713 research outputs found

    Error Function Attack of chaos synchronization based encryption schemes

    Full text link
    Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the Error Function Attack is presented systematically and used to evaluate system security. We define a quantitative measure (Quality Factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from Quality Factor

    An image encryption algorithm based on the double time-delay Lorenz system

    Get PDF
    The traditional image encryption technology has the disadvantages of low encryption efficiency and low security. According to the characteristics of image information, an image encryption algorithm based on double time-delay chaos is proposed by combining the delay chaotic system with traditional encryption technology. Because of the infinite dimension and complex dynamic behavior of the delayed chaotic system, it is difficult to be simulated by AI technology. Furthermore time delay and time delay position have also become elements to be considered in the key space. The proposed encryption algorithm has good quality. The stability and the existence condition of Hopf bifurcation of Lorenz system with double delay at the equilibrium point are studied by nonlinear dynamics theory, and the critical delay value of Hopf bifurcation is obtained. The system intercepts the pseudo-random sequence in chaotic state and encrypts the image by means of scrambling operation and diffusion operation. The algorithm is simulated and analyzed from key space size, key sensitivity, plaintext image sensitivity and plaintext histogram. The results show that the algorithm can produce satisfactory scrambling effect and can effectively encrypt and decrypt images without distortion. Moreover, the scheme is not only robust to statistical attacks, selective plaintext attacks and noise, but also has high stability

    Secure Communication Based on Hyperchaotic Chen System with Time-Delay

    Get PDF
    This research is partially supported by National Natural Science Foundation of China (61172070, 60804040), Fok Ying Tong Education Foundation Young Teacher Foundation(111065), Innovative Research Team of Shaanxi Province(2013KCT-04), The Key Basic Research Fund of Shaanxi Province (2016ZDJC-01), Chao Bai was supported by Excellent Ph.D. research fund (310-252071603) at XAUT.Peer reviewedPostprin

    An Efficient and Secure DNA based Image Encryption Technique

    Get PDF
    In this paper, an efficient and secure DNA based image encryption technique using hyper chaos Lorenz function is proposed. The technique employs SHA-512 hash of gray scale image and primary key to alter the initial seeds of hyper chaos Lorenz function. Initially, chaotic sequences are generated and redesigned. Then, an image is divided into blocks and randomly shuffled according to the primary key. Further perform circular shift operation over the rows of the shuffled image matrix and index based scrambling operation over the columns. After that, perform dynamic encoding and diffusion based DNA algebraic operation over the encoded DNA sequence and DNA based Key sequence using chaotic sequence. Finally, DNA decoding is employed to convert the diffused dynamic matrix into a ciphered image. The dynamicity of the chaotic sequences makes its extraordinary and contributes to the enhanced security and robustness of the technique. Implementation, security and performance analysis demonstrate that the technique has not only an outstanding encryption effect, but also posses large key space, less pixel correlation, low computation time and successfully resilient to the statistical, differential and brute-force attack. Comparative analysis with other references proves its efficiency and practicability for real time applications
    corecore