{"title":"A Hierarchical Data Encryption Algorithm Based on Iteration","authors":"Wanbo Yu, Fei Duan","doi":"10.1109/CISCE58541.2023.10142263","DOIUrl":null,"url":null,"abstract":"In recent years, the application of chaos in the field of encryption is increasing. The chaotic characteristics of chaotic sequences make the encryption effect greatly improved compared with other encryption methods, mainly in encryption time, space and security. This paper mainly applies chaotic system to encrypt data stream hierarchically and continuously. Layers can be modified according to different scenarios, keys are one-dimensional arrays. At the beginning, use the function to generate the KEY1. Generate KEY2 using random function. KEY1. and KEY2 iterate to generate a new key END1 to encrypt the first layer of data. Using the encrypted first layer data as the KEY3. KEY3 and KEY2 iterate to generate a new key END2 to encrypt the next layer of data. Repeat the above operations to achieve hierarchical continuous encryption of data, the key also changes with the content. The encryption time, key space, anti-attack performance and various encryption indexes of the algorithm are analyzed by experiments. It is proved that the algorithm is an encryption method suitable for various situations, with small storage space, energy saving and high security.","PeriodicalId":145263,"journal":{"name":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"29 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISCE58541.2023.10142263","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In recent years, the application of chaos in the field of encryption is increasing. The chaotic characteristics of chaotic sequences make the encryption effect greatly improved compared with other encryption methods, mainly in encryption time, space and security. This paper mainly applies chaotic system to encrypt data stream hierarchically and continuously. Layers can be modified according to different scenarios, keys are one-dimensional arrays. At the beginning, use the function to generate the KEY1. Generate KEY2 using random function. KEY1. and KEY2 iterate to generate a new key END1 to encrypt the first layer of data. Using the encrypted first layer data as the KEY3. KEY3 and KEY2 iterate to generate a new key END2 to encrypt the next layer of data. Repeat the above operations to achieve hierarchical continuous encryption of data, the key also changes with the content. The encryption time, key space, anti-attack performance and various encryption indexes of the algorithm are analyzed by experiments. It is proved that the algorithm is an encryption method suitable for various situations, with small storage space, energy saving and high security.