期刊文献+

基于单向混沌函数的图像加密算法分析 被引量:1

On the security of an image encryption scheme based on one-way chaotic function
原文传递
导出
摘要 对一种基于单向混沌函数的图像加密算法进行了安全性分析.分析了此混沌函数的性质,指出其对控制参数不敏感,迭代产生的密钥流不是均匀分布,零值分布偏多.提出一种选择明文攻击方法,可以在一定精度范围内估计加密算法的密钥值.实验结果表明,该加密算法对于选择明文图像攻击是不安全的,对混沌轨道和密钥流序列进行有效隔离可增强其安全性. The security of an image encryption scheme based on one-way chaotic function was analyzed. This paper analyzes the properties of the chaotic function, and points out that chaotic function is not sensitive to the control parameters; the key stream generated by the chaotic map is not uniform. Proposed a kind of chosen-plaintext attack based on these defects, the keys of the encryption algorithm can be recovered to some precision extent. Experiments suggested that the image encryption algorithm is not secure enough, and could not be used in strict applications. To isolate the chaotic orbit from key serenm lould enhance.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第6期52-55,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(10272113)
关键词 图像加密 混沌密码学 密码分析 选择明文攻击 加密算法 image encryption chaotic cryptography cryptanalysis chosen-plaintext attack encryption algorithm
  • 相关文献

参考文献7

  • 1陈婷,蒋国平,权安静.数字图像加密技术的探讨[J].信息安全与通信保密,2005,27(1):57-59. 被引量:9
  • 2Gao H J, Zhang Y S, Liang S Y, et al. Anewchaotic algorithm for image encryption[J]. Chaos, Solitons and Fractals, 2006, 29:393-399.
  • 3Guan Z H, Huang F J, Guan W J. Chaos-based image encryption algorithm [J]. Physics Letters A, 2005, 346: 153-157.
  • 4Hu H P, Chen Y Q. Image watermarking technique based on two-dimensional chaotic stream encryption [C]// EUC Workshops. Berlin: Springer-Verlag, 2005: 817-824.
  • 5Chen G R, Mao Y B. A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos, Solitons and Fractals, 2004, 21: 749-761.
  • 6Xiang T, Wong K W, Liao X F. A novel symmetrical cryptosystem based on discretized two-dimensional chaotic map[J].Physics Letters A, 2007, 364:252- 258.
  • 7Ahmed H H, Kalash H M, Allah O S. An efficient chaos-based feedback stream cipher(ECBFSC) for image encryption and decryption[J]. Informatica, 2007, 31: 121-129.

共引文献8

同被引文献10

  • 1Lasota A, Mackey M C. Chaos, fraelals and noise [M]. New York: Springer-Verlag, 1994.
  • 2Kohda T, Tsuneda A. Statistics of chaotic binary sequences[J].IEEE Trans on Information Theory, 1997, 43(1): 105-112.
  • 3Kohda T, Tsuneda A. Pseudonoise sequences by chaotic nonlinear maps and their correlation properties [J].IEICE Trans on Commun, 1993, E76-B(8): 855-862.
  • 4ZepernickHJ,FilgerA.伪随机信号处理--理论与应用[M].甘良才,译.北京:电子工业出版社,2007.
  • 5Hammons R A, Kumar V P. On a recent 4-phase sequence design for CDMA[J]. IEICE Trans on Commun, 1993, E76-B(8): 804-813.
  • 6Wu X G. , Hu H P, Zhang B L. Parameter estimation only from the symbolic sequences generated by chaos system [J]. Chaos, Solitons & Fractals,2004, 22(2): 359-366.
  • 7Hu H P, Wu X G, Wang Z X. Synchronizing chaotic map from two-valued symbolic sequences [J]. Chaos, Solitons & Fractals, 2005, 24(4): 1 059- 1 064.
  • 8张翌维,沈绪榜,郑新建,张洵颖.基于混沌映射的图像加密硬件实现结构[J].华中科技大学学报(自然科学版),2008,36(6):84-88. 被引量:2
  • 9宁国强,何小海,侯波,张卫东.一种新的混沌扩频序列的研究与应用[J].四川大学学报(自然科学版),2009,46(5):1341-1346. 被引量:6
  • 10胡汉平,刘双红,王祖喜,吴晓刚.一种混沌多相伪随机序列[J].数学物理学报(A辑),2004,24(2):251-256. 被引量:3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部