As the concept of blockchain continues to the hype, an increasing number of industries join the ranks of using blockchain, which also leads to privacy leaks becoming a potential hidden danger. Therefore, more secure a...
详细信息
In the current era, the majority of communication in IoT-enabled devices, such as smartphones, is now done through images. To shield the images from invaders, a reliable encryption algorithm is needed. Several encrypt...
详细信息
In the current era, the majority of communication in IoT-enabled devices, such as smartphones, is now done through images. To shield the images from invaders, a reliable encryption algorithm is needed. Several encryption schemes have been developed, some based on private-key and others on public key cryptography. Using a combination of Chebyshev map and crossover function, this work presents a new lightweight encryption method for digital images based on session keys. A completely new session key is investigated in this work. Session keys are created using a hybrid of crossover and Chebyshev map. To maximize diffusion and confusion, the crossover operation is often used during the encryption phase. This presented scheme employs a 64-bit plain text and uses an 80-bit key, with 64 bits drawn from a given symmetric hexadecimal key and the remaining 16 bits added at random. The proposed algorithm's security is improved by using a hybrid of Chebyshev map and crossover to increase the randomness of the produced session key. The presented scheme is also lightweight due to its small key size and small code size. The suggested method is evaluated on the MATLAB 2015 platform with various parameters and measured to similar types of existing methods.
In the paper, a novel color image encryption scheme is proposed by use of the three-dimensional chaotic maps and some data reconstruction techniques. In the diffusion process of the encryption algorithm, the three-dim...
详细信息
In the paper, a novel color image encryption scheme is proposed by use of the three-dimensional chaotic maps and some data reconstruction techniques. In the diffusion process of the encryption algorithm, the three-dimensional chaotic Logistic map is introduced to changes the pixel value of the plain image. Meanwhile, in the confusion process, the three-dimensional chaotic Cat map is applied to deal with the position of the image pixels. Moreover, some data reconstruction techniques are employed for the better encryption result. Furthermore, the corresponding decryption algorithm is also given. The significant advantages of our method are the effectiveness and simplicity, and our proposed method breaks the correlation between image pixel layers, offers a large key space and against differential and statistical attacks effectively. Finally, the superiority of the proposed algorithm will be shown by the experimental results, security analysis, and the corresponding comparisons with literature.
Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encrypt...
详细信息
Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. encryption schemes depending on the substitution box (S-box) only are weak and easily breakable with the help of chosen plaintext and ciphertext attacks. In this work, we have completely cryptanalyzed S-box based encryption scheme successfully by two types of attacks. Cryptanalysis in both types of attacks is performed by only one selected image. Moreover, we have suggested some improvements in the algorithm to defeat attacks.
Wireless sensor networks (WSNs) are typically deployed environments, often very hostile and without assistance. A certain level of security must be provided. However, the resource constraint is the most important char...
详细信息
Wireless sensor networks (WSNs) are typically deployed environments, often very hostile and without assistance. A certain level of security must be provided. However, the resource constraint is the most important characteristic of this network. Indeed, WSNs are limited in terms of calculation, CPU, battery, etc. Therefore, a solution that aims to conserve these resources is widely desired. In this paper, we focus on the problem of encryption algorithm complexity. Some of the existing encryption algorithms provide high calculation cost, require large memory and are not applicable for WSNs scenarios. Based on Feistel structure, we propose a novel ultra-lightweight encryption algorithm, named ULEA. Besides diffusion and confusion of data, ULEA assumes minor encryption rounds with simplified transformations and functions to complex the cipher. The security analysis and experimental results suggest that the ULEA algorithm is an appropriate, low storage space, energy-efficient encryption process with high security for WSNs.
Nowadays, most of the communications in IoT enabled devices are done in the form of images. To protect the images from intruders, there is a need for a secure encryption algorithm. Many encryption algorithms have been...
详细信息
Nowadays, most of the communications in IoT enabled devices are done in the form of images. To protect the images from intruders, there is a need for a secure encryption algorithm. Many encryption algorithms have been proposed, some of the algorithms are based on symmetric-key cryptography and others are based on asymmetric key cryptography. This work proposed a fast, secure, and lightweight symmetric image cryptographic algorithm based on the session key. In this work, for every image encryption, a new session key is generated. Here session keys are generated with the help of crossover and mutation operators of genetic algorithm. This proposed algorithm uses a 64-bit plain text and requires an 80-bit key, where 64-bits of a key is generated via symmetric hexadecimal key and the remaining 16-bits of a key are randomly added, to encrypt the image. Here crossover and mutation operators are used to generate random 64-bits of a key. The proposed algorithm will work for both color and grayscale images. The proposed algorithm is simulated on MATLAB 2017 platform and compared with similar types of the existing algorithm on various parameters.
