A substitution box (S-box) plays an important role in cryptographic algorithms.The design of S-box using chaotic systems has attracted a great deal of attention in recent years.A new method for obtaining cryptographic...A substitution box (S-box) plays an important role in cryptographic algorithms.The design of S-box using chaotic systems has attracted a great deal of attention in recent years.A new method for obtaining cryptographically strong S-boxes based on spatiotemporal chaotic system is proposed in this paper.The discretized Baker map and affine transformation are used orderly by an algorithm to shuffle the table generated by the spatiotemporal chaotic system.The cryptographical properties of these S-boxes such as bijection,nonlinearity,strict avalanche,output bits independence and equiprobable input /output XOR distribution are analyzed.The results of numerical analysis show that the S-box designed by this method can against several attacks and all the criteria for designing good S-box can be satisfied approximately.More strong S-boxes can be obtained by this method with the change of the original conditions or control parameters of the spatiotemporal chaos system.Furthermore,our approach is suitable for practical application in designing cryptosystem.展开更多
This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels o...This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency.展开更多
基金Sponsored by the National Natural Science Foundation of China(Grant No.61074192)the Beijing Natural Science Foundation(Grant No.4092040)the Natural Science Research of Henan Province Education Department(Grant No.2011B110002)
文摘A substitution box (S-box) plays an important role in cryptographic algorithms.The design of S-box using chaotic systems has attracted a great deal of attention in recent years.A new method for obtaining cryptographically strong S-boxes based on spatiotemporal chaotic system is proposed in this paper.The discretized Baker map and affine transformation are used orderly by an algorithm to shuffle the table generated by the spatiotemporal chaotic system.The cryptographical properties of these S-boxes such as bijection,nonlinearity,strict avalanche,output bits independence and equiprobable input /output XOR distribution are analyzed.The results of numerical analysis show that the S-box designed by this method can against several attacks and all the criteria for designing good S-box can be satisfied approximately.More strong S-boxes can be obtained by this method with the change of the original conditions or control parameters of the spatiotemporal chaos system.Furthermore,our approach is suitable for practical application in designing cryptosystem.
基金supported by the National Natural Science Foundation of China (Grant Nos. 61001099 and 10971120)the Foundation for the Author of National Excellent Doctoral Dissertation of China (Grant No. 200444)
文摘This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency.