location:Home > 2024 Vol.7 Apr.N02 > Automatic encryption method for office data based on chaotic sequences

2024 Vol.7 Apr.N02

  • Title: Automatic encryption method for office data based on chaotic sequences
  • Name: Xiaoqian Zhang
  • Company: Computer Simulation Magazine, Beijing 100048, China
  • Abstract:

    The current conventional office data encryption method mainly encodes the original data and encrypts the encoding correspondence to guarantee the security of the data, which leads to poor encryption effect due to the neglect of the expansion of the key as well as the replacement processing. In this regard, the automatic encryption method of office data based on chaotic sequence is proposed. Firstly, the required chaotic sequence is generated by selecting the chaotic mapping and preprocessed, and the simulated key is shifted and self-weighted to select part of the key bits that meet the arithmetic requirements for the expansion and substitution process. Then the key stream generated by Logistic mapping is used to generate a configurable 64bit original key after data processing. Finally, one layer encryption as well as two layer encryption is performed on the office data respectively. In the experiments, the encryption effect of the proposed method is verified. The analysis of the experimental results shows that when the proposed method is used to encrypt the office data, the ciphertexts are more different and have a more ideal encryption effect.


  • Keyword: chaotic sequences; office data; encryption algorithms; key generation;
  • DOI: 10.12250/jpciams2024090310
  • Citation form: Xiaoqian Zhang.Automatic encryption method for office data based on chaotic sequences [J]. Computer Informatization and Mechanical System,2024,Vol.7,pp.42-45
Reference:

[1] Shu L .Design of Sensitive Information Encryption and Decryption System Based on Branch Obfuscation Algorithm[J].2022 11th International Conference of Information and Communication Technology (ICTech)), 2022:330-334.

[2] Cho H H , Tsai M Y , Tseng F H ,et al. Improving Randomness of Symmetric Encryption for Consumer Privacy Using Metaheuristic-Based Framework[J].IEEE consumer electronics magazine, 2022(11-1).

[3] Lapworth L .Parallel encryption of input and output data for HPC applications:[J]. Applications, 2022, 36(2):231-250.

[4] Pawar A , Ghumbre S , Jogdand R .Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic- Based Data Protocols[J].Int. J. Inf. Secur. Priv. 2022, 16:1-24.

[5] Guo Q , Tian Y L , Wan L .Blockchain Data Controlled Sharing Scheme Based on Proxy Re-Encryption[J].Acta Electronica Sinica, 2023, 51(2):477-488.

[6] Gupta R , Dharadhar S , Churi P .CloudJS: novel cloud-based design framework for text-file encryption[J]. 472-485.

[7] Teng Y , Yang S , Liu L ,et al. Nanoscale storage encryption: data storage in synthetic DNA using a cryptosystem with a neural network[J]. Life sciences, 2022, 65(8):1673-1676.

[8] Ebinazer S E , Savarimuthu N , Bhanu S M S .A hybrid encryption for secure data deduplication the cloud[J].Int. J. Cloud Comput. 2023, 12:295-307.

[9] Chang R I , Chang Y T , Wang C H .Outsourced K-means Clustering for High-Dimensional Data Analysis based on Homomorphic Encryption[J].J. Inf. Sci. Eng. 2023, 39:525-548.

[10] Shi J , Zhao X .Anti-leakage method of network sensitive information data based on homomorphic encryption[J].Journal of Intelligent Systems, 2023 , 32(1):2517-39.

[11] Yan R , Zheng Y , Yu N ,et al.Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy[J].Big Data Mining and Analytics, 2024, 7(1):131-141.

[12] Almoysheer N , Humayun M , El-Aziz A A B ,et al.Enhancing Cloud Data Security using Multilevel Encryption Techniques Enhancing Cloud Data Security using Multilevel Encryption Techniques[J].Turkish Online Journal of Educational Technology, 2021, 12(3):5140-5154.

[13] Setiadi D , Rachmawanto E H , Zulfiningrum R .Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling[J].J. King Saud Univ. Comput. Inf. Sci. 2022, 34:6818-6828.

[14] Garg P , Jain A .A novel approach to secure biometric data using integer wavelet transform, chaotic sequences and improved logistic system-based watermarking[J].Int. J. Comput. Appl. Technol. 2023, 71:340-351.

[15] Chen X, Gu W. Simulation of Multilayer Chaotic Sequence Encryption Method for Mobile Office Data[J]. Computer Simulation,2023(5)159-162,167.

 


Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16