S-Box Design and Image Encryption Based on Hyperchaos.pdf_第1頁
已閱讀1頁,還剩90頁未讀 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、In today's world, there is an ever increasing need for new techniques of maintaining and protecting privacy and integrity of information of mass communication and private information.Chaos theory and cryptography overlap

2、 some features which can lead to developing secure chaos-based cryptosystem for secure communication of texts and images.Some of the basic features of chaotic systems such as sensitivity to initial conditions,ergodicity,

3、 and pseudorandom behavior, fulfill the analogous requirements for a good cryptosystem.
  This thesis focuses on the chaos theory, chaotic systems and its types, design of cryptographically strong S-boxes based on hyp

4、erchaotic system and image encryption based on the hyperchaotic system.The proposed research work conducted in two parts based on hyperchaos.
  The first part contains a design of cryptographically strong S-box via th

5、e 4D hyperchaotic multi-wing system.At a fundamental level, the security of symmetric key cryptosystems ties back to Shannon's properties of diffusion and confusion.In constructions of a symmetric key cryptosystem, diffu

6、sion and confusion are commonly realized with the application of linear and nonlinear operations, respectively.The Substitution boxes (S-boxes) are the only nonlinear part in a Substitution-Permutation cryptosystem.Witho

7、ut these nonlinear components, the adversaries would easily compromise the system.Therefore, S-box plays an imperative role in designing a cryptographically strong block cipher.Designing S-box based on chaos has attracte

8、d lots of attentions because of its distinct characteristics relevant to cryptography.In the proposed work, a batch generation of cryptographically strong S-boxes based on the 4-D 4-wing hyperchaotic system is presented.

9、The sophisticated nonlinear behaviors of suggested hyperchaotic system are used to generate two pseudorandom 8-bit integer sequence, which further drives iterative two-position swap on the identical map on GF(28).Accordi

10、ng to the indicator of typical evaluation criteria including nonlinearity,differential uniformity, SAC, output bits independence criterion and bijective property, the preferred S-box is obtained from all those patch-gene

11、rated ones.The comparison with the state-of-the-art chaos-based schemes shows that the obtained S-box achieves better cryptographical performance.
  Secondly, the presented work focuses on permutation-substitution ima

12、ge encryption based on 4D four-wing hyperchaotic system.In the field of cryptography, a huge research is undergoing on image ciphering to assure security vulnerabilities in confidential images.Multi-dimensional Hyperchao

13、s is emerging area to enhance the security requirement in realtime image encryption instead of the one-dimensional chaotic system due to large key space and complex unpredictable nature.A 4D 4-wing hyperchaotic system is

14、 employed to encrypt an image with two independent core procedures i.e.permutation and substitution.A permutation is executed in both column-wise and row-wise by permutation index matrix to spread the influence of a sing

15、le pixel over others.Moreover, the permuted image is completely confused twice in substitution process.Firstly, each previous ciphered pixel value is XORed with next plain image pixel in the forward direction.Secondly, a

16、 key image is produced from a cryptographically strong S-box based on the 4D 4-wing hyperchaotic system.A key image is used for pixel by pixel masking to complete the encryption process.The proposed method is simple, eas

17、y to implement, with large key space and capable of encrypting different type of grayscale images with perfect scrambling nature.Histogram analysis, correlation of adjacent pixels analysis, information entropy analysis,

18、key space analysis, key sensitivity analysis, NPCR, and UACI analysis quantify the security level and efficiency of the suggested method.Security analysis shows that the proposed algorithm has high security and abilities

19、 to resist statistical attacks, brute-force attacks and differential attacks, which provides enough security for real-time image encryption and transmission.
  Finally, the whole conclusion is drawn, and the further d

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論