首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this article, we have presented an innovative formulation of nonlinear element of block cipher. The suggested construction is chaos based, where we used a Duffing chaotic system. We have investigated various characteristics of our proposed nonlinear component. The outcomes of the investigation validate that the designed cryptosystem is consistent for secure communication.  相似文献   

2.
A new image alternate encryption algorithm based on chaotic map   总被引:1,自引:0,他引:1  
In this paper, a new image alternative encryption algorithm is proposed, in which the shuffling and diffusion are performed simultaneously. The plain image is divided into two left and right blocks of same size. The matrix which is generated by a logistic map is used to diffuse the left block of the plain image. Then, the diffused image is used as the right block of the cipher image. The 0, 1 sequence which comes from another logistic chaotic sequence and plaintext is used to shuffle the right block of the cipher image. After the operation XOR, the left block of cipher image is generated. Finally, two new-generated blocks are merged into the cipher image. In order to get better effect for image encryption, this process can be repeated many rounds. The simulation results show that this algorithm has properties of big key space, high sensitivity to key, resisting statistical analysis, differential attacks, plaintext attacks, and chosen-plaintext attacks. So, it has high security and can be suitable for image encryption.  相似文献   

3.
In recent years, a growing number of discrete chaotic cryptographic algorithms have been proposed. However, most of them encounter some problems such as the lack of robustness and security. In this paper, a new encryption algorithm is proposed, which encrypts the plaintext based on alternant of the stream cipher and block cipher. A pseudo-random number is used to control which encryption mode is chosen. Using this algorithm, multiple kinds of files (such as TXT, DOC, WMA, and JPEG) are encrypted and decrypted, and the security of the proposed cryptosystem is analyzed. The results show that the security of the cryptosystem is intensified and the proposed algorithm can resist differential attacks.  相似文献   

4.
Recently, an image scrambling scheme based on chaos theory and Vigenère cipher was proposed. The scrambling process is firstly to shift each pixel by sorting a chaotic sequence as Vigenère cipher, and then the pixel positions are shuffled by sorting another chaotic sequence. In this study, we analyze the security weakness of this scheme. By applying the combination of chosen-plaintext attack and differential attack, we propose two efficient cryptanalysis methods. Results show that all the keystream can be revealed. The original image scrambling scheme can be remedied by leveraging the MD5 hash value of the plain image as the initial condition of the chaotic system.  相似文献   

5.
A substitution box is used to induce nonlinearity in plaintext for encryption systems. Recently, the application of chaotic maps to encryption applications has resulted in some interesting nonlinear transformations. In this paper, we propose an efficient method to design nonlinear components for block ciphers that are based on TD-ERCS chaotic sequence. The new substitution box is analyzed for nonlinearity, bit independence, strict avalanche criterion, generalized majority logic criterion, and differential and linear approximation probabilities. The results show high resistance to differential and linear cryptanalysis in comparison to some recently proposed chaotic substitution boxes.  相似文献   

6.
In this paper, we synthesize substitution boxes by the use of chaotic logistic maps in linear fractional transformation. In order to introduce randomness in the construction of S-boxes, the data from the chaotic system is used in linear fractional transformation to add additional unpredictable behavior. The proposed S-box is tested for its strength in encryption applications. The nonlinearity characteristic of the proposed S-box is studied, and the strength of the cipher is quantized in terms of this property. In addition, the behavior of bit changes at the output of the cipher in comparison with the input is also studied. Similarly, the input/output differential is also evaluated for different bit patterns. The results of statistical analyses show superior performance of the proposed S-boxes.  相似文献   

7.
In this paper, a secure image transmission scheme based on synchronization of fractional-order discrete-time hyperchaotic systems is proposed. In this scheme, a fractional-order modified-Hénon map is considered as a transmitter, the system parameters and fractional orders are considered as secret keys. As a receiver, a step-by-step delayed observer is used, and based on this one, an exact synchronization is established. To make the transmission scheme secure, an encryption function is used to cipher the original information using a key stream obtained from the chaotic map sequences. Moreover, to further enhance the scheme security, the ciphered information is inserted by inclusion method in the chaotic map dynamics. The first contribution of this paper is to propose new results on the observability and the observability matching condition of nonlinear discrete-time fractional-order systems. To the best of our knowledge, these features have not been addressed in the literature. In the second contribution, the design of delayed discrete observer, based on fractional-order discrete-time hyperchaotic system, is proposed. The feasibility of this realization is demonstrated. Finally, different analysis are introduced to test the proposed scheme security. Simulation results are presented to highlight the performances of our method. These results show that, our scheme can resist different kinds of attacks and it exhibits good performance.  相似文献   