This article proposed an improved 2D-logistic-adjusted-Sine map, which has better ergodicity, pseudo-randomness, unpredictability and wider chaotic range than many existing 2D-chaotic maps. Utilizing improved 2D-logis...
详细信息
This article proposed an improved 2D-logistic-adjusted-Sine map, which has better ergodicity, pseudo-randomness, unpredictability and wider chaotic range than many existing 2D-chaotic maps. Utilizing improved 2D-logistic-adjusted-Sine map generates chaotic sequences, where the initial values of the system are assigned based on SHA 512 hash function. Compared with traditional encryption scheme, the size of cipher image is different to plain image, because multiply can be applied between mismatched dimensional matrices through semi-tensor product, and therefore, attackers cannot obtain the size of plain image from encryption image. In order to lighten transmission and storage burden, we reduce the results of semi-tensor product by data process. Keys security, correlation coefficient, information entropy and ability of defending differential attack are analyzed to confirm the security of our encryption scheme. Experimental results confirm that the proposed algorithm can encrypt image effectively and securely.
As a new mobile communication technology in the era of the internet of things, 5G is characterized by high speed, low delay, and large connection. It is a network infrastructure to realize human-computer and internet ...
详细信息
As a new mobile communication technology in the era of the internet of things, 5G is characterized by high speed, low delay, and large connection. It is a network infrastructure to realize human-computer and internet of things in the era of the internet of things. Power quality data is the efficiency with which a power grid delivers electricity to users and expresses how well a piece of machinery uses the electricity it receives. The waveform at the nominal voltage and frequency is the goal of power quality research and improvement. The power internet of things (IoT) is an intelligent service platform that fully uses cutting-edge tech to enable user-machine interaction, data-driven decision-making, real-time analytics, and adaptive software design. The process by which plaintext is converted into cipher text is called an encryption algorithm. The cipher text may seem completely random, but it can be decrypted using the exact mechanism that created the encryption key.
This paper studies the data encryption model and encryption method of the connection-oriented computer network communication system. Firstly, the application and security analysis of digital certificate and big intege...
详细信息
This paper studies the data encryption model and encryption method of the connection-oriented computer network communication system. Firstly, the application and security analysis of digital certificate and big integer decomposition encryption algorithm in connection-oriented are studied. Secondly, in the design of encryption communication module, a new hybrid encryption mechanism is proposed, that is, a strong and fast encoding algorithm is used to encrypt the plain text, Rivest-Shamir-Adleman (RSA) algorithm is used to encrypt the key, and Secure Hash algorithm (SHA) algorithm is used to generate the digital abstract. Finally, an improved cryptographic model of elliptic curve cryptosystem is constructed, and an effective exclusive form of node private key is obtained. The experimental results show that the improved algorithm can simplify the deployment and improve the efficiency of the cryptographic system in large-scale public key certificate system.
This article proposes a reversible information hiding algorithm based on chaos and histogram translation in ciphertext images to address the shortcomings of traditional algorithms such as separation of encryption and ...
详细信息
This article proposes a reversible information hiding algorithm based on chaos and histogram translation in ciphertext images to address the shortcomings of traditional algorithms such as separation of encryption and information hiding processes, small embedding capacity, and inflexible operation. This article first uses grayscale images as a carrier for digital images, analyzes and studies existing reversible information hiding algorithms in the ciphertext domain of grayscale images, and improves them to solve the problems of existing reversible in-formation hiding algorithms in the ciphertext domain. Secondly, the sender first encrypts the image and then embeds the information;The receiving end can either decrypt and extract information first, or extract and decrypt information first. Finally, we selected a Lena grayscale image with 513 pixels x 513 pixels for the experiment, dividing the image into 4 blocks (r = 4), and scrambling the pixel positions using DLKL transform for each block, with parameters k = 4, n = 7, q = 59. The simulation results show that the algorithm is easy to implement and can effectively improve the capacity of information embedding.
暂无评论