According to the issues that the predict errors of chaotic sequences rapidly accumulated in multi-step forecasting which affects the predict accuracy, we proposed a new predict algorithm based on local modeling with v...According to the issues that the predict errors of chaotic sequences rapidly accumulated in multi-step forecasting which affects the predict accuracy, we proposed a new predict algorithm based on local modeling with variable frame length and interpolation points. The core idea is that, using interpolation method to increase the available sample data, then modeling the chaos dynamics system with least square algorithm which based on the Bernstein polynomial to realize the forecasting. We use the local modeling method, looking for the optimum frame length and interpolation points in every frame to improve the predict peformance. The experimental results show that the proposed algorithm can improve the predictive ability effectively, decreasing the accumulation of iterative errors in multi-step prediction.展开更多
We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive imag...We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit).展开更多
A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective....A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective. The distribution characteristics of the novel chaotic sequence are comparable to that of the standard normal distribution. Its mean and variance can be changed to the desired values. The novel sequences have also good randomness. The applications for radar mask jamming are analyzed.展开更多
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a...Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high.展开更多
The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic sys...The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic system as an encryption key. Specifically, in the image scrambling stage, the algorithm primarily uses an improved baker transform method to process the image. In the image diffusion stage, the algorithm first uses the chaotic S-box method to process the encryption key. Secondly, an exclusive OR(XOR) operation is performed on the image and the encryption key to initially diffuse the image. Finally, the image is again diffused using the method of ortho XOR. Simulation analysis shows that the algorithm can achieve good encryption effect, simple and easy implementation, and good security. In the digital image communication transmission, it has good practical value.展开更多
It is well known that the periodic performance of spread spectrum sequence heavily affects the correlative and secure characteristics of communication systems. The chaotic binary sequence is paid more and more attenti...It is well known that the periodic performance of spread spectrum sequence heavily affects the correlative and secure characteristics of communication systems. The chaotic binary sequence is paid more and more attention since it is one kind of applicable spread spectrum sequences. However, there are unavoidable short cyclic problems for chaotic binary sequences in finite precision. The chaotic binary sequence generating methods are studied first. Then the short cyclic behavior of the chaotic sequences is analyzed in detail, which are generated by quantification approaches with finite word-length. At the same time, a chaotic similar function is defined for presenting the cyclic characteristics of the sequences. Based on these efforts, an improved method with scrambling control for generating chaotic binary sequences is proposed. To quantitatively describe the improvement of periodic performance of the sequences, an orthogonal estimator is also defined. Some simulating results are provided. From the theoretical deduction and the experimental results, it is concluded that the proposed method can effectively increase the period and raise the complexity of the chaotic sequences to some extent.展开更多
A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for...A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for the performance of QS-CDMA system with RAKE receiver. The performance of the system is analyzed when the hybrid chaotic sequences are used as spreading codes in a QS-CDMA system with RAKE receiver and compared with those obtained for m-se-quences and logistic sequences. The results show that the hybrid chaotic sequences are a class of very promising spreading codes for QS-CDMA system.展开更多
This paper introduces two kinds of sequences used in spread spectrum communication system: pseudo-noise (PN) se-quence generated by linear feedback shift register(LFSR), such as m-sequence and Gold sequence...This paper introduces two kinds of sequences used in spread spectrum communication system: pseudo-noise (PN) se-quence generated by linear feedback shift register(LFSR), such as m-sequence and Gold sequence, and the chaotic sequence generated by the determination of the nonlinear system. The characteristics of PN sequence and chaotic sequence are analyzed by simulation, and the advantages and disadvantages of different sequences in spread spectrum communication system are ob-tained. The advantages of sequence can be used to improve signal transmission in a spread spectrum communication system.展开更多
