This article proposes an improved tent-dynamic cross coupled map lattice, which has superior ergodicity, broader chaotic range and higher information entropies than cross coupled map lattice and tent-dynamic cross cou...
详细信息
This article proposes an improved tent-dynamic cross coupled map lattice, which has superior ergodicity, broader chaotic range and higher information entropies than cross coupled map lattice and tent-dynamic cross coupled map lattice, and has high suitability for chaos-based image encryption algorithm. Traditional encryption scheme has two significant stages, including image confusion and diffusion. Our encryption algorithm utilizes DNA coding and sequences to construct short DNA strand and long DNA strand, where short DNA strand is used for DNA strand exchange, and long DNA strand is used for DNA strand diffusion. Compared to general image confusion, DNA strand exchange permutates parts of two diverse DNA strands, where the length of exchange is uncertain. Compared to image diffusion, DNA strand diffusion is divided into two categories according to Watson-Crick base pairing property, and different category applies diverse DNA computation operation. Through security analysis and statistical analysis, our encryption scheme can resist different attacks. Experimental results confirm that the proposed algorithm has a high degree of security and the excellent efficiency. (C) 2022 Elsevier Inc. All rights reserved.
In this work, a new discrete chaotic map is developed from the 1D ICMIC (Iterative Map with Infinite Collapses) to control the 2D Henon map. The performances of the proposed discrete map are evaluated by using the pha...
详细信息
In this work, a new discrete chaotic map is developed from the 1D ICMIC (Iterative Map with Infinite Collapses) to control the 2D Henon map. The performances of the proposed discrete map are evaluated by using the phase diagram, Lyapunov exponent spectrum and complexity. It is found that the new chaotic map has larger value of complexity, and chaotic states are distributed in large parameter ranges. Thus the new chaotic map has better chaotic features and randomness, it is especially suitable for the chaotic secure communication. Then an image encryption algorithm is proposed based on the new chaotic map. In this algorithm, the sequences generated by the new chaotic map are used for pixel position scrambling and pixel value diffusion operations. The security features of the designed encryption scheme are evaluated by common attacks methods. The results confirmed that the proposed algorithm is effective to improve the security in image encryption.
The smart ocean is an influencer concept incorporating digitalized associated ocean and seaboard cities. The construction of an omni-bearing smart ocean requires urban resilience, and the application of smart means ca...
详细信息
The smart ocean is an influencer concept incorporating digitalized associated ocean and seaboard cities. The construction of an omni-bearing smart ocean requires urban resilience, and the application of smart means can greatly improve a city's emergency response capability in the face of dangerous events. Aviation security is a non-negligible point in the construction of the smart ocean. The automatic dependent surveillance-broadcast (ADS-B) in the aircrafts is used to broadcast and transmit navigating data, including the call sign of aircraft, altitude in the airspace, current heading of destination, and other locating messages. This paper studies ADS-B security threats such as distributed denial of service attacks and proposes the use of an encryption algorithm to process ADS-B plaintext to improve urban resilience of the smart ocean.
One of the major security threats in domain name system (DNS) is Cache Poisoning (CP) attack, where an attacker can change the IP address in the response packet or the database in DNS. To address CP attacks, many secu...
详细信息
ISBN:
(纸本)9781728136738
One of the major security threats in domain name system (DNS) is Cache Poisoning (CP) attack, where an attacker can change the IP address in the response packet or the database in DNS. To address CP attacks, many security protocols have been proposed. This paper proposes character-wise encryption (CWE) method to provide better security against CP attacks (the probability of successful attack is low as 10(-33)) as compared to the shift-key based method. In addition, the proposed method results in shorter encryption time. For example, with a domain name length of 30, CWE can reduce the encryption time by 10.7% as compared to the shift-key based method.
With the increasing complexity of access and network structure of smart devices, there are many security threats in smart distribution networks. How to ensure the security of smart distribution network communication h...
详细信息
ISBN:
(纸本)9781728114101
With the increasing complexity of access and network structure of smart devices, there are many security threats in smart distribution networks. How to ensure the security of smart distribution network communication has become an important challenge for the safe and stable operation of smart distribution networks in the future. In response to this, this paper proposes an encryption algorithm based on electric emergency communication system. The algorithm uses the random number sequence generated by the two-dimensional mapping to XOR with the plaintext to obtain two ciphertexts. Then, the two ciphertexts are subjected to different scrambling operations, and the two ciphertexts are combined into a matrix according to the parity of the number of loops of the encryption algorithm. The first round of encryption is then completed through column confusion, diagonal interchange, and generation of the next round of keys. Loop through the above steps to get the final encrypted ciphertext. The algorithm is innovative in preventing the attacker from exhausting the key, and the algorithm is simple, the running speed is fast, the encryption is efficient, and the reliability of the data transmission is improved. The algorithm is suitable for application in the electric power emergency communication system to ensure the safe operation of the power communication network, and can effectively improve the security of information transmission and the real-time performance of data transmission in the emergency communication system.
