首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 328 毫秒
1.
A method to transfer secret information using chaotic dynamical systems is proposed. It is based on modulating a chaotic system with the message such that its time evolution contains the hidden information. Decryption of the cipher is achieved by chaos control. Operation of the scheme is demonstrated by en- and decoding a short german text.  相似文献   

2.
基于物理混沌的混合图像加密系统研究   总被引:1,自引:0,他引:1       下载免费PDF全文
晋建秀  丘水生 《物理学报》2010,59(2):792-800
初步实现了基于物理混沌的混沌和数据加密标准算法级联的混合图像加密系统,基于该系统研究了级联加密与单级加密的抗统计分析能力,以及不可预测性强弱不同的混沌信号在该系统中应用时密文特性的不同.这种利用物理混沌不可预测性的混合加密系统,不存在确定的明文密文映射关系,而且密文统计特性也应优于(或大致相当)其他加密系统.数值结果支持这一结论,同时表明不可预测性较强的混沌系统其加密产生的密文相关性较弱.  相似文献   

3.
双随机相位加密系统的已知明文攻击   总被引:5,自引:0,他引:5       下载免费PDF全文
彭翔  张鹏  位恒政  于斌 《物理学报》2006,55(3):1130-1136
运用密码分析学的方法对双随机相位加密系统进行了初步的安全性分析.研究结果表明,该系统属于线性的对称分组密码系统,线性性质为其安全性留下隐患.在已知明文攻击下,攻击者可通过常规的相位恢复算法获得4-f系统输入平面的随机相位函数密钥,继而可轻易推出频谱平面的随机相位函数密钥,从而攻破此密码系统. 关键词: 光学信息安全 双随机相位加密 密码分析学 已知明文攻击  相似文献   

4.
A new method previously proposed [1] for the encryption of information by means of chaotic mappings is studied in detail. Cryptanalysis by exhaustive key search and correlation analysis of the ciphers are performed. The predictability of the cipher values is estimated. A web application permitting users to exchange text messages encrypted by the new method is described.  相似文献   

5.
The principle of ptychograpby is applied in known plain text attack on the double random phase encoding(DRPE)system.We find that with severai pairs of plain texts and cipher texts,the model of attack on DRPE can be converted to the model of ptychographical imaging.Owing to the inherent merits of the ptychographical imaging,the DRPE system can be breached totally in a fast and neariy perfect way,which is unavailable for currently existing attack methods.Further,since the decryption keys can be seen as an object to be imaged from the perspective of imaging,the ptychographical technique may be a kind of new direction to further analysis of the security of other encryption systems based on double random keys.  相似文献   

6.
Confidentiality is an important issue when digital images are transmitted over public networks, and encryption is the most useful technique employed for this purpose. Image encryption is somehow different from text encryption due to some inherent features of image such as bulk data capacity and high correlation among pixels, which are generally difficult to handle by conventional algorithms. Recently, chaos-based encryption has suggested a new and efficient way to deal with the intractable problems of fast and highly secure image encryption. This paper proposes a novel chaos-based bit-level permutation scheme for secure and efficient image cipher. To overcome the drawbacks of conventional permutation-only type image cipher, the proposed scheme introduced a significant diffusion effect in permutation procedure through a two-stage bit-level shuffling algorithm. The two-stage permutation operations are realized by chaotic sequence sorting algorithm and Arnold Cat map, respectively. Results of various types of analysis are interesting and indicate that the security level of the new scheme is competitive with that of permutation-diffusion type image cipher, while the computational complexity is much lower. Therefore the new scheme is a good candidate for real-time secure image communication applications.  相似文献   

7.
An image encryption system whose cipher code stream only controlled by the secret key, but has nothing to do with the plaintext, is vulnerable to chosen plaintext attacks. Recently, an image encryption scheme using Choquet fuzzy integral and hyper chaotic Lorenz system has been proposed Liu et al. (2013), which employed plaintext-independent cipher code stream, then should be subjected to chosen plaintext attack. This paper cryptanalyzed the aforesaid encryption scheme using chosen plaintext attack, and pointed out that even if possessing good pseudorandom cipher code generation method, the encryption system is still insecure with unreasonable designed encryption scheme.  相似文献   

