Journal of Guangdong University of Technology ›› 2019, Vol. 36 ›› Issue (01): 16-22.doi: 10.12052/gdutxb.180120

Previous Articles     Next Articles

Design and Realization of Chaos-Based File Encryption System

Chen Ping, Chen Bao-ju   

  1. School of Automation, Guangdong University of Technology, Guangzhou 510006, China
  • Received:2018-09-14 Online:2019-01-25 Published:2018-12-05

Abstract: In applications such as communications and cloud storage, electronic files encryption is an important way to enhance information security and prevent cyber theft. A new encryption scheme and its hardware realization are proposed. First, two 3-D discrete time chaotic systems based on chaos anti-control theory are designed. Then each variable from these two chaotic systems is multiplied and molded, and the results are used to encrypt files. Security analysis is finally conducted. To keep the encrypted file remaining in its original format, the encryption system only encrypts the file data section but not the file format section, so that it avoids the format compatibility problems caused by format corruption. The encryption system is implemented mainly based on a SOPC (System on a Programmable Chip), while the encryption algorithm is achieved in FPGA (Field Programmable Gate Array) and the Ethernet communication is realized in ARM (Advanced RISC Machines). Experiment results show that the electronic files are encrypted and decrypted correctly and the format is compatible, and thus experiment results present the favorable security performance and the technical feasibility.

Key words: chaos, file encryption, SOPC(system on a programmable chip), FPGA(field programmable gate array)

CLC Number: 

