713 research outputs found
Error Function Attack of chaos synchronization based encryption schemes
Different chaos synchronization based encryption schemes are reviewed and
compared from the practical point of view. As an efficient cryptanalysis tool
for chaos encryption, a proposal based on the Error Function Attack is
presented systematically and used to evaluate system security. We define a
quantitative measure (Quality Factor) of the effective applicability of a chaos
encryption scheme, which takes into account the security, the encryption speed,
and the robustness against channel noise. A comparison is made of several
encryption schemes and it is found that a scheme based on one-way coupled
chaotic map lattices performs outstandingly well, as judged from Quality
Factor
An image encryption algorithm based on the double time-delay Lorenz system
The traditional image encryption technology has the disadvantages of low encryption efficiency and low security. According to the characteristics of image information, an image encryption algorithm based on double time-delay chaos is proposed by combining the delay chaotic system with traditional encryption technology. Because of the infinite dimension and complex dynamic behavior of the delayed chaotic system, it is difficult to be simulated by AI technology. Furthermore time delay and time delay position have also become elements to be considered in the key space. The proposed encryption algorithm has good quality. The stability and the existence condition of Hopf bifurcation of Lorenz system with double delay at the equilibrium point are studied by nonlinear dynamics theory, and the critical delay value of Hopf bifurcation is obtained. The system intercepts the pseudo-random sequence in chaotic state and encrypts the image by means of scrambling operation and diffusion operation. The algorithm is simulated and analyzed from key space size, key sensitivity, plaintext image sensitivity and plaintext histogram. The results show that the algorithm can produce satisfactory scrambling effect and can effectively encrypt and decrypt images without distortion. Moreover, the scheme is not only robust to statistical attacks, selective plaintext attacks and noise, but also has high stability
Secure Communication Based on Hyperchaotic Chen System with Time-Delay
This research is partially supported by National Natural Science Foundation of China (61172070, 60804040), Fok Ying Tong Education Foundation Young Teacher Foundation(111065), Innovative Research Team of Shaanxi Province(2013KCT-04), The Key Basic Research Fund of Shaanxi Province (2016ZDJC-01), Chao Bai was supported by Excellent Ph.D. research fund (310-252071603) at XAUT.Peer reviewedPostprin
An Efficient and Secure DNA based Image Encryption Technique
In this paper, an efficient and secure DNA based image encryption technique using hyper chaos Lorenz function is proposed. The technique employs SHA-512 hash of gray scale image and primary key to alter the initial seeds of hyper chaos Lorenz function. Initially, chaotic sequences are generated and redesigned. Then, an image is divided into blocks and randomly shuffled according to the primary key. Further perform circular shift operation over the rows of the shuffled image matrix and index based scrambling operation over the columns. After that, perform dynamic encoding and diffusion based DNA algebraic operation over the encoded DNA sequence and DNA based Key sequence using chaotic sequence. Finally, DNA decoding is employed to convert the diffused dynamic matrix into a ciphered image. The dynamicity of the chaotic sequences makes its extraordinary and contributes to the enhanced security and robustness of the technique. Implementation, security and performance analysis demonstrate that the technique has not only an outstanding encryption effect, but also posses large key space, less pixel correlation, low computation time and successfully resilient to the statistical, differential and brute-force attack. Comparative analysis with other references proves its efficiency and practicability for real time applications
- …