Generating random values become increasingly desirable due to its advantages. In this paper, a novel pseudo-random number generator is proposed based on a hyperchaotic system and the des algorithm, with the goal of so...
详细信息
Generating random values become increasingly desirable due to its advantages. In this paper, a novel pseudo-random number generator is proposed based on a hyperchaotic system and the des algorithm, with the goal of solving the limitations of many existing generators, such as predictability and inefficiency. The main contribution is the use of the des algorithm, which is no longer used as an encryption algorithm, as a random generator, allowing the existing algorithm to be exploited in many applications. The hyperchaotic system has good statistical properties and random bifurcation, which means that the hackers cannot predict these sequences. The random values are used to produce both the initial key and input for the des algorithm and the results of the des algorithm are considered as a pseudo-random sequence. This ensures that both the key and the input of the des algorithm are random, which increases the security of the des algorithm. In addition, both the des encryption and decryption algorithms are used in the generator, relying on the hyperchaotic system to choose in each iteration, which means that the hackers cannot determine which algorithm is used to produce the pseudo-random sequence. Experimental and analysis results show that the proposed generator has good random characteristics and passes several statistical tests, such as the NIST tests. Moreover, the proposed generator is tested in cryptography, using stream cipher to encrypt images. The results show that the encrypted images can resist several attacks such as histograms, differential attacks, correlation analysis, and entropy.
The more and more developed network has caused more and more impact on people's life and work, providing convenient channels for people's information exchange, and then improving people's living and workin...
详细信息
The more and more developed network has caused more and more impact on people's life and work, providing convenient channels for people's information exchange, and then improving people's living and working conditions. However, when data is transmitted through the network, there are hidden security risks, especially important accounting data. Once intercepted and used by criminals, it may cause serious harm to the owner of the data. Based on the above background, the purpose of this article is to study the use of the des algorithm to encrypt accounting data in a computing environment. This paper proposes an improved quantum genetic algorithm and applies it to the S-box design of the des algorithm, which improves the non-linearity of the S-box, reduces the differential uniformity, and enhances the security of the des algorithm. This improved des algorithm reduces the number of iterations by increasing the key length and iterative processing using a two-round function, which further increases the security of the algorithm and improves the operation speed of the encryption process. It is found that the 64 ciphertexts of the des algorithm and the number of changed bits compared to the original ciphertext fluctuates around 32 bits, which explains the problems that should be paid attention to when using the des algorithm to encrypt accounting data. The validity of key characters should be guaranteed to prevent key loss or leakage. Shorter data encryption regular solution.
To ensure the safe operation of power system, this paper studies two technologies of data encryption and digital signature, and designs a real-time data encryption system based on des algorithm, which improves the sec...
详细信息
ISBN:
(纸本)9781665438926
To ensure the safe operation of power system, this paper studies two technologies of data encryption and digital signature, and designs a real-time data encryption system based on des algorithm, which improves the security of data network communication. The real-time data encryption system of power system is optimized by the hybrid encryption system based on des algorithm. The real-time data encryption of power system adopts triple des algorithm, and double des encryption algorithm of RSA algorithm to ensure the security of triple des encryption key, which solves the problem of real-time data encryption management of power system. Java security packages are used to implement digital signatures that guarantee data integrity and non-repudiation. Experimental results show that the data encryption system is safe and effective.
In view of Chua's circuit's characters and the deficient in des algorithm, the paper presents a new image encryption scheme. based on des algorithm and chaotic encryption. The chaotic sequence is implemented i...
详细信息
ISBN:
(纸本)9781424434824
In view of Chua's circuit's characters and the deficient in des algorithm, the paper presents a new image encryption scheme. based on des algorithm and chaotic encryption. The chaotic sequence is implemented in the des algorithm to improve the initial keys and the iterating operations, so that the chaotic encryption is combined with des. algorithm. Theory analysis and simulation results show that the presented scheme can expand the initial key space, improve the security and anti-attack ability of the algorithm effectively. It is more propitious to image information transmission as this scheme insures the security and confidentiality of image information.
The confidentiality of accounting data is crucial for the security and trade secrets of enterprises. The aim of this study is to explore an accounting data encryption processing system that improves the des algorithm,...
详细信息
This paper aims to analyze and study the length of the key, the weak key, the design of the S_box, the iterations, and their safety on the basis of the des algorithm. Several transfigurations of des are also put forwa...
详细信息
For the smart card chip in the power leakage problem in the process of des encryption, we put forward accumulative attack algorithm and segmented attack algorithm on des encryption with back and forth random round whi...
详细信息
For the smart card chip in the power leakage problem in the process of des encryption, we put forward accumulative attack algorithm and segmented attack algorithm on des encryption with back and forth random round which based on the analysis of DPA attack on general smart card and the features of random round, and get all keys rightly and successfully, to prove back and forth random round can’t protect security of smart card. At last, by comparing the two algorithms, we give the scope of them.
Security remains a major "pain" for both individuals and large organizations in today’s modern *** needs security,whether it is communication through telephonic media,or transfer of data *** security or pri...
详细信息
Security remains a major "pain" for both individuals and large organizations in today’s modern *** needs security,whether it is communication through telephonic media,or transfer of data *** security or privacy can only be ensured by applying algorithms to the data defined under ***,a mechanism which changes the plaintext to a secured form defined as scrambled text(cipher).The scrambled text,then is received and decryption is done to analyze the *** involves various types such as: symmetric or asymmetric *** paper brings in an improved and optimized version of 3 des *** also lists various advantages of the new algorithm over des and Triple-des algorithm.A brief in between des,Triple-des and the newly designed algorithm(Optimized des algorithm) is provided taking amount of complexity,user effort required,key size and number of rounds to perform successful conversion operations as base for comparison.
This paper aims to analyze and study the length of the key,the weak key,the design of the Sox,the iterations,and their safety on the basis of the des *** transfigurations of des are also put forward to strengthen its ...
详细信息
This paper aims to analyze and study the length of the key,the weak key,the design of the Sox,the iterations,and their safety on the basis of the des *** transfigurations of des are also put forward to strengthen its safety for solving the existing loopholes in des.
The software realization of des symmetric encryption algorithm using CryptoAPI on .NET platform has been analyzed. The processing performance of the software implementation has been tested and it was shown, that the e...
详细信息
ISBN:
(纸本)9789665335870
The software realization of des symmetric encryption algorithm using CryptoAPI on .NET platform has been analyzed. The processing performance of the software implementation has been tested and it was shown, that the encryption rate is 11.1 Mb/sec on the Intel Celeron D 351 3.2GHz processor, while the development environment is a flexible architecture independent tool and meets all the requirements to the secure implementation of cryptographic software.
暂无评论