8.
A novel and efficient image encryption algorithm based on chaos and multiple S-boxes is proposed in this paper, in which a set of S-boxes is initially constructed using a chaotic system, and each of the S-boxes is considered as a circular sequence with a head pointer. For each image pixel, an S-box is chosen from the set of S-boxes and used to substitute for the plain pixel to get a cipher pixel, and then the chosen S-box is updated by moving its head pointer forward according to the cipher pixel and a random number. In order to increase the plaintext sensitivity of encryption, the substitution processes are performed in forward direction and backward direction, respectively. This scheme not only offers the high security by employing two directional substitutions and using the different S-boxes for each pixel but also achieves high encryption speed by constructing only a few S-boxes and updating the S-box dynamically and easily. The performance of the proposed algorithm is evaluated using a variety of analysis. Experimental results show that the proposed image encryption algorithm is secure and efficient.  相似文献   

9.
Yan  Fabao  Shen  Yupeng  Zou  Tao  Wu  Zhao  Su  Yanrui 《Nonlinear dynamics》2023,111(10):9607-9628

Based on block compressed sensing theory, combined with a five-dimensional chaotic system, we propose and analyze a novel spectrogram visual security encryption algorithm. This research is devoted to solving the compression, encryption and steganography problems of spectrograms involving large data volumes and high complexity. First, the discrete wavelet transform is applied to the spectrogram to generate the coefficient matrix. Then, block compressed sensing is applied to compress and preencrypt the spectrogram. Second, we design a new five-dimensional chaotic system. Then, several typical evaluation methods, such as the phase diagram, Lyapunov exponent, bifurcation diagram and sample entropy, are applied to deeply analyze the chaotic behavior and dynamic performance of the system. Moreover, the corresponding Simulink model has been built, which proves the realizability of the chaotic system. Importantly, the measurement matrix required for compressed sensing is constructed by the chaotic sequence. Third, dynamic Josephus scrambling and annular diffusion are performed on the secret image to obtain the cipher image. Finally, an improved least significant bit embedding method and alpha channel synchronous embedding are designed to obtain a steganographic image with visual security properties. To make the initial keys of each image completely different from other images, the required keys are produced using the SHA-256 algorithm. The experimental results confirm that the visual security cryptosystem designed in this study has better compression performance, visual security and reconstruction quality. Furthermore, it is able to effectively defend against a variety of conventional attack methods, such as statistical attacks and entropy attacks.

  相似文献   

10.
Liu  Zhuo  Wang  Yong  Zhao  Yi  Zhang  Leo Yu 《Nonlinear dynamics》2020,101(2):1383-1396
Nonlinear Dynamics - The two-dimensional coupled map lattice (2D CML) is a spatiotemporal chaotic model with complex dynamic behavior and has high potential for designing stream cipher. We...  相似文献   

11.
In this article, we present a method to synthesize strong nonlinear components used in encryption algorithms. The proposed nonlinear component assists in transforming the intelligible message or plaintext into an enciphered format by the use of Lorenz and Rössler chaotic systems. A substitution box is generated that uses initial conditions, utilize multi-chaotic parameter values, and employ numerical simulations.  相似文献   

