期刊文献+

基于SHA-3算法的图像密钥生成方法 被引量:1

Image Key Generation Method Based on SHA-3 Algorithm
下载PDF
导出
摘要 通过对新发布的Hash标准SHA-3算法和常规密码算法的研究,提出了一种新颖的密钥生成方案,该方案采用SHA-3算法与图像相结合的方法。首先,将图像处理成SHA-3算法能够吸收的数据形式,使其经过SHA-3算法的三维矩阵空间变换后生成密钥;其次,利用像素直方分布图将生成的密钥以图像形式显示,证明生成的密钥满足密码算法中对初始密钥以及密钥流的安全性要求;最后,利用VS2013以及Quartus II软件对所提方案加以实现,验证所生成的密钥随机性最小可达到97.7%,密钥空间最小可达到2224。 By analyzing paper proposes a novel key image data are processed int the new generatlo standard n scheme o the form of SHA SHA-3 and the traditional cryptographic algorithm, this , which combines SHA-3 algorithm with image. Firstly, -3 which can be absorbeal, and they are further conversed via three-dimensional matrix space of SHA-3 algorithm to generate secret key. Secondly, the secret key is displayed in the form of histogram distribution of the pixel in order to demonstrate that the generated key satisfies the security requirements of cryptographic algorithm in the initial key or key stream. Finally, the proposed scheme is realized by VS2013 and Quartus II tools. The experimental results show that the randomness of the generated key can reach 97.7% and the space can reach 2^224 at least.
出处 《华东理工大学学报(自然科学版)》 CAS CSCD 北大核心 2015年第5期693-697,共5页 Journal of East China University of Science and Technology
基金 国家自然科学基金(61274132) 浙江省自然科学基金(LQ14F04001)
关键词 SHA-3算法 三维矩阵 图像加密 密钥生成 SHA-3 algorithm three-dimensional matrix image encryption key geheration
  • 相关文献

参考文献11

  • 1林喆.分组密码与流密码的分析、设计与比较——以AES和RC4为例[J].商品与质量(理论研究),2012(4):313-314. 被引量:2
  • 2Bertoni G, Daemenet J. Cryptographic sponge functionsEB/ OLd. E2011-01-05]. http,//sponge, noekeon, org/CSF-0. 1. pdf.
  • 3Bertoni G, Daemenet J. The Keccak sponge function family [EB/OL]. [2014-05-10]. http://Keccak, noekeon, org.
  • 4Morawieeki P, Pieprzykand J, Srebrny M. Rotational crypt- analysis of round-reduced KeccakEEB/OLT. [2012-12-18"] . http://eprint, iaer. org.
  • 5李梦东,邵鹏林,李小龙.SHA-3获胜算法:Keccak评析[J].北京电子科技学院学报,2013,21(2):18-23. 被引量:3
  • 6高晓东,杨亚涛,李子臣.SHA-3置换函数的差分转移概率分析[J].计算机科学,2014,41(3):159-162. 被引量:2
  • 7Naya-Plaseneia M, Rock A, Meier W. Practical analysis of reduced-round Keeeak [C]// International Conference on Cryptology in India. Chennai, India: Springer-Verlag Berlin, 2011: 236-254.
  • 8Provelengios G, Kitsos P, Sklavos N. FPGA-based design approaches of Keccak Hash functionI-C]//Euromicro Confer- ence Digital System Design. Izmir: IEEE , 2012 648-653.
  • 9陈荣,赵曙光.基于图像密钥的高速图像加密算法及其相关协议[c]//江苏省通信学会2004年学术年会论文集.南京:江苏省通信学会,2004:104-113.
  • 10Liu Zhi, Le Meur, Luo Shuhua. Superpixel-based saliency detection[C]// IEEE Conference on Computer Vision and Pattern Recognition. Paris: IEEE, 2013: 1-4.

二级参考文献28

  • 1G. Bertoni, et al, The Keccak Reference, Januar- y, 2011, http ://Keccak. noekeon, org.
  • 2G. Bertoni, J. Daemen et al, Cryptographic sponge functions, January, 2011, http :// sponge, noekeon, org/.
  • 3Shu- jen Chang, et al, Third -Round Report of the SHA- 3 Cryptographic Hash Algorithm Com- petition, November, 2012, http://dx, doi. org/ 10. 6028/NIST. IR. 7896.
  • 4I. Dinur, O. Dunkelman and A. Shamir, New at- tacks on Keccak - 224 and Keccak - 256, FSE' 2012, 2012.
  • 5I. Dinur, O. Dunkelman and A. Shamir, Collision Attacks on Up to 5 Rounds of SHA - 3Using Gen- eralized Internal Differentials, FSE'2013, 2013.
  • 6A. Due, J. Guo, T. Peyrin and L. Wei, Unaligned Rebound Attack: Application to Keeeak, FSE' 2012, 2012.
  • 7J. Daemen and G Van Assche, Differential Propa- gation analysis of Kecaak, FSE'2012, 2012.
  • 8M. Naya- Plasencia, A. Reock, and W. Meier, Practical Analysis of Reduced - Round Keccak, INDOCRYPT 2011, 2011.
  • 9C. Boura and A. Canteaut, Zero -Sum Distin- guishers for Iterated Permutations and Application to Keccak - f and Hamsi - 256, SAC' 2010, 2010.
  • 10C. Boura, A. Canteaut and C. De Canniere,Higher - order differential properties of Keccak and Luffa, FSE'2011, 2011.

共引文献4

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部