6,147 research outputs found
Dynamic S-BOX using Chaotic Map for VPN Data Security
A dynamic SBox using a chaotic map is a cryptography technique that changes
the SBox during encryption based on iterations of a chaotic map, adding an
extra layer of confusion and security to symmetric encryption algorithms like
AES. The chaotic map introduces unpredictability, non-linearity, and key
dependency, enhancing the overall security of the encryption process. The
existing work on dynamic SBox using chaotic maps lacks standardized guidelines
and extensive security analysis, leaving potential vulnerabilities and
performance concerns unaddressed. Key management and the sensitivity of chaotic
maps to initial conditions are challenges that need careful consideration. The
main objective of using a dynamic SBox with a chaotic map in cryptography
systems is to enhance the security and robustness of symmetric encryption
algorithms. The method of dynamic SBox using a chaotic map involves
initializing the SBox, selecting a chaotic map, iterating the map to generate
chaotic values, and updating the SBox based on these values during the
encryption process to enhance security and resist cryptanalytic attacks. This
article proposes a novel chaotic map that can be utilized to create a fresh,
lively SBox. The performance assessment of the suggested S resilience Box
against various attacks involves metrics such as nonlinearity (NL), strict
avalanche criterion (SAC), bit independence criterion (BIC), linear
approximation probability (LP), and differential approximation probability
(DP). These metrics help gauge the Box ability to handle and respond to
different attack scenarios. Assess the cryptography strength of the proposed
S-Box for usage in practical security applications, it is compared to other
recently developed SBoxes. The comparative research shows that the suggested
SBox has the potential to be an important advancement in the field of data
security.Comment: 11 Page
Improving the Statistical Qualities of Pseudo Random Number Generators
Pseudo random and true random sequence generators are important components in many scientific and technical fields, playing a fundamental role in the application of the Monte Carlo methods and stochastic simulation. Unfortunately, the quality of the sequences produced by these generators are not always ideal in terms of randomness for many applications. We present a new nonlinear filter design that improves the output sequences of common pseudo random generators in terms of statistical randomness. Taking inspiration from techniques employed in symmetric ciphers, it is based on four seed-dependent substitution boxes, an evolving internal state register, and the combination of different types of operations with the aim of diffusing nonrandom patterns in the input sequence. For statistical analysis we employ a custom initial battery of tests and well-regarded comprehensive packages such as TestU01 and PractRand. Analysis results show that our proposal achieves excellent randomness characteristics and can even transform nonrandom sources (such as a simple counter generator) into perfectly usable pseudo random sequences. Furthermore, performance is excellent while storage consumption is moderate, enabling its implementation in embedded or low power computational platforms.This research was funded by the Spanish Ministry of Science, Innovation and Universities (MCIU), the State Research Agency (AEI), and the European Regional Development Fund (ERDF) under project RTI2018-097263-B-I00 (ACTIS)
Image encryption for Offshore wind power based on 2D-LCLM and Zhou Yi Eight Trigrams
Offshore wind power is an important part of the new power system, due to the
complex and changing situation at ocean, its normal operation and maintenance
cannot be done without information such as images, therefore, it is especially
important to transmit the correct image in the process of information
transmission. In this paper, we propose a new encryption algorithm for offshore
wind power based on two-dimensional lagged complex logistic mapping (2D-LCLM)
and Zhou Yi Eight Trigrams. Firstly, the initial value of the 2D-LCLM is
constructed by the Sha-256 to associate the 2D-LCLM with the plaintext.
Secondly, a new encryption rule is proposed from the Zhou Yi Eight Trigrams to
obfuscate the pixel values and generate the round key. Then, 2D-LCLM is
combined with the Zigzag to form an S-box. Finally, the simulation experiment
of the algorithm is accomplished. The experimental results demonstrate that the
algorithm can resistant common attacks and has prefect encryption performance.Comment: accepted by Int. J. of Bio-Inspired Computatio
Entropy in Image Analysis II
Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated numerical and analytical methods, particularly for those applications in medicine, security, and other fields where the results of the processing consist of data of vital importance. This fact is evident from all the articles composing the Special Issue "Entropy in Image Analysis II", in which the authors used widely tested methods to verify their results. In the process of reading the present volume, the reader will appreciate the richness of their methods and applications, in particular for medical imaging and image security, and a remarkable cross-fertilization among the proposed research areas
Symmetry in Chaotic Systems and Circuits
Symmetry can play an important role in the field of nonlinear systems and especially in the design of nonlinear circuits that produce chaos. Therefore, this Special Issue, titled âSymmetry in Chaotic Systems and Circuitsâ, presents the latest scientific advances in nonlinear chaotic systems and circuits that introduce various kinds of symmetries. Applications of chaotic systems and circuits with symmetries, or with a deliberate lack of symmetry, are also presented in this Special Issue. The volume contains 14 published papers from authors around the world. This reflects the high impact of this Special Issue
- âŠ