In this paper the results of parallelizing a block cipher based on a spatiotemporal chaotic system and a chaotic neural network are presented. A data dependence analysis of loops was applied in order to parallelize th...
详细信息
In this paper the results of parallelizing a block cipher based on a spatiotemporal chaotic system and a chaotic neural network are presented. A data dependence analysis of loops was applied in order to parallelize the algorithm. The parallelism of the algorithm is demonstrated in accordance with the OpenMP standard. The efficiency measurements of a parallel algorithm working in standard modes of operation are shown.
Wireless sensor networking is an emerging technology having a wide range of potential applications. Since most wireless sensors have significantly limited memory capacity and power consumption, we need to implement fa...
详细信息
ISBN:
(纸本)1880843455
Wireless sensor networking is an emerging technology having a wide range of potential applications. Since most wireless sensors have significantly limited memory capacity and power consumption, we need to implement fast encryption/decryption for real time signal processing with small available memory. The purpose of this paper is to evaluate suitability of Rijndael, selected as Advanced encryption Standard by NIST, for encryption in the case of wireless sensor networks. The performance of Rijndael is compared in terms of the code size and the implementation speed with TEA (Tiny encryption algorithm) which requires a small code size but has security problems. We tested implementation of both algorithms on low power 16-bit microcontroller TI MSP430F149 used in Wireless Sensor Network WISE. According to our experiment, Rijndael requires more code size than TEA but Rijndael is relatively suitable for the wireless sensor networks using 16-bit microprocessors.
In this paper, inspired by network coding theory we propose an efficient hybrid encryption-coding algorithm that requires using traditional encryption only for the first small amount of data. This amount of data, whic...
详细信息
ISBN:
(纸本)9781424476855
In this paper, inspired by network coding theory we propose an efficient hybrid encryption-coding algorithm that requires using traditional encryption only for the first small amount of data. This amount of data, which we refer to as the first block, is determined by the traditional encryption algorithm to be applied on this first block. In our proposed algorithm, all the rest of the information will then be transmitted securely over the wireless channel, using network coding, without a need for using traditional encryption. Unlike the traditional and opportunistic encryption algorithms, the proposed algorithm achieves higher data rates and less avalanche error effect and at the same time it is as secure as traditional encryption algorithms. Assuming the additive white Gaussian noise (AWGN) channel model employing our proposed algorithm we analyze its performance in terms of throughput and security level. Numerical results of different case studies are provided.
With the research and discussion about different kinds of methods generating random number by computer and encryption algorithm, REA is raised from a practical standpoint. REA can make key sequence closer to true rand...
详细信息
ISBN:
(纸本)9781424442270
With the research and discussion about different kinds of methods generating random number by computer and encryption algorithm, REA is raised from a practical standpoint. REA can make key sequence closer to true random sequence, thus it ensures data security. Experiments show that the algorithm has many characteristics: understanding easily, practicality, encrypting faster, increasing the difficulty of deciphering and less spending of the system.
As the concept of blockchain continues to the hype, an increasing number of industries join the ranks of using blockchain, which also leads to privacy leaks becoming a potential hidden danger. Therefore, more secure a...
详细信息
Encrypted Communication technique is an important measure to the information safety. Based on the advantages of two public encryption algorithm RSA & DES, a novel high intensity public encryption algorithm Chaos ...
详细信息
Encrypted Communication technique is an important measure to the information safety. Based on the advantages of two public encryption algorithm RSA & DES, a novel high intensity public encryption algorithm Chaos Random High Intensity (CHR) is proposed in this paper. The principle of CRH is described and analyzed in detail, and the results of computer simulation has proved its effectiveness and correctness.
As a new mobile communication technology in the era of the internet of things, 5G is characterized by high speed, low delay, and large connection. It is a network infrastructure to realize human-computer and internet ...