12.
This paper proposes the chaos control and the modified projective synchronization methods for unknown heavy symmetric chaotic gyroscope systems via Gaussian radial basis adaptive backstepping control. Because of the nonlinear terms of the gyroscope system, the system exhibits chaotic motions. Occasionally, the extreme sensitivity to initial states in a system operating in chaotic mode can be very destructive to the system because of unpredictable behavior. In order to improve the performance of a dynamic system or avoid the chaotic phenomena, it is necessary to control a chaotic system with a regular or periodic motion beneficial for working with a particular condition. As chaotic signals are usually broadband and noise-like, synchronized chaotic systems can be used as cipher generators for secure communication. Obviously, the importance of obtaining these objectives is specified when the dynamics of gyroscope system are unknown. In this paper, using the neural backstepping control technique, control laws are established which guarantees the chaos control and the modified projective synchronization of unknown chaotic gyroscope system. In the neural backstepping control, Gaussian radial basis functions are utilized to on-line estimate the system dynamic functions. Also, the adaptation laws of the on-line estimators are derived in the sense of Lyapunov function. Thus, the unknown chaotic gyroscope system can be guaranteed to be asymptotically stable. Also, the control objectives have been achieved.  相似文献   

13.
Two simple autonomous chaotic electronic circuits have been proposed in this paper. The core of each of the circuits consists of a single amplifier biquad (SAB). We have proposed two configurations of converting this SAB into chaotic oscillators using suitable passive nonlinear element and a storage element in the form of an inductor. The mathematical models of the proposed chaotic circuits have been constructed, which are fourth order autonomous nonlinear differential equations. The behavior of the proposed circuits has been investigated through numerical simulations, Spice-based circuit simulations and electronic hardware experiments and they agree well with each other. It has been found that both the circuits show complex behaviors like bifurcations and chaos for a certain range of circuit parameters.  相似文献   

14.
The paper deals with the subharmonic response of a shallow cable due to time variations of the chord length of the equilibrium suspension, caused by time varying support point motions. Initially, the capability of a simple nonlinear two-degree-of-freedom model for the prediction of chaotic and stochastic subharmonic response is demonstrated upon comparison with a more involved model based on a spatial finite difference discretization of the full nonlinear partial differential equations of the cable. Since the stochastic response quantities are obtained by Monte Carlo simulation, which is extremely time-consuming for the finite difference model, most of the results are next based on the reduced model. Under harmonical varying support point motions the stable subharmonic motion consists of a harmonically varying component in the equilibrium plane and a large subharmonic out-of-plane component, producing a trajectory at the mid-point of shape as an infinity sign. However, when the harmonical variation of the chordwise elongation is replaced by a narrow-banded Gaussian excitation with the same standard deviation and a centre frequency equal to the circular frequency of the harmonic excitation, the slowly varying phase of the excitation implies that the phase difference between the in-plane and out-of-plane displacement components is not locked at a fixed value. In turn this implies that the trajectory of the displacement components is slowly rotating around the chord line. Hence, a large subharmonic response component is also present in the static equilibrium plane. Further, the time variation of the envelope process of the narrow-banded chordwise elongation process tends to enhance chaotic behaviour of the subharmonic response, which is detectable via extreme sensitivity on the initial conditions, or via the sign of a numerical calculated Lyapunov exponent. These effects have been further investigated based on periodic varying chord elongations with the same frequency and standard deviation as the harmonic excitation, for which the amplitude varies in a well-defined way between two levels within each period. Depending on the relative magnitude of the high and low amplitude phase and their relative duration the onset of chaotic vibrations has been verified.  相似文献   

15.
In this paper, we present a new pseudospectral method application for solving nonlinear initial value problems (IVPs) with chaotic properties. The proposed method, called the multistage spectral relaxation method (MSRM) is based on a novel technique of extending Gauss–Siedel type relaxation ideas to systems of nonlinear differential equations and using the Chebyshev pseudo-spectral methods to solve the resulting system on a sequence of multiple intervals. In this new application, the MSRM is used to solve famous chaotic systems such as the such as Lorenz, Chen, Liu, Rikitake, Rössler, Genesio–Tesi, and Arneodo–Coullet chaotic systems. The accuracy and validity of the proposed method is tested against Runge–Kutta and Adams–Bashforth–Moulton based methods. The numerical results indicate that the MSRM is an accurate, efficient, and reliable method for solving very complex IVPs with chaotic behavior.  相似文献   

