A mathematical procedure known as an encryption algorithm is used to convert plaintext into ciphertext and protect sensitive data during transmission or storage. Its primary goals include preventing unauthorized acces...
详细信息
A mathematical procedure known as an encryption algorithm is used to convert plaintext into ciphertext and protect sensitive data during transmission or storage. Its primary goals include preventing unauthorized access to data, maintaining privacy and security, and enabling safe communication over untrusted networks. Sensitive data is greatly secured by encryption techniques in a variety of industries, including communications, finance, and healthcare. There are some mathematical frameworks or techniques that are necessary to select the best encryption algorithm. The main tool for handling the process of choosing the best encryption algorithm is the theory we provide in this manuscript. Any observation about any object can have two aspects, one is positive and the other is negative. Thus, such kind of aspects of any object may be resolved by the proposed theory. Furthermore, we address the best encryption technique in this work by introducing a few aggregation operators in the context of HBCFSs. We introduce here, hesitant bipolar complex fuzzy Frank (HBCFF) weighted averaging, HBCFF ordered weighted averaging, HBCFF hybrid averaging, HBCFF weighted geometric, HBCFF ordered weighted geometric, and HBCFF hybrid geometric operators. Moreover, we discuss the multi-attribute decision-making (MADM) approaches for solving supposed encryption algorithm problems within the context of HBCFSs. The success of our work is discussed by a comparison of our newly proposed work with a few existing and related ideas. Moreover, at last, we conclude our work. Furthermore, we address the use of MADM techniques in the context of HBCFSs to solve supposed encryption algorithm problems. We compare our freshly proposed work with some existing concepts to discuss the success of our effort. Finally, we discuss the conclusion of the whole manuscript.
In the era of today's open network communication, security issues of private data over these networks are at their peak, and it is challenging to secure data transmission. Therefore, to overcome these security cri...
详细信息
In the era of today's open network communication, security issues of private data over these networks are at their peak, and it is challenging to secure data transmission. Therefore, to overcome these security crises, cryptographers need to develop efficient and robust encryption algorithms. This article proposes a new multilayer image ciphering scheme along with a modified authentication technique for grayscale and color images by using the RSA public key cryptosystem and two chaotic maps. The chaotic key sequences generated through a 2D piecewise smooth non-linear chaotic map (2D-PSNCM) are utilized to perform permutation of rows and columns to enhance the level of confusion. Also, bitwise XOR is applied to fulfill an intricate level of diffusion. To decrease the correlation and to strengthen the security level, the scrambling of pixels is created by using a suitable number of iterations of the Baker map. For authenticity purposes, the modified digital signature is proposed by using the RSA public key cryptosystem for partially encrypted images. The proposed digital signature is employed for further encryption purposes as well. The scheme provides multilayer security and is well-protected against different brute-force attacks. The secret keys and their arrangement in each layer of encryption are imperative for the correct decryption. The proposed algorithm's robustness and efficiency are verified using multiple RGB and grayscale images. Security analysis demonstrates the validation by comparing it with some recent cryptographic image encryption algorithms. These results show the proposed algorithm's robustness, such as vast sizeable keyspace, very low correlation coefficient, high sensitivity for keys, and good information entropy. Altogether, this proves the high efficiency of the proposed algorithm in resisting statistical attacks.
Chaos defined in general in quantitative characteristics is not a strict definition In this paper two new chaos functions are proposed and theoretical proof about chaos is finished based on a strict Devaney definition...
详细信息
ISBN:
(纸本)9781424413119
Chaos defined in general in quantitative characteristics is not a strict definition In this paper two new chaos functions are proposed and theoretical proof about chaos is finished based on a strict Devaney definition. Using composite chaotic system character, a composite chaos sequences cipher algorithm is designed, which map have uniform distribution function and delta-like self-correlation, and can produce balance nature series to 0-1 after quantified. The unchanged probability of composite chaos makes ciphertext has a good random. As the sensitivity to initial condition and random nature to iterative function choice, key and plaintext and ciphertext form complex and sensitive nonlinear relations, and the correlation is very small. The leaking of ciphertext to key and plaintext information can effectively be prevented. The experimental result show that the system has a very high safety and the key space is expanded.
In this paper, an efficient self-adaptive model for chaotic image encryption algorithm is proposed. With the help of the classical structure of permutation-diffusion and double simple two-dimensional chaotic systems, ...
详细信息
In this paper, an efficient self-adaptive model for chaotic image encryption algorithm is proposed. With the help of the classical structure of permutation-diffusion and double simple two-dimensional chaotic systems, an efficient and fast encryption algorithm is designed. However, different from most of the existing methods which are found insecure upon chosen-plaintext or known-plaintext attack in the process of permutation or diffusion, the keystream generated in both operations of our method is dependent on the plain-image. Therefore, different plain-images will have different keystreams in both processes even just only a bit is changed in the plain-image. This design can solve the problem of fixed chaotic sequence produced by the same initial conditions but for different images. Moreover, the operation speed is high because complex mathematical methods, such as Runge-Kutta method, of solving the high-dimensional partial differential equations are avoided. Numerical experiments show that the proposed self-adaptive method can well resist against chosen-plaintext and known-plaintext attacks, and has high security and efficiency. (C) 2014 Elsevier B.V. All rights reserved.
With the development of LiDAR technology, 3D point cloud data have a rich information-carrying capacity and environmental perception capabilities, have been widely applied infields such as the Internet of Vehicles(IoV...
