期刊文献+

一种基于保守混沌的密钥分发协议及图像加密算法 被引量:6

A Conservative-chaos-based Key Distribution Protocol and Image Encryption Algorithm
原文传递
导出
摘要 耗散混沌系统可以通过时滞嵌入法重构混沌吸引子,因而耗散混沌在基于混沌的信息加密技术中存在一定隐患。针对这一问题提出一种基于保守混沌的密钥分发协议及图像加密算法,该算法将图像数据通过Hash算法转换为保守混沌系统的初始值,形成一次一密的加密结构。然后利用保守混沌信号结合密钥分发协议生成二进制密钥流,该过程由发送方和接受方双方共同完成。使用得到的二进制密钥流对图像数据置乱和扩散,得到加密图像数据。仿真结果表明:该算法安全可靠,能够有效地隐藏原图像信息,并能抵御一些常见的攻击。此外,该加密算法所使用的保守混沌不存在吸引子难以被破解,算法的安全性进一步加强。 Since a chaotic attractor can be reconstructed with time-delay embedding method in dissipative chaotic systems,there are potential problems in chaos-based information encryption.Concerning this issue,we report a conservative-chaos-based key distribution protocol and image encryption algorithm.The encryption algorithm converts image data into initial value of a conservative chaotic system with Hash algorithm and forms an encryption mechanism of one-time pads.Then,a binary keystream is generated by combining conservative chaos with key distribution protocol,which is completed by both sender and receiver.The obtained binary keystream shuffles and diffuses the image data to obtain an encrypted image.It shows that the proposed algorithm is safe and reliable.It hides effectively a plain image,and resists common decryption algorithms.Besides,conservative chaos has no attractor thus the encryption algorithm is hard to crack.
作者 康志君 仓诗建 李月 KANG Zhijun;CANG Shijian;LI Yue(School of Electronic Information and Automation,Tianjin University of Science and Technology,Tianjin 300222,China;Department of Product Design,Tianjin University of Science and Technology,Tianjin 300457,China)
出处 《计算物理》 CSCD 北大核心 2021年第2期231-243,共13页 Chinese Journal of Computational Physics
基金 国家自然基金项目(61873186)资助。
关键词 保守混沌 密钥分发协议 图像加密 HASH算法 conservative chaos image encryption key distribution protocol Hash algorithm
  • 相关文献

参考文献4

二级参考文献27

  • 1Baptism M S. Cryptography with chaos[J]. Phys Lett A, 1998, 240(12) : 50- 54.
  • 2Palacios A, Juarez H. Cryptography with cycling chaos[J]. Phys Lett A, 2002, 303(5-6) : 45 - 351.
  • 3Wong W K, Lee L P, Wong K W. A modified chaotic cryptographic method[J]. Comput Phys Commun, 2001, 138(3) : 234 - 236.
  • 4Wong K W. A fast chaotic cryptographic scheme with dynamic look-up table[J]. Phys Lett A, 2002, 298(4) : 238 - 245.
  • 5Wong K W, Ho S W, Yung C K. A chaotic cryptography scheme for generating short ciphertext[J]. Phys Lett A, 2003, 310(1) : 67 - 73.
  • 6Alvarez G, Montoya F, Romera M, et al. Cryptanalysis of a discrete chaotic cryptosystem using external key[J]. Phys Lett A, 2003, 319(3-4) : 334 - 339.
  • 7Abarbanel H D I, Kennel M B. Synchronizing high-dimensional chaotic optical ring dynamics[J]. Phys Rev Lett, 1998, 80( 14): 3153 - 3156.
  • 8Ponomarenko V I, Prokhorov M D. Extracting information masked by the chaotic signal of a time-delay system [ J ]. Phys Rev E, 2002, 66(2) : 026215 - 21.
  • 9Elnashaie S S E H, Abasha M E. On the chaotic behavior of forced fluidized bed catalytic reactors[J]. Chaos, Solitons & Fractals, 1995, 5(5) : 797 - 831.
  • 10Kocarev L. Chaos-based cryptography: a brief overview[J]. IEEE Circ Syst, 2001, 1(3): 6-21.

共引文献36

同被引文献65

引证文献6

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部