class='kwd-title'>Keywords: Permutation matrix, '/> Symmetric encryption algorithms using chaotic and non-chaotic generators: A review
首页> 美国卫生研究院文献>Journal of Advanced Research >Symmetric encryption algorithms using chaotic and non-chaotic generators: A review
【2h】

Symmetric encryption algorithms using chaotic and non-chaotic generators: A review

机译:使用混沌和非混沌生成器的对称加密算法:回顾

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

class="kwd-title">Keywords: Permutation matrix, Symmetric encryption, Chess, Chaotic map, Fractals class="head no_bottom_margin" id="idm140333079614048title">AbstractThis paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold’s cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper.
机译:<!-fig ft0-> <!-fig @ position =“ anchor” mode =文章f4-> <!-fig mode =“ anchred” f5-> <!-fig / graphic | fig / alternatives / graphic mode =“ anchored” m1-> class =“ kwd-title”>关键字:置换矩阵,对称加密,国际象棋,混沌地图,分形 class =“ head no_bottom_margin” id =“ idm140333079614048title”>摘要本文总结了27种不同算法的对称图像加密结果,其中包括仅置换,仅置换或两个阶段。这些算法的核心是基于几个离散的混沌图(阿诺德的猫图和三个广义图的组合),一个连续的混沌系统(Lorenz)和两个非混沌的生成器(基于分形和基于象棋的算法)。通过像素(水平,垂直和对角线),差分攻击度量,均方误差(MSE),熵,灵敏度分析和美国国家标准技术研究院(NIST)的15个标准测试之间的相关系数来分析每种算法SP-800-22统计套件。分析的算法包括一组基于非混沌生成器的新图像加密算法,它们仅使用替换(使用分形)和仅使用置换(基于棋)或同时使用这两种方法。此外,提出了两种不同的排列方案,其中排列阶段通过ON / OFF开关与输入图像有或没有关系。从短密钥到长密钥,提供了不同的加密密钥长度和复杂性,以持续进行蛮力攻击。另外,评估了那些不同技术对替代密钥以及置换密钥的输入参数的一位变化的敏感性。最后,针对这项工作与最近的许多研究进行了比较讨论,涉及使用的生成器,加密类型和分析,以突出本文的优势和做出的贡献。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号