8.
李恒建  张家树 《中国物理 B》2010,19(4):40505-040505
Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher.  相似文献   

9.
密码芯片运行时的光辐射可泄露其操作和数据的重要特征信息. 基于单光子探测技术, 设计并构建了针对CMOS半导体集成电路芯片光辐射信号的采集、传输、处理和分析的光电实验系统. 以AT89C52单片机作为实验对象, 采用时间相关单光子计数技术, 对不同工作电压下密码芯片的光辐射强度进行了对比, 分析了芯片指令级光辐射信息的操作依赖性和数据依赖性. 此外, 使用示波器对时间相关单光子计数技术在芯片光辐射分析上的可行性进行了验证. 实验结果表明, 采用时间相关单光子计数技术对密码芯片进行光辐射分析, 是一种直接有效的中低等代价光旁路分析攻击手段, 对密码芯片的安全构成了严重的现实威胁.  相似文献   

10.
王兴元  谢旖欣 《中国物理 B》2011,20(8):80504-080504
In this paper,we analyse a new chaos-based cryptosystem with an embedded adaptive arithmetic coder,which was proposed by Li Heng-Jian and Zhang J S (Li H J and Zhang J S 2010 Chin.Phys.B 19 050508).Although this new method has a better compression performance than its original version,it is found that there are some problems with its security and decryption processes.In this paper,it is shown how to obtain a great deal of plain text from the cipher text without prior knowledge of the secret key.After discussing the security and decryption problems of the Li Heng-Jian et al.algorithm,we propose an improved chaos-based cryptosystem with an embedded adaptive arithmetic coder that is more secure.  相似文献   

11.
《Physics letters. A》2006,349(6):467-473
An approach to generate multiple pseudorandom-bit sequences from a single spatiotemporal chaotic system is proposed in this Letter. A coupled map lattice is adopted as a prototype of a spatiotemporal chaotic system. The cryptographic properties of the pseudorandom-bit generator based on the coupled map lattice (CML–MPRBG) are analyzed. It is observed from simulation results that the CML–MPRBG has good cryptographic properties. Basic security analysis of a stream cipher based on the CML–MPRBG is also discussed. The results show that the CML–MPRBG can be a good candidate for constructing a secure cipher.  相似文献   

12.
An image-encrypted joint transform correlator for pattern recognition is proposed and evaluated. The correlator performs twofold correlation for recognizing the primary image and cipher, and the encrypting cipher acts to enhance or inhibit the correlation peak if the cipher is correctly input. By incorporating the original image with an appropriate cipher, the correlator achieves better pattern discrimination and is robust against distortion. Simulation results show that the pixel number and the cell size of cipher affect the characteristics of the correlator.  相似文献   

13.
王红胜  徐子言  张阳  陈开颜  李宝晨  吴令安 《物理学报》2016,65(11):118901-118901
通过研究密码芯片运行时的光辐射迹及其数据依赖性, 建立了操作数汉明重量与泄漏光子数的对应关系, 提出了一种简单有效的针对高级加密标准(AES)加密算法的密码芯片光辐射分析方法. 根据密码芯片运行时的光泄漏特性, 利用时间相关单光子计数技术搭建了光辐射分析攻击实验平台, 在AES加密算法执行第一次的轮密钥加操作后和字节替换操作后分别进行光泄露信号采集, 对基于操作数Hamming weight和AES密码芯片泄漏光子数对应关系的密钥分析攻击方法的有效性进行了实验验证, 通过选择几组明文成功地破解了AES加密算法的密钥. 实验结果表明, 当密码芯片的泄露光子数与操作数的汉明重量呈近似线性关系时, 该种光辐射密钥分析攻击方法对AES密码芯片的安全性构成了严重的威胁.  相似文献   