This paper introduces a switched hyperchaotic system that changes its behavior randomly from one subsystem to another via two switch functions, and its characteristics of symmetry, dissipation, equilibrium, bifurcatio...This paper introduces a switched hyperchaotic system that changes its behavior randomly from one subsystem to another via two switch functions, and its characteristics of symmetry, dissipation, equilibrium, bifurcation diagram, basic dynamics have been analyzed. The hardware implementation of the system is based on Field Programmable Gate Array (FPGA). It is shown that the experimental results are identical with numerical simulations, and the chaotic trajectories are much more complex.展开更多
With good randomness and high sensitivity to initial values,chaotic sequences have been extensively used in secure communication.Real chaotic sequences are highly sensitive to initial values.It is an analog quantity i...With good randomness and high sensitivity to initial values,chaotic sequences have been extensively used in secure communication.Real chaotic sequences are highly sensitive to initial values.It is an analog quantity in the domain of attraction,which is not conducive to the transmission of digital signals.In order to improve the stability,real chaotic sequences can be quantized into digital chaotic sequences.According to the relationship between the information rate and the symbol rate,the symbol rate of binary sequence is the same as the information rate.The information rate can be doubled by quantizing a real-valued sequence into a quaternary sequence.The chaotic sequence has weak periodicity.Moreover,the periodicity of binary digital chaotic sequences is much weaker than that of quaternary chaotic sequences.Compared with the multi-dimensional chaotic map,the one-dimensional chaotic map has small key space and low security.In this paper,a new real-valued chaotic sequence is generated based on the chaotic matrix method constructed by Logistic map and Kent map.Two quantization methods are used to digitize the real-valued chaotic sequence to obtain the quaternary digital chaotic sequence.Moreover,the randomness,the time series complexity and the correlation of the new quaternary chaotic sequence are compared and studied.The simulation results demonstrate that the quaternary digital chaotic sequence obtained by the chaotic matrix has good randomness and correlation.展开更多
The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high...The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high speed integrated circuit hardware description language(VHDL) are described. A valid hazard canceledl method is presented. Computer simulations show that the stable digital sequence waveforms can be produced. The correlations of the digital hybrid chaotic sequences are compared with those of m-sequences. The results show that the correlations of the digital hybrid chaotic sequences are almost as good as those of m-sequences. The works in this paper explored a road for the practical applications of chaos.展开更多
In this paper we propose a semi fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by l level discrete wavelet transformation. An approximate wavelet coeffi...In this paper we propose a semi fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by l level discrete wavelet transformation. An approximate wavelet coefficient matrix of the original image and real value chaotic sequences are than used to generate the content based and secure watermark. The watermark is embedded into original image by using HVS. The tamper detection can identify the tampered region of the received watermarked image. Experimental results are given.展开更多
We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of h...We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of human auditory system (HAS), the grayimage isembedded using our watermarking method. Experimental results show that the proposed watermarkingscheme is inaudible and robust against various signal processing such as noising adding, lossycompression, low pass filtering, re-sampling, and re-quantifying.展开更多
Short-term hydrothermal scheduling(STHTS) is a non-linear and complex optimization problem with a set of operational hydraulic and thermal constraints. Earlier, this problem has been addressed by several classical tec...Short-term hydrothermal scheduling(STHTS) is a non-linear and complex optimization problem with a set of operational hydraulic and thermal constraints. Earlier, this problem has been addressed by several classical techniques; however, due to limitations such as non-linearity and non-convexity in cost curves, artificial intelligence tools based techniques are being used to solve the STHTS problem. In this paper an improved chaotic hybrid differential evolution(ICHDE) algorithm is proposed to find an optimal solution to this problem taking into account practical constraints. A self-adjusted parameter setting is obtained in differential evolution(DE) with the application of chaos theory, and a chaotic hybridized local search mechanism is embedded in DE to effectively prevent it from premature convergence. Furthermore, heuristic constraint handling techniques without any penalty factor setting are adopted to handle the complex hydraulic and thermal constraints. The superiority and effectiveness of the developed methodology are evaluated by its application in two illustrated hydrothermal test systems taken from the literature. The transmission line losses, prohibited discharge zones of hydel plants, and ramp rate limits of thermal plants are also taken into account. The simulation results reveal that the proposed technique is competent to produce an encouraging solution as compared with other recently established evolutionary approaches.展开更多
