吉首大学学报(自然科学版) ›› 2024, Vol. 45 ›› Issue (1): 19-23.DOI: 10.13438/j.cnki.jdzk.2024.01.004

• 计算机 • 上一篇    下一篇

基于混沌序列的电子档案上传加密方法

许德斌   

  1. (1.合肥职业技术学院办公室,安徽 合肥 230012;2.武汉大学信息管理学院,湖北 武汉 430072)
  • 出版日期:2024-01-25 发布日期:2024-01-31
  • 作者简介:许德斌(1977—),男,安徽庐江人,合肥职业技术学院研究馆员,硕士,武汉大学信息管理学院访问学者,主要从事计算机应用技术、电子档案与信息安全研究.
  • 基金资助:
    安徽省教育厅高等学校优秀青年骨干教师国内访学研修项目(GXGNFX2020068);安徽省教育厅质量工程项目(2021JXTD247);安徽省教育厅人文社科研究重点项目(2023AH052528);安徽省职业与成人教育学会教育科研规划重点课题(AZCJ2023053);安徽省高等学校档案工作协会重点研究项目(2023ZD015)

Electronic File Uploading Encryption Method Based on Chaotic Sequence

XU Debin   

  1. (1.Office of Hefei Vocational and Technological College,Hefei 230012,China;2.School of Information Management,Wuhan University,Wuhan 430072,China)
  • Online:2024-01-25 Published:2024-01-31

摘要:为了提升数据的存储效率和电子档案的传输安全性,设计了一种基于混沌序列的电子档案上传加密方法(混沌序列方法).以形式化方案分解电子档案上传步骤,在交互过程中统一定义上传形式;采用Logistic映射关系表示混沌模式,给定混沌序列变化区间,随机生成档案加密密钥流;在保证电子档案可完整解密的前提下,设定密文置换规则,设置置换流程,根据可逆关系调整密文顺序,完成电子档案的加密上传.在光纤网络配置基础上模拟电子档案上传全过程,实验结果表明,混沌序列方法能够在10 s内生成128 bit加密密钥,且在规定时间内完成498组1.5 GB内存大小的电子档案传输.

关键词: 密文置换, 电子档案, 混沌序列, logistic映射

Abstract: In order to improve the transmission security of electronic files and the security of user information,a chaotic sequence based encryption method for uploading electronic files is studied.The formal scheme is used to decompose the steps of uploading electronic files,and the form of uploading is defined uniformly in the interactive process.Logistic mapping is used to represent chaotic mode.Given the interval of chaotic sequence,the file encryption key stream is randomly generated.On the premise of ensuring the complete decryption of electronic files,the replacement process is constructed by setting ciphertext replacement rules,adjusting ciphertext order according to reversible relationship,realizing the encryption and uploading of electronic files,and completing the method design.The experiment simulates the whole process of uploading electronic files based on the configuration of optical fiber network.The chaotic sequence method can generate 128 bit encryption key within 10 s and complete 498 groups of electronic files with memory size of 1.5 GB within a specified time.

Key words: ciphertext replacement, electronic records, chaotic sequence, logistic mapping

公众号 电子书橱 超星期刊 手机浏览 在线QQ