﻿ 舰船通信网络隐私信息安全加密方法研究
 舰船科学技术  2024, Vol. 46 Issue (10): 166-169    DOI: 10.3404/j.issn.1672-7649.2024.10.029 PDF

Research on privacy information security encryption methods for ship communication networks
JIN Min-jie, ZHAO Yu-hao
Marine Design and Research Institute of China, Shanghai 200011, China
Abstract: To improve the security of privacy information in ship communication networks, a secure encryption method based on chaotic mapping and RC5 algorithm is proposed. Firstly, based on Logistic chaotic mapping, the chaotic encryption process of network privacy information is iteratively obtained by perturbing variables in the main and auxiliary chaotic processes, and the chaotic sequence of network privacy information is used as the encryption key for privacy information; Then, through the round function and shift operation of the RC5 algorithm, the previously generated key and data are XOR bit by bit to achieve encryption processing of privacy information data in the ship communication network; Finally, the encrypted data is scrambled through chaotic mapping to resist plaintext attacks and improve encryption security. The experiment shows that this method encrypts private information more efficiently and has better encryption effects, which can effectively improve the security of ship communication networks.
Key words: chaotic mapping     RC5 algorithm     ship communication network     privacy information security
0 引　言

1 舰船通信网络隐私信息安全加密处理 1.1 基于混沌映射的隐私信息加密方法

 ${T_{a + 1}} = {c_a}{T_a} - {c_a}{T_a}^2 。$ (1)

 $\left\{ \begin{gathered} {c_a} = \sum\limits_{b = 1}^n {{{10}^{2 - b}}{g_b} - \frac{{\sum\limits_{b = 1}^n {{{10}^{2 - b}}{g_b} - {c_2}} }}{{{c_2} - {c_1}}}\left( {{c_2} - {c_1}} \right)}，\\ {\delta _a} = \chi {u_a} + \left( {1 - \chi } \right){v_a}。\\ \end{gathered} \right.$ (3)

 $\alpha = odd\left( {{2^h}{e^{ - 2}}} \right) ，$ (5)
 $\beta = odd\left( {{2^h}{\gamma ^{ - 2}}} \right)。$ (6)

2）解密处理

 $\left\{ \begin{gathered} \zeta = \left( {\left( {\zeta - Y[2r + 1]} \right) > > > \xi } \right) \oplus \xi ，\\ \xi = \left( {\left( {\xi - Y[2r]} \right) > > > \zeta } \right) \oplus \zeta 。\\ \end{gathered} \right.$ (9)

1.3 基于混沌映射和RC5算法的抗明文攻击加密

 图 1 移位加密的过程 Fig. 1 The process of shift encryption

 图 2 混沌映射和RC5算法的网络隐私信息安全加密过程 Fig. 2 The process of network privacy information security encryption using chaotic mapping and RC5 algorithm

2 实验分析

 图 3 信息加密前后的字符序列ASCII码值分布 Fig. 3 Distribution of ASCII code values of character sequences before and after information encryption

3 结　语

 [1] 张磊, 李研, 阳生云, 等. 计算机网络信息安全领域中数据加密技术的运用阐述[J]. 软件, 2022, 43(11): 65-67. [2] 刘银. 基于双混沌算法的网络信息安全加密系统设计[J]. 信息记录材料, 2022, 23(4): 118-120. [3] 薛来军. 基于改进的ECC的网络信息安全加密方法[J]. 太原师范学院学报(自然科学版), 2022, 21(2): 48-50+89. [4] 蔡梦睿. 基于数据挖掘的网络隐私信息安全加密系统[J]. 信息技术, 2022, 46(9): 94-99. [5] KHAN A A , SHAIKH A A , CHEIKHROUHOU O , et al. IMG-forensics: Multimedia-enabled information hiding investigation using convolutional neural network[J]. IET Image Processing, 2022, 16(11), 2854−2862. [6] XIAO Y , TONG X , ZHANG M , et al. Image lossless encoding and encryption method of EBCOTTier1 based on 4D hyperchaos[J]. Multimedia Systems, 2022, 28(3): 727−748. [7] 俞兴木, 郑旭飞. 基于矩阵张量积的轻量网络数据传输加密方法[J]. 计算机仿真, 2022, 39(12): 449-453. [8] 刘育平, 杨尔欣, 高攀, 等. 基于大数据技术的智慧后勤信息动态加密方法[J]. 信息安全研究, 2022, 8(11): 1104-1110.