期刊文献+

基于遍历矩阵和混合密钥的验证和图像空域加密技术 被引量:1

Authentication and Image Spatial Encryption Based on Ergodic Matrix and Hybrid Key System
下载PDF
导出
摘要 由于图像与人感知外部世界的基本手段相吻合,因此相关的信息量有可能涉及到个人隐私、商业利益、军事机密等,所以多媒体信息的安全问题变得越来越重要。传统的加密系统,如RSA、DES、IDEA、SAFER和FEAL等,其加密速度慢而且不能有效去除相邻像素的相关性,不适合用于图像加密。经过二十多年研究的混沌加密系统具有良好的特性适合图像加密,但大部分是基于对称加密。对称加密比非对称加密速度更快,但是对于密钥的管理制约了其广泛的使用,为了弥补这一缺陷,文章提出混合密钥机制,不仅可用于图像加密,而且可用于验证。遍历矩阵在加/解密系统中不仅作为公开密钥存在,而且是图像置乱和扩散的关键参数。实验结果表明,与现有的混沌加密系统相比,文章提出的图像加密技术彻底置乱和扩散原始图像,并且拥有至少3.08×105898个密钥的巨大空间,因此足够抵制蛮力攻击。相比于现有的混沌密码系统,文章的实验测试结果更加乐观,在C语言下,置乱和扩散阶段的执行时间相当稳定(分别是1.9-2.0毫秒和2.0-2.1毫秒)。与Yang和Ismail所提出的算法相比,根据文章中的性能评估、敏感度分析和统计分析,文章所提出的算法具有更高的安全性,并且适用于网络传输。 For human being, the basic means of the perceptions of the world and the image is consistent. Therefore, the relevant information may possibly related to personal privacy, commercial interests and military secrets, so the security of multimedia information becomes more and more important. Conventional encryption systems, such as RSA, DES, IDEA, SAFER and FEAL, are not suitable for image encryption. Because of its encryption speed is slow and can not effectively remove the correlation between adjacent pixels. The chaotic encryption systems which have been studied for over twenty years have good characteristics for image encryption, but most of the systems are based on a symmetric encryption. Symmetric encryption is faster than symmetric encryption, but the key management restricts its widespread applications. In order to remedy this defect, this paper proposes a hybrid-key mechanism. It’s not only can be used for image encryption, but also can be used in verification. Ergodic matrix in the encryption / decryption system is not only to generate a public key, but also is the key parameter of image confusion and diffusion. The experimental results show that compared with the existing chaotic encryption system, the proposed image encryption technology completely shuffles and change the pixel values of the original image. More than that, it has at least a huge space of 3.08 * 105898 keys, therefore it’s enough to resist the brute force attack. Compared with the existing chaotic cipher system, the experimental results in this paper are more optimistic: coded in the C language, confusion and diffusion stage of the execution time is quite stable (respectively is between 1.9 to 2 ms and 2 to 2.1 ms). Compared with the algorithms introduced by Yang and Ismail, the proposed algorithm, according to the performance evaluation the sensitivity analysis and statistical analysis, our proposed algorithm is more secure, and is suitable for network transmission.
出处 《信息网络安全》 2014年第11期18-25,共8页 Netinfo Security
基金 海南省自然科学基金[613152 614226] 海南省教育厅课题[Hjkj2013-14]
关键词 混合 遍历矩阵 图像加密 置乱 扩散 hybrid ergodic matrix image encryption confusion diffusion
  • 相关文献

参考文献7

二级参考文献37

  • 1赵永哲,黄声烈,姜占华.GF(2^k)上的遍历矩阵及其特性分析[J].小型微型计算机系统,2005,26(12):2135-2139. 被引量:14
  • 2赵永哲,姜占华,黄声烈.基于F_2上遍历矩阵的Shamir三次传递协议的实现[J].小型微型计算机系统,2006,27(6):986-991. 被引量:11
  • 3[1]Zhao Yongzhe,Wang Liou,Zhang Wei.Information-Exchange Using the Ergodic Matrices in GF(2),In:Li Xue,JianYingZhou,Moti Yung,Jakobsson Markus Eds.Appkied Cryptography and Network Security Technical Track Proceedings.2nd International Conference,A CNS 2004.ICISA PRESS,2004:388-397
  • 4[3]Wu H,HasanM A.Efficient Exponentiation of a Primitive Root in GF (2m).IEEE TRANSA CTIONS ON COMPUTERS,Feb 1997:46(2):162-172
  • 5[4]Schneier B.Aplied Cryptography:Protocols,Algorithms,and Source Code in C.USA:John Wiley & Sons,Ine.,1996
  • 6[5]Daniel Panario,Boris Pittel,BruceRichmond,Alfredo viola.Analysis of rabin's irreducibility test for polynomials over finite fields.Random Structures and Algorithms,October-December 2001;19(3-4):525-551
  • 7Michael Sipser: Introduction to the Theory of Computation,Original edition Copyright 1997 by PWS.
  • 8Bruce Schneier: Aplied Cryptography Second Edition: protocols, algorithms, and source code in C, Copyright 1996 by John Wiley & Sons, Inc.
  • 9Hans Huttel: On Rice's Theorem, Aalborg University 2001.
  • 10Technical Report HCIA, Copyright 1999 - 2000 Protego Information AB.

共引文献15

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部