16.
Peng  Mingshu  Yi  Xiaoyu  Cheng  Ranran 《Nonlinear dynamics》2023,111(10):9201-9213

It is an awfully difficult task to design an efficient numerical method for bifurcation diagrams, the graphs of Lyapunov exponents, or the topological entropy about discrete dynamical systems by linear/nonlinear diffusion with the Direchlet/Neumann- boundary conditions. Until now there are less works concerned with such a problem. In this paper, we propose a scheme about bifurcating analysis in a series of discrete-time dynamical systems with linear/nonlinear diffusion terms under the periodic boundary conditions. The complexity of dynamical behaviors caused by the diffusion term are to be determined. Bifurcation diagrams are shown by numerical simulation and chaotic behavior (chaotic Turing patterns) is demonstrated by computing the largest Lyapunov exponent. Our theoretical model can give an interesting case study about the phenomenon: the individuals exhibit a very simple dynamics but the groups with linear/nonlinear coupling can own a complex dynamics including fluctuation, periodicity and even chaotic behavior. We find that diffusion can trigger chaotic behavior in the present system and there exist multiple Turing patterns. It is interesting as regular or chaotic patterns can be reported in this study. Chaotic orbits emerge when exploring further in the diffusion coefficient space, and such a behavior is entirely absent in the corresponding continuous time-space system. The method proposed in the present paper is innovative and the conclusion is novel.

  相似文献   

17.
Because low-dimensional chaotic precision degradation has seriously affected the security of encryption, compound chaotic function is designed. It is based on two new one-dimensional chaotic functions. By the definition of Devaney chaotic, the properties of compound chaotic functions are rigidly proved. Based on the compound chaotic function and linear feedback shift register (LFSR), a new pseudo-random sequence generator is designed to generate a more random sequence and expand the key space. The properties of compound chaotic functions and LFSR are also established. In the scheme, a dynamic block division of the 3D baker and dynamical perturbation are illustrated using the compound chaotic map to derive the confusion image. The new pseudo-random sequence generator expands the key space and improves the security of image encryption scheme. The results of entropy analysis, difference analysis, weak-key analysis, statistical analysis, cipher random analysis, and cipher sensitivity analysis show that the encryption scheme has a better security. Compared with traditional encryption scheme and one-dimensional logistic chaotic map, the new image encryption scheme has a better performance in speed, complexity, and security. This paper illustrates how to solve the problem of short periods and low precision of one-dimensional chaotic function by perturbation and LFSR together.  相似文献   

18.
A substitution box (S-box) plays a central role in cryptographic algorithms. In this paper, an efficient method for designing S-boxes based on chaotic maps is proposed. The proposed method is based on the NCA (nonlinear chaotic algorithm) chaotic maps. The S-box so constructed has very optimal nonlinearity, bit independence criterion (BIC), strict avalanche criterion (SAC), differential and linear approximation probabilities. The proposed S-box is more secure against differential and linear cryptanalysis compared to recently proposed chaotic S-boxes.  相似文献   

19.
In this work, one of the most simple chaotic autonomous circuits, which has been reported in the literature, is presented. The proposed circuit, that belongs to jerk systems family, is described mathematically by a 3-D dynamical system with only five terms, and it has only one nonlinear term, which is the hyperbolic sine term implemented with two antiparallel diodes. This new jerk system presents interesting chaotic phenomena, such as coexisting attractors and antimonotonicity. Also, as an application of the proposed system a sound encryption scheme that is based on a random number generator, which is implemented with the jerk system, is presented. The practical usefulness of the proposed simple chaotic jerk circuit is confirmed from the results of NIST-800-22 tests of the chaotic random number generator, as well as from the successful sound encryption and decryption process.  相似文献   

20.
We develop an experimental system for secure communication with nonlinear mixing of information signal and chaotic signal of a time-delay system. The proposed scheme is based on programmable microcontrollers with digital transmission line. The scheme allows one to transmit and receive speech and musical signals in real time without noticeable distortion. A high quality of extraction of hidden information signal is achieved due to the use of digital elements in the scheme, which ensures identity of the parameters and high stability to noise. We study a possibility of hidden message extraction from a chaotic carrier by a third party in the case of mismatch of the receiver and transmitter parameters.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号