With the international development of the medical service informatisation, medical information sharing has become the key standard to measure the degree of medical informatisation. In this process, it is important to ...
详细信息
With the international development of the medical service informatisation, medical information sharing has become the key standard to measure the degree of medical informatisation. In this process, it is important to ensure the security of patients' medical information such as patients' records, examination reports, images and so on. In this article, an image encryption scheme based on secure hash algorithm 3 (SHA-3), DNA coding and high dimensional chaos system is proposed to promote the security level of medical images in information sharing processes such as over the network. First, SHA-3algorithm is used to calculate the hash value of the input image, and the result is taken as the initial value of the hyper-chaotic system. Second, the intensity value of the input image is converted into a serial binary digital stream. Third, the pseudo-random sequence generated by a 4-dimensional hyper-chaotic system is used to perturb the bit stream globally so as to achieve the purpose of hiding the effective information of the input image. During the operation of hyper-chaotic sequence and DNA sequence, algebraic and complementary operations are performed on DNA encoding values to enhance encryption performance. Finally, simulations have been applied on an open-source medical image database, and the results demonstrate obvious encryption effectiveness and high security level of the proposed encryption algorithm in the robustness of noise and clipping attacks.
Number Theoretic Transform (NTT) and secure hash algorithm 3 (SHA3), are the two main operators in the lattice-based Post-Quantum Cryptography (PQC) algorithms. Lattice-based PQC algorithms have different parameter se...
详细信息
ISBN:
(纸本)9798350303100
Number Theoretic Transform (NTT) and secure hash algorithm 3 (SHA3), are the two main operators in the lattice-based Post-Quantum Cryptography (PQC) algorithms. Lattice-based PQC algorithms have different parameter settings, e.g., the length and modulus of NTT polynomials and the different hash functions. Motivated by the demands for more versatile NTT and SHA3 hardware accelerators, we implement the NTT and SHA3 designs that can accommodate to different parameters at run-time. Furthermore, to reduce the running cycles of the whole NTT operation and whole SHA3 operation including data transferring and calculation, we propose a pipelined architecture to optimize the gap between data transfer and calculation process in high-level. The designed configurable accelerators can be embedded in SoC to accelerate different lattice-based PQC algorithms efficiently. The experimental results show that our high-level pipelined and configurable NTT and SHA3 designs have good area-time efficiency. In specific, for the NTT design, our architecture is 4.1 times more area-time efficient compared with the state-of-the-art. For SHA3, our architecture is 1.4 times more area-time efficient over the existing configurable SHA3 designs.
暂无评论