Bursting is a diverse and common phenomenon in neuronal activation patterns and it indicates that fast action voltage spiking periods are followed by resting periods.The interspike interval(ISI)is the time between suc...Bursting is a diverse and common phenomenon in neuronal activation patterns and it indicates that fast action voltage spiking periods are followed by resting periods.The interspike interval(ISI)is the time between successive action voltage spikes of neuron and it is a key indicator used to characterize the bursting.Recently,a three-dimensional memristive Hindmarsh-Rose(mHR)neuron model was constructed to generate hidden chaotic bursting.However,the properties of the discrete mHR neuron model have not been investigated,yet.In this article,we first construct a discrete mHR neuron model and then acquire different hidden chaotic bursting sequences under four typical sets of parameters.To make these sequences more suitable for the application,we further encode these hidden chaotic sequences using their ISIs and the performance comparative results show that the ISI-encoded chaotic sequences have much more complex chaos properties than the original sequences.In addition,we apply these ISI-encoded chaotic sequences to the application of image encryption.The image encryption scheme has a symmetric key structure and contains plain-text permutation and bidirectional diffusion processes.Experimental results and security analyses prove that it has excellent robustness against various possible attacks.展开更多
In this paper, we analyze the security of a new stream cipher-COSvd(2,128). This cipher was proposed by E. Filiol et al. at the ECRYPT SASC'2004 (The State of the Art of Stream Ciphers). It uses clock-controlled ...In this paper, we analyze the security of a new stream cipher-COSvd(2,128). This cipher was proposed by E. Filiol et al. at the ECRYPT SASC'2004 (The State of the Art of Stream Ciphers). It uses clock-controlled non-linear feedback registers together with an S-box controlled by a chaotic sequence and was claimed to prevent any existing attacks. However, our analysis shows that there are some serious security flaws in the design of the S-box, resulting in heavy biased byte distribution in the keystream. In some broadcast applications, this flaw will cause a ciphertext-only attack with high success rate. Besides, there are also many security flaws in other parts of the cipher. We point out these flaws one by one and develop a divide-and-conquer attack to recover the secret keys from O(2^26)-byte known plaintext with success rate 93.4597% and complexity O(2^113), which is much lower than 2^512, the complexity of exhaustive search.展开更多
文摘According to the issues that the predict errors of chaotic sequences rapidly accumulated in multi-step forecasting which affects the predict accuracy, we proposed a new predict algorithm based on local modeling with variable frame length and interpolation points. The core idea is that, using interpolation method to increase the available sample data, then modeling the chaos dynamics system with least square algorithm which based on the Bernstein polynomial to realize the forecasting. We use the local modeling method, looking for the optimum frame length and interpolation points in every frame to improve the predict peformance. The experimental results show that the proposed algorithm can improve the predictive ability effectively, decreasing the accumulation of iterative errors in multi-step prediction.
文摘We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit).
基金This work was supported by the NEW Laboratory Funding under Grant No.w090403.
文摘A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective. The distribution characteristics of the novel chaotic sequence are comparable to that of the standard normal distribution. Its mean and variance can be changed to the desired values. The novel sequences have also good randomness. The applications for radar mask jamming are analyzed.
文摘Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high.
基金supported by the National Natural Science Foundation of China (Grant No. 61672124)the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund,China (Grant No. MMJJ20170203)+3 种基金the Liaoning Provincial Science and Technology Innovation Leading Talents Program Project,China (Grant No. XLYC1802013)the Key Research and Development Projects of Liaoning Province,China (Grant No. 2019020105-JH2/103)the Jinan City ‘20 universities’ Funding Projects Introducing Innovation Team Program,China (Grant No. 2019GXRC031)the “Double First-rate”Construction Project (“Innovation Project”),China (Grant No. SSCXXM013)。
文摘The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic system as an encryption key. Specifically, in the image scrambling stage, the algorithm primarily uses an improved baker transform method to process the image. In the image diffusion stage, the algorithm first uses the chaotic S-box method to process the encryption key. Secondly, an exclusive OR(XOR) operation is performed on the image and the encryption key to initially diffuse the image. Finally, the image is again diffused using the method of ortho XOR. Simulation analysis shows that the algorithm can achieve good encryption effect, simple and easy implementation, and good security. In the digital image communication transmission, it has good practical value.