详细信息
With the development of LiDAR technology, 3D point cloud data have a rich information-carrying capacity and environmental perception capabilities, have been widely applied infields such as the Internet of Vehicles(IoV) and smart homes. However, the privacy and sensitive content contained within them faces significant security risks. To address these challenges, we propose a selective encryption scheme for 3D point cloud based on hybrid key with spatial maintenance. Firstly, a new SH-CCM map is introduced, which exhibits excellent sensitivity to initial conditions, randomness, and unpredictability. Secondly, a hybrid key generation scheme is designed, where the hybrid key is composed of an agreement session key and a user's private key. Then, a spatial maintenance encryption method is designed using the proposed chaotic map to maintain the spatial stability of the selected regions during encryption, preventing data confusion and loss that could arise from overlap with adjacent point clouds in the encrypted domain. Finally, the security and robustness of this method are verified through simulation experiments and numerical analysis, demonstrating high encryption efficiency and effective resistance against known plaintext/chosen plaintext attacks, differential attacks, brute force attacks, and other statistical analysis attacks.
In this study, a multiple digital image encryption algorithm based on chaos algorithm is presented. The cyclic matrix is constructed by logical mapping, and sparse transformation of plaintext image is realized by disc...
详细信息
In this study, a multiple digital image encryption algorithm based on chaos algorithm is presented. The cyclic matrix is constructed by logical mapping, and sparse transformation of plaintext image is realized by discrete cosine transform (DCT). The gray image of DCT is measured, and several digital images are merged. Lorenz chaotic system and logistic map are adopted to generate chaotic key sequence related to plaintext image features, replace pixel value, scramble pixel position, diffuse image, and finally obtain ciphertext image. It encrypts many kinds of digital images. The proposed encryption algorithm has excellent image encryption effect and high security.
Telemedicine provides remote online services for digital diagnosis and treatment via the Internet. However, there is a risk of data leakage during transmission. Therefore, data protection is an important challenge for...
详细信息
Telemedicine provides remote online services for digital diagnosis and treatment via the Internet. However, there is a risk of data leakage during transmission. Therefore, data protection is an important challenge for telemedicine. Chaos is widely used in image, audio, and EEG encryption because of its unique characteristics of unpredictability, nonlinearity, and sensitivity to an initial state. However, some chaotic maps have various security issues. To solve these problems, this paper proposes a K-sine-transform-based coupled chaotic system (K-STBCCS), combining any two one-dimensional chaotic mappings to generate a new chaos mapping. To demonstrate the reliability of the system, this paper generates three new chaotic mappings using K-STBCCS and analyzes their performance. Using the chaotic mapping generated by K-STBCCS, this paper further proposes an EEG signal encryption scheme based on the confusion-diffusion principle. The purpose of confusion is to separate adjacent EEG signals, while the purpose of diffusion is to change the value of EEG signals. Among them, the diffusion operation uses positive and negative diffusion to reduce the correlation between the ciphertext and the original signals. The experimental results and security analysis show that the proposed EEG signal encryption scheme performs well and passes the rigorous cryptographic security test.(c) 2022 Elsevier Inc. All rights reserved.
In the current era, the majority of communication in IoT-enabled devices, such as smartphones, is now done through images. To shield the images from invaders, a reliable encryption algorithm is needed. Several encrypt...
详细信息
In the current era, the majority of communication in IoT-enabled devices, such as smartphones, is now done through images. To shield the images from invaders, a reliable encryption algorithm is needed. Several encryption schemes have been developed, some based on private-key and others on public key cryptography. Using a combination of Chebyshev map and crossover function, this work presents a new lightweight encryption method for digital images based on session keys. A completely new session key is investigated in this work. Session keys are created using a hybrid of crossover and Chebyshev map. To maximize diffusion and confusion, the crossover operation is often used during the encryption phase. This presented scheme employs a 64-bit plain text and uses an 80-bit key, with 64 bits drawn from a given symmetric hexadecimal key and the remaining 16 bits added at random. The proposed algorithm's security is improved by using a hybrid of Chebyshev map and crossover to increase the randomness of the produced session key. The presented scheme is also lightweight due to its small key size and small code size. The suggested method is evaluated on the MATLAB 2015 platform with various parameters and measured to similar types of existing methods.
Wireless sensor networks (WSNs) are typically deployed environments, often very hostile and without assistance. A certain level of security must be provided. However, the resource constraint is the most important char...
详细信息
Wireless sensor networks (WSNs) are typically deployed environments, often very hostile and without assistance. A certain level of security must be provided. However, the resource constraint is the most important characteristic of this network. Indeed, WSNs are limited in terms of calculation, CPU, battery, etc. Therefore, a solution that aims to conserve these resources is widely desired. In this paper, we focus on the problem of encryption algorithm complexity. Some of the existing encryption algorithms provide high calculation cost, require large memory and are not applicable for WSNs scenarios. Based on Feistel structure, we propose a novel ultra-lightweight encryption algorithm, named ULEA. Besides diffusion and confusion of data, ULEA assumes minor encryption rounds with simplified transformations and functions to complex the cipher. The security analysis and experimental results suggest that the ULEA algorithm is an appropriate, low storage space, energy-efficient encryption process with high security for WSNs.
Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encrypt...
详细信息
Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. encryption schemes depending on the substitution box (S-box) only are weak and easily breakable with the help of chosen plaintext and ciphertext attacks. In this work, we have completely cryptanalyzed S-box based encryption scheme successfully by two types of attacks. Cryptanalysis in both types of attacks is performed by only one selected image. Moreover, we have suggested some improvements in the algorithm to defeat attacks.
暂无评论