In this era of information technology, information security is a major concern. To address the challenges of data security, cryptography is used for storage as well as for the communication of data. A cryptographic al...
详细信息
ISBN:
(纸本)9781538695098
In this era of information technology, information security is a major concern. To address the challenges of data security, cryptography is used for storage as well as for the communication of data. A cryptographic algorithm has two main performance characteristics: the ability to secure data against different attacks and the processing speed. An algorithm is considered secure if no attack exists to reveal the original contents without knowing the key. The strength of any secure encryption algorithm is, therefore, generally measured based on the difficulty to obtain the encryption key through cyber-attacks such as brute force. It is presumed that the bigger the key size, the more difficult it is for the attacker to compute the key. Consequently, increasing the key size generally increases the computational complexity and processing time of algorithms. As a result, an established assumption is the existence of a tradeoff and computational complexity. In this paper, we are presenting an alternate symmetric key encryption algorithm, which can easily avoid long and complex computation of conventional popular symmetric key encryption algorithms such as the Data encryption Standards and the Advance encryption Standard. We have shown that despite providing a higher level of security, one simplest software implementation of our algorithm is faster than some previously implemented conventional algorithms. Additionally, our algorithm also provides other advantages such as inherent data compression option and flexibility of choosing different complexity levels according to the need for different applications.
This paper proposes a new block encryption algorithm for cryptographic information protection. It describes a new transformation method EM (Exponentiation Module), which is part of the algorithm, and a method of S-box...
详细信息
This paper proposes a new block encryption algorithm for cryptographic information protection. It describes a new transformation method EM (Exponentiation Module), which is part of the algorithm, and a method of S-box obtaining. The paper also considers an optimization technique to advance the efficiency of key selection and calculation. We discuss the possibility to obtain good results by applying the peculiar properties of cryptographic primitives in the Galois field. To increase the strength and speed of the encryption algorithm, we used a nonpositional polynomial notation and an indexed view for the Galois field. The paper provides for statistical properties of the ciphertext obtained with the developed algorithm. We also present the results of differential and linear cryptanalysis of the S-box used.
In this paper, a new and efficient pixel-level image encryption algorithm is presented. In contrast to the traditional permutation-diffusion architecture, the proposed method enhances the connection between position s...
详细信息
In this paper, a new and efficient pixel-level image encryption algorithm is presented. In contrast to the traditional permutation-diffusion architecture, the proposed method enhances the connection between position shuffling for pixels and value changing for grayness. As a result, the separate attack becomes more difficult when attacking our structure of permutation-rewriting-diffusion (PRD). Before the diffusion operation, a rewriting function is applied to the permuted image in a simple way, which can be seen as a remedy for permutation’s inability to change the frequency of pixels. Moreover, the keystream is designed dependent upon the plain-image. Therefore, the proposed method can disturb the chosen plain-image and known plain-image attacks. Experimental results together with security analysis also show good efficiency of the PRD mechanism. Compared to some bit-level-based image encryption algorithms, our method shows increased faster speed and satisfies the performance requirements of real-time communication.
作者:
Guo, YukunHexi Univ
Coll Informat Technol & Commun 846 Beihuan Rd Zhangye Gansu Peoples R China
Because of multimedia information has huge amount of data and high redundancy, traditional encryption technology is not suitable for multimedia information encryption. Multimedia information encryption get great devel...
详细信息
ISBN:
(纸本)9789811079863;9789811079856
Because of multimedia information has huge amount of data and high redundancy, traditional encryption technology is not suitable for multimedia information encryption. Multimedia information encryption get great development when chaos appears. Chaos is very suitable for image encryption because of its many advantages. In this paper, I analysised the shortcomings of color image encryption algorithm based on 3D unified chaotic system, then aiming at the algorithm deficiency, I analysised the algorithm which improved by cat map, the security of the algorithm has been greatly improved.
This article through to the symmetrical secret key and asymmetric contrast and secret key system requirements analysis identified on the basis of AES encryption mode choice,in describing the AES encryption principle i...
详细信息
This article through to the symmetrical secret key and asymmetric contrast and secret key system requirements analysis identified on the basis of AES encryption mode choice,in describing the AES encryption principle introduced before AES encryption used knowledge of number theory,namely the finite field addition and multiplication *** the next round of AES encryption of byte replace operation,line shift operation,columns,confusion and rounds of secret key addition operation phases one by one,mainly around the security of the AES ascension to *** through an 8 X 8 involution hadamard matrix column confusion to replace the original AES operation link used in the cycle of 4 * 4 matrix,so that the spread of the original branch number raised from 5 to 9,achieved better diffusion ability,at the same time also reduce the burden of the inverse confused column *** experiment proves that the enhancement of diffusion ability does not cause excessive time cost for encryption and decryption performance.
暂无评论