169 research outputs found

    Cryptography and Its Applications in Information Security

    Get PDF
    Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information

    Secure Communication Scheme Based on Asymptotic Model of Deterministic Randomness

    Full text link
    We propose a new cryptosystem by combing the Lissajous map, which is the asymptotic model of deterministic randomness, with the one-way coupled map lattice (OCML) system. The key space, the encryption efficiency, and the security are investigated. We find that the parameter sensitivity can reach the computational precision when the system size is only three, all the lattice outputs can be treated as key stream parallelly, and the system is resistible against various attacks including the differential-like chosen cipher attack. The findings of this paper are a strong indication of the importance of deterministic randomness in secure communications.Comment: 16 pages, 7 figure

    A New Color Image Encryption Scheme Using CML and a Fractional-Order Chaotic System

    Get PDF
    Funding: This research was jointly supported by the National Natural Science Foundation of China (No. 61004006, http://www.nsfc.gov.cn), China Postdoctoral Science Foundation(No. 2013M530181, http://res.chinapostdoctor.org.cn/BshWeb/index.shtml), the Natural Science Foundation of Henan Province, China (No. 13230010254, http://www.hnkjt.gov.cn/, Program for Science & Technology Innovation Talents in Universities of Henan Province, China (Grant No 14HASTIT042, http://rcloud.edu.cn), the Foundation for University Young Key Teacher Program of Henan Province, China (No. 2011GGJS-025, http://www.haedu.gov.cn/), Shanghai Postdoctoral Scientific Program (No. 13R21410600, http://www.21cnhr.gov.cn/doctorarea/), the Science & Technology Project Plan of Archives Bureau of Henan Province (No. 2012-X-62, http://www.hada.gov.cn/) and the Natural Science Foundation of Educational Committee of Henan Province, China (No. 13A520082, http://www.haedu.gov.cn/). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.Peer reviewedPublisher PD

    An Efficient Encryption System on 2D Sine Logistic Map based Diffusion

    Get PDF
    An optimal cryptographic model is proposed, enabling the feature of 2D sine logistic map-based diffusion algorithm. The 2D sine logistic map process is merged with the algorithm as it has the ability to provide random number generator as well as to overcome blank. The previous existing models based on image encryption use to work on raw images but without alteration for the process of confusion and diffusion. The main disadvantage as the nearby pixel values for an image always remains similar. This issue is resolved by a Pseudo random generator process which is based on key stream that alters pixel value. Furthermore 2D sine logistic map based diffusion process has shown an improvement in the key sensitivity and the complex relationships that use to get developed between cipher and test image.2D sine logistic map with diffusion method used to keep pixels intact with each other to such an extent as even a single bit modification in the intensity value of an original image pixel will lead to a huge change in most of the pixels of the cipher and thus makes the model very sensitive to make any changes in the pixel value or secret key for an image.  As seen and analyzed with a variety of test results that strategic model used for encryption can easily encrypt the plain image into a cipher of a random binary sequence
    corecore