基金the National Natural Science Foundation of China (60572075)the Natural Science Researching Project for Jiangsu Universities (05KJD510177).
文摘It is well known that the periodic performance of spread spectrum sequence heavily affects the correlative and secure characteristics of communication systems. The chaotic binary sequence is paid more and more attention since it is one kind of applicable spread spectrum sequences. However, there are unavoidable short cyclic problems for chaotic binary sequences in finite precision. The chaotic binary sequence generating methods are studied first. Then the short cyclic behavior of the chaotic sequences is analyzed in detail, which are generated by quantification approaches with finite word-length. At the same time, a chaotic similar function is defined for presenting the cyclic characteristics of the sequences. Based on these efforts, an improved method with scrambling control for generating chaotic binary sequences is proposed. To quantitatively describe the improvement of periodic performance of the sequences, an orthogonal estimator is also defined. Some simulating results are provided. From the theoretical deduction and the experimental results, it is concluded that the proposed method can effectively increase the period and raise the complexity of the chaotic sequences to some extent.
基金This project was supported by the National Defense Key Laboratory Foundation (99JS04.8.1. DZ02 24).
文摘A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for the performance of QS-CDMA system with RAKE receiver. The performance of the system is analyzed when the hybrid chaotic sequences are used as spreading codes in a QS-CDMA system with RAKE receiver and compared with those obtained for m-se-quences and logistic sequences. The results show that the hybrid chaotic sequences are a class of very promising spreading codes for QS-CDMA system.
基金National Natural Science Foundation of China(No.61471325)
文摘This paper introduces two kinds of sequences used in spread spectrum communication system: pseudo-noise (PN) se-quence generated by linear feedback shift register(LFSR), such as m-sequence and Gold sequence, and the chaotic sequence generated by the determination of the nonlinear system. The characteristics of PN sequence and chaotic sequence are analyzed by simulation, and the advantages and disadvantages of different sequences in spread spectrum communication system are ob-tained. The advantages of sequence can be used to improve signal transmission in a spread spectrum communication system.
文摘This paper introduces a switched hyperchaotic system that changes its behavior randomly from one subsystem to another via two switch functions, and its characteristics of symmetry, dissipation, equilibrium, bifurcation diagram, basic dynamics have been analyzed. The hardware implementation of the system is based on Field Programmable Gate Array (FPGA). It is shown that the experimental results are identical with numerical simulations, and the chaotic trajectories are much more complex.
基金Support by the National Natural Science Foundation of China(No.61801173)。
文摘With good randomness and high sensitivity to initial values,chaotic sequences have been extensively used in secure communication.Real chaotic sequences are highly sensitive to initial values.It is an analog quantity in the domain of attraction,which is not conducive to the transmission of digital signals.In order to improve the stability,real chaotic sequences can be quantized into digital chaotic sequences.According to the relationship between the information rate and the symbol rate,the symbol rate of binary sequence is the same as the information rate.The information rate can be doubled by quantizing a real-valued sequence into a quaternary sequence.The chaotic sequence has weak periodicity.Moreover,the periodicity of binary digital chaotic sequences is much weaker than that of quaternary chaotic sequences.Compared with the multi-dimensional chaotic map,the one-dimensional chaotic map has small key space and low security.In this paper,a new real-valued chaotic sequence is generated based on the chaotic matrix method constructed by Logistic map and Kent map.Two quantization methods are used to digitize the real-valued chaotic sequence to obtain the quaternary digital chaotic sequence.Moreover,the randomness,the time series complexity and the correlation of the new quaternary chaotic sequence are compared and studied.The simulation results demonstrate that the quaternary digital chaotic sequence obtained by the chaotic matrix has good randomness and correlation.