14.
With increasing utilization of digital multimedia and the Internet, protection on this digital information from cracks has become a hot topic in the communication field. As a path for protecting digital visual information, image encryption plays a crucial role in modern society. In this paper, a novel six-dimensional (6D) hyper-chaotic encryption scheme with three-dimensional (3D) transformed Zigzag diffusion and RNA operation (HCZRNA) is proposed for color images. For this HCZRNA scheme, four phases are included. First, three pseudo-random matrices are generated from the 6D hyper-chaotic system. Second, plaintext color image would be permuted by using the first pseudo-random matrix to convert to an initial cipher image. Third, the initial cipher image is placed on cube for 3D transformed Zigzag diffusion using the second pseudo-random matrix. Finally, the diffused image is converted to RNA codons array and updated through RNA codons tables, which are generated by codons and the third pseudo-random matrix. After four phases, a cipher image is obtained, and the experimental results show that HCZRNA has high resistance against well-known attacks and it is superior to other schemes.  相似文献   

15.
Molotkov  S. N. 《JETP Letters》2023,117(1):75-82
JETP Letters - An invariant measure of the closeness of a block cipher to the perfect (ideal) cipher of the one-time pad has been proposed. The measure is the same for any implementation of the...  相似文献   

16.
肖宁  李爱军 《应用光学》2017,38(3):406-414
为了实现对红外图像的选择性加密,提出了基于多特征差异检测与联合控制映射的红外图像选择算法。引入分段正弦变换,将输出图像分割为3个不同的区域,对每个区域完成不同的拉伸变换,完成初始红外图像的增强,凸显真实红外目标;再利用增强图像中目标与背景的灰度差异,从而设计目标决策因子,并分割Top-Hat变换的结构元素,构建红外背景抑制机制,过滤杂波与噪声;利用灰度水平、对比度与相似度,建立多特征差异检测模型,提取包含真实目标与可疑目标的感兴趣区域;以Logistic映射为控制条件,综合Tent映射与Chebyshev映射,设计联合控制混沌映射,利用其输出的混合随机序列对感兴趣区域进行置乱;引入引力模型,对混淆的感兴趣区域内的像素进行扩散,完成红外目标选择加密。实验结果显示:与已有的图像局部加密机制相比,该文算法输出密文信息熵值达到了7.982 6,能够更好地用于红外图像局部选择性加密。  相似文献   

17.
On the security of a class of discrete-time chaotic cryptosystems   总被引:1,自引:0,他引:1  
Ercan Solak 《Physics letters. A》2004,320(5-6):389-395
In this Letter we analyze the security of some recently proposed chaotic cryptosystems and give methods to break the cipher to reveal the encrypted information. The method exploits the dependencies between the parameters and the output sequence of a dynamical system to reveal the secretly shared system parameters. For each encryption scheme a known plaintext attack and a ciphertext only attack are given.  相似文献   

18.
Yiqing Gao  Yiwen Ou 《Optik》2010,121(19):1756-1760
In this paper, twin-object-beam electronic speckle interferometry is used to study the longitudinal corrosion of carbon steel. The displacement expression of this technique is deduced and optical fibers are used to reduce the influence of the optical system and improve the quality of speckle pattern. Twin-object-beam electronic speckle interferometry cannot only quantitatively cipher out off-plane displacement as a result of corrosion, but also estimate the change of corrosion speed.  相似文献   

19.
This issue is a collection of contributions on recent developments and achievements of cryptography and communications using chaos. The various contributions report important and promising results such as synchronization of networks and data transmissions; image cipher; optical and TDMA communications, quantum keys etc. Various experiments and applications such as FPGA, smartphone cipher, semiconductor lasers etc, are also included.  相似文献   

20.
In this paper,a compressive sensing(CS) and chaotic map-based joint image encryption and watermarking algorithm is proposed.The transform domain coefficients of the original image are scrambled by Arnold map firstly.Then the watermark is adhered to the scrambled data.By compressive sensing,a set of watermarked measurements is obtained as the watermarked cipher image.In this algorithm,watermark embedding and data compression can be performed without knowing the original image;similarly,watermark extraction will not interfere with decryption.Due to the characteristics of CS,this algorithm features compressible cipher image size,flexible watermark capacity,and lossless watermark extraction from the compressed cipher image as well as robustness against packet loss.Simulation results and analyses show that the algorithm achieves good performance in the sense of security,watermark capacity,extraction accuracy,reconstruction,robustness,etc.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号