  • TP37
[1] 韩英. 浅谈电子文件信息安全与保障措施[J]. 档案管理, 2014, 4:80-81 HAN Y. Talking about the information security and safeguard measures of electronic documents[J]. Archives Management, 2014, 4:80-81
[2] 贾宗璞, 田肖, 李贺. 一种聚合签名认证的私有云文件加密系统[J]. 计算机工程与应用, 2015, 51(24):114-119 JIA Z P, TIAN X, LI H. Private cloud files encryption system based on aggregate signature authentication[J]. Computer Engineering and Applications, 2015, 51(24):114-119
[3] 王晓妮, 韩建刚. 云计算面临的信息安全威胁及防御策略研究[J]. 航空计算技术, 2018, 48(2):113-117 WANG X N, HAN J G. Research on information security threats and defense strategies of cloud computing[J]. Aeronautical Computing Technique, 2018, 48(2):113-117
[4] 爨玉伟, 阮晓宏. 基于DES及其改进算法的文件加密系统[J]. 计算机技术与发展, 2014, 24(7):166-169 CUAN Y W, RUAN X H. Encrypted file system based on DES algorithm and its improved algorithm[J]. Computer Technology and Development, 2014, 24(7):166-169
[5] 朱天楠, 施勇, 薛质. 基于Xposed的Android透明文件加密系统的研究[J]. 计算机技术与发展, 2017, 27(2):64-68 ZHU T N, SHI Y, XUE Z. Research on Android transparent encryption file system based on Xposed[J]. Computer Technology and Development, 2017, 27(2):64-68
[6] 许肖威, 刘雄, 戴一奇. 基于安全局域网分级文件分发系统设计与实现[J]. 计算机应用研究, 2012, 29(11):4246-4249 XU X W, LIU X, DAI Y Q. Gradable file distribution system design and implementation based on security LAN[J]. Application Research of Compute, 2012, 29(11):4246-4249
[7] 万荣泽, 莫洪武, 余思东. 基于超混沌DNA计算优化OTP算法的文本图像加密算法[J]. 计算机测量与控制, 2014, 22(10):3278-3284 WAN R Z, MO H W, YU S D. Document and image encryption based on OTP optimized by hyper-chaos mapping DNA computing[J]. Computer Measurement & Control, 2014, 22(10):3278-3284
[8] 杨明极, 范希冀, 于舒春. 基于三维混沌映射的HSV空间图像加密算法研究[J]. 哈尔滨理工大学学报, 2015, 20(6):103-106 YANG M J, FAN X J, YU S C. Encryption algorithm based on 3D chaotic mapping in HSV space[J]. Journal of Harbin University of Science and Technology, 2015, 20(6):103-106
[9] 韩庆龙, 吕洁, 王凤芹. 基于混合加密的移动存储文件安全系统设计与实现[J]. 海军航空工程学院学报, 2017, 32(6):576-680 HAN Q L, LU J, WANG F Q. Design and implementation of a security system of files on removable sorage devices based on Hybrid encryption[J]. Journal of Naval Aeronautical and Astronautical University, 2017, 32(6):576-680
[10] CHEN G R, LAI D J. Feedback control of lyapunov exponents for discrete-time dynamical systems[J]. International Journal of Bifurcation and Chaos, 1996, 6(7):1341-1349
[11] WANG X F, CHEN G R. Chaotification via arbitrarily small feedback controls:theory, method, and applications[J]. International Journal of Bifurcation and Chaos, 2000, 10(3):549-570
[12] GAN Q Y, YU S M, LI C Q, et al. Design and ARM-embedded implementation of a chaotic map-based multicast scheme for multiuser speech wireless communication[J]. International Journal of Circuit Theory and Applications, 2017, 45:1849-1872
[13] ZHANG X Y, YU S M, CHEN P, et al. Design and ARM-embedded implementation of a chaotic secure communication scheme based on H.264 selective encryption[J]. Nonlinear Dynamics, 2017, 89:1949-1965
[14] SHEN C W, YU S M, LU J H, et al. A systematic methodology for constructing hyperchaotic systems with multiple positive Lyapunov exponents and circuit implementation[J]. IEEE Transactions on Circuits and Systems-I, 2014, 61(3):854-864
[15] SHEN C W, YU S M, LU J H. et al Constructing hyperchaotic systems at will[J]. International Journal of Circuit Theory and Applications, 2015, 43(12):2039-2056
[16] WOLF A, SWIFT J B, SWINNEY H L, et al. Determining lyapunov exponents from a time series[J]. Physica D, 1985, 16(3):285-327
[1] Heng Yuan, Wu Jian-cheng, Yang Zhi-jun. A Fixed-point Design of Control Algorithm Based on FPGA [J]. Journal of Guangdong University of Technology, 2020, 37(03): 55-58.
[2] Chen Jing-hua, Liang Li-li, Ding Lin-jun, Zhou Jun, Liu Guo-xiang. Unit Commitment Optimization Based on Chance-constrained Programming in Wind Power Integrated System [J]. Journal of Guangdong University of Technology, 2017, 34(01): 50-54,64.
[3] ZHENG Jun-bo, SU Cheng-yue, LIN Jian-bing, HE Rong-li. The Realization of the Real-time Gesture Segment Algorithm and Corresponding Hardware on Complicated Background [J]. Journal of Guangdong University of Technology, 2016, 33(05): 54-58.
[4] LUO Ping, LIU Wei, ZHOU Shu-Bo. Gravitational Search Algorithm of Adaptive Chaos Mutation [J]. Journal of Guangdong University of Technology, 2016, 33(01): 57-61.
[5] CHEN Bao-Ying, GAO Xue-Jun. New Classification Rules of 3-D Quadratic Autonomous Chaotic System [J]. Journal of Guangdong University of Technology, 2016, 33(01): 26-28.
[6] ZHAO Shu-Yang, LIU Wei, CAI Yao-He. Artificial Bee Colony Algorithm Based on Improvement  of Chaotic Local Search [J]. Journal of Guangdong University of Technology, 2013, 30(4): 55-60.
[7] XIE Hai, En Yun-Fei , WANG Li-Wei. Design and Detection of Hardware Trojan Based on Electromagnetic Leakage [J]. Journal of Guangdong University of Technology, 2013, 30(4): 70-73.
[8] Tang Ya-lian, Cai Yan-guang, Guo Shuai, Le Feng. SingleDepot Incident Vehicle Routing Problem Based on Chaos Genetic Algorithm [J]. Journal of Guangdong University of Technology, 2013, 30(3): 53-57.
[9] Zhang Hui-hua,Zheng Sheng-lin,Pan Bao-chang,Gan Yan-fen,Wen Chuan-xue . Algorithm of Graded Embedding Multi-watermarking Based on Encryption of Hyperchaos [J]. Journal of Guangdong University of Technology, 2008, 25(4): 52-55.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!