文摘The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high speed integrated circuit hardware description language(VHDL) are described. A valid hazard canceledl method is presented. Computer simulations show that the stable digital sequence waveforms can be produced. The correlations of the digital hybrid chaotic sequences are compared with those of m-sequences. The results show that the correlations of the digital hybrid chaotic sequences are almost as good as those of m-sequences. The works in this paper explored a road for the practical applications of chaos.
文摘In this paper we propose a semi fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by l level discrete wavelet transformation. An approximate wavelet coefficient matrix of the original image and real value chaotic sequences are than used to generate the content based and secure watermark. The watermark is embedded into original image by using HVS. The tamper detection can identify the tampered region of the received watermarked image. Experimental results are given.
文摘We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of human auditory system (HAS), the grayimage isembedded using our watermarking method. Experimental results show that the proposed watermarkingscheme is inaudible and robust against various signal processing such as noising adding, lossycompression, low pass filtering, re-sampling, and re-quantifying.
文摘Short-term hydrothermal scheduling(STHTS) is a non-linear and complex optimization problem with a set of operational hydraulic and thermal constraints. Earlier, this problem has been addressed by several classical techniques; however, due to limitations such as non-linearity and non-convexity in cost curves, artificial intelligence tools based techniques are being used to solve the STHTS problem. In this paper an improved chaotic hybrid differential evolution(ICHDE) algorithm is proposed to find an optimal solution to this problem taking into account practical constraints. A self-adjusted parameter setting is obtained in differential evolution(DE) with the application of chaos theory, and a chaotic hybridized local search mechanism is embedded in DE to effectively prevent it from premature convergence. Furthermore, heuristic constraint handling techniques without any penalty factor setting are adopted to handle the complex hydraulic and thermal constraints. The superiority and effectiveness of the developed methodology are evaluated by its application in two illustrated hydrothermal test systems taken from the literature. The transmission line losses, prohibited discharge zones of hydel plants, and ramp rate limits of thermal plants are also taken into account. The simulation results reveal that the proposed technique is competent to produce an encouraging solution as compared with other recently established evolutionary approaches.
基金supported by the National Natural Science Foundation of China(Grant Nos.51777016,51607013 and 62071142).
文摘Bursting is a diverse and common phenomenon in neuronal activation patterns and it indicates that fast action voltage spiking periods are followed by resting periods.The interspike interval(ISI)is the time between successive action voltage spikes of neuron and it is a key indicator used to characterize the bursting.Recently,a three-dimensional memristive Hindmarsh-Rose(mHR)neuron model was constructed to generate hidden chaotic bursting.However,the properties of the discrete mHR neuron model have not been investigated,yet.In this article,we first construct a discrete mHR neuron model and then acquire different hidden chaotic bursting sequences under four typical sets of parameters.To make these sequences more suitable for the application,we further encode these hidden chaotic sequences using their ISIs and the performance comparative results show that the ISI-encoded chaotic sequences have much more complex chaos properties than the original sequences.In addition,we apply these ISI-encoded chaotic sequences to the application of image encryption.The image encryption scheme has a symmetric key structure and contains plain-text permutation and bidirectional diffusion processes.Experimental results and security analyses prove that it has excellent robustness against various possible attacks.
基金supported by the National Natural Science Foundation of China(Grant Nos.60273027,60373047)the National Grand Fundamental Research 973 Program of China(Grant No.2004CB318004).
文摘In this paper, we analyze the security of a new stream cipher-COSvd(2,128). This cipher was proposed by E. Filiol et al. at the ECRYPT SASC'2004 (The State of the Art of Stream Ciphers). It uses clock-controlled non-linear feedback registers together with an S-box controlled by a chaotic sequence and was claimed to prevent any existing attacks. However, our analysis shows that there are some serious security flaws in the design of the S-box, resulting in heavy biased byte distribution in the keystream. In some broadcast applications, this flaw will cause a ciphertext-only attack with high success rate. Besides, there are also many security flaws in other parts of the cipher. We point out these flaws one by one and develop a divide-and-conquer attack to recover the secret keys from O(2^26)-byte known plaintext with success rate 93.4597% and complexity O(2^113), which is much lower than 2^512, the complexity of exhaustive search.