详细信息
As a new mobile communication technology in the era of the internet of things, 5G is characterized by high speed, low delay, and large connection. It is a network infrastructure to realize human-computer and internet of things in the era of the internet of things. Power quality data is the efficiency with which a power grid delivers electricity to users and expresses how well a piece of machinery uses the electricity it receives. The waveform at the nominal voltage and frequency is the goal of power quality research and improvement. The power internet of things (IoT) is an intelligent service platform that fully uses cutting-edge tech to enable user-machine interaction, data-driven decision-making, real-time analytics, and adaptive software design. The process by which plaintext is converted into cipher text is called an encryption algorithm. The cipher text may seem completely random, but it can be decrypted using the exact mechanism that created the encryption key.
This article proposes an improved tent-dynamic cross coupled map lattice, which has superior ergodicity, broader chaotic range and higher information entropies than cross coupled map lattice and tent-dynamic cross cou...
详细信息
This article proposes an improved tent-dynamic cross coupled map lattice, which has superior ergodicity, broader chaotic range and higher information entropies than cross coupled map lattice and tent-dynamic cross coupled map lattice, and has high suitability for chaos-based image encryption algorithm. Traditional encryption scheme has two significant stages, including image confusion and diffusion. Our encryption algorithm utilizes DNA coding and sequences to construct short DNA strand and long DNA strand, where short DNA strand is used for DNA strand exchange, and long DNA strand is used for DNA strand diffusion. Compared to general image confusion, DNA strand exchange permutates parts of two diverse DNA strands, where the length of exchange is uncertain. Compared to image diffusion, DNA strand diffusion is divided into two categories according to Watson-Crick base pairing property, and different category applies diverse DNA computation operation. Through security analysis and statistical analysis, our encryption scheme can resist different attacks. Experimental results confirm that the proposed algorithm has a high degree of security and the excellent efficiency. (C) 2022 Elsevier Inc. All rights reserved.
In this work, a new discrete chaotic map is developed from the 1D ICMIC (Iterative Map with Infinite Collapses) to control the 2D Henon map. The performances of the proposed discrete map are evaluated by using the pha...
详细信息
In this work, a new discrete chaotic map is developed from the 1D ICMIC (Iterative Map with Infinite Collapses) to control the 2D Henon map. The performances of the proposed discrete map are evaluated by using the phase diagram, Lyapunov exponent spectrum and complexity. It is found that the new chaotic map has larger value of complexity, and chaotic states are distributed in large parameter ranges. Thus the new chaotic map has better chaotic features and randomness, it is especially suitable for the chaotic secure communication. Then an image encryption algorithm is proposed based on the new chaotic map. In this algorithm, the sequences generated by the new chaotic map are used for pixel position scrambling and pixel value diffusion operations. The security features of the designed encryption scheme are evaluated by common attacks methods. The results confirmed that the proposed algorithm is effective to improve the security in image encryption.
In view of the present chaotic image encryption algorithm based on scrambling (diffusion is vulnerable to choosing plaintext (ciphertext) attack in the process of pixel position scrambling), we put forward a image enc...
详细信息
In view of the present chaotic image encryption algorithm based on scrambling (diffusion is vulnerable to choosing plaintext (ciphertext) attack in the process of pixel position scrambling), we put forward a image encryption algorithm based on genetic super chaotic system. The algorithm, by introducing clear feedback to the process of scrambling, makes the scrambling effect related to the initial chaos sequence and the clear text itself;it has realized the image features and the organic fusion of encryption algorithm. By introduction in the process of diffusion to encrypt plaintext feedback mechanism, it improves sensitivity of plaintext, algorithm selection plaintext, and ciphertext attack resistance. At the same time, it also makes full use of the characteristics of image information. Finally, experimental simulation and theoretical analysis show that our proposed algorithm can not only effectively resist plaintext (ciphertext) attack, statistical attack, and information entropy attack but also effectively improve the efficiency of image encryption, which is a relatively secure and effective way of image communication.
暂无评论