and the group members are not required to be on-line constantly (stateless).
文摘Pseudo-random sequences with long period, low correlation, high linear complexity, and uniform distribution of bit patterns are widely used in the field of information security and cryptography. This paper proposes an approach for generating a pseudo-random multi-value sequence (including a binary sequence) by utilizing a primitive polynomial, trace function, and k-th power residue symbol over the sub extension field. All our previous sequences are defined over the prime field, whereas, proposed sequence in this paper is defined over the sub extension field. Thus, it’s a new and innovative perception to consider the sub extension field during the sequence generation procedure. By considering the sub extension field, two notable outcomes are: proposed sequence holds higher linear complexity and more uniform distribution of bit patterns compared to our previous work which defined over the prime field. Additionally, other important properties of the proposed multi-value sequence such as period, autocorrelation, and cross-correlation are theoretically shown along with some experimental results.
基金Supported by the National Natural Science Foundation of China(11371290,61301178)the Science and Technology Innovation Foundation of Xi'an(CXY1352WL28,CXY1352WL27)
文摘Existing works for securing network coding against wiretapping either incur high coding complexity or bring large bandwidth overhead. For exploiting the lightweight security mechanism for resource-constrained networks, an efficient secure coding scheme is proposed in conjunction with the inherent mix- ing characteristic of network coding. The key idea is to minimize the randomizing operations to the entire plaintext data. The pro- posed scheme is shown to have properties of lightweight security complexity and lower communication overhead compared with the existing traditional solutions, and can be easy in implementation and combination with classical cryptography techniques.