期刊文献+

一种基于复合混沌序列的图像加密算法安全分析 被引量:6

Security analysis of compound chaotic sequence-based image encryption algorithm
下载PDF
导出
摘要 针对一种基于复合混沌序列的图像加密算法进行了安全分析,该加密算法采用置换—正向扩散—逆向扩散三级加密,由于正向扩散和逆向扩散采用了相同的一维扩散序列,可将正向扩散和逆向扩散两级加密简化为一级扩散加密,进而将置换—正向扩散—逆向扩散三级加密简化为置换—扩散两级加密;此外,该加密算法生成的混沌序列与明文、密文图像无关,可根据选择明文攻击获取其对应的等效扩散密钥和等效置换密钥。理论分析与数值仿真实验结果表明了该分析方法的有效性;针对原加密算法存在的安全漏洞,提出了若干改进建议以提高其安全性能。 This paper analyzed the security of an image encryption algorithm based on compound chaotic sequence,the proposed algorithm adopted three-level encryption structure of permutation-forward diffusion-reverse diffusion.Due to the forward diffusion and the reverse diffusion used the same one-dimensional diffusion sequence,therefore,this paper simplified the two-level encryption structure of the forward diffusion and reverse diffusion to one-level diffusion encryption structure,further,simplified the three-level encryption structure of permutation-forward diffusion-reverse diffusion to two-level encryption structure of permutation and diffusion.Moreover,the chaotic sequences generated by the encryption algorithm were independent of the plaintext images or ciphertext images,consequently,it could crack the corresponding equivalent diffusion keys and equivalent permutation keys by chosen-plaintext attack.Theoretical analysis and numerical simulation experiment results verify the effectiveness of the analytical method.Finally,this paper proposed some improved suggestions for the original encryption algorithm to promote the security.
作者 胡迎春 禹思敏 Hu Yingchun;Yu Simin(School of Automation,Guangdong University of Technology,Guangzhou 510006,China)
出处 《计算机应用研究》 CSCD 北大核心 2021年第6期1849-1854,1864,共7页 Application Research of Computers
基金 国家自然科学基金资助项目(61532020,61671161)。
关键词 图像混沌加密 混沌映射 选择明文攻击 等效密钥 image chaotic encryption chaotic mapping chosen-plaintext attack equivalent secret keys
  • 相关文献

参考文献4

二级参考文献35

  • 1张雪锋,范九伦.一种改进的基于混沌系统的数字图像加密算法[J].计算机应用研究,2007,24(4):184-186. 被引量:13
  • 2El-Latif A A,Li Li, Niu Xiamu. A new image encryption scheme}>ased on ryrlic elliptic curve and chaotic system [ J ]. MultimediaTools and Applications,2014,70(3) :1559-1584.
  • 3Huang Xiaoling, Ye Gmxlong. An image encryption algorithm based onhyper-chaos ami DNA sequence [ J ]. Multimedia Tools and Appli-cations ,2014,72 ( 1) :57-70.
  • 4Li Shanshan,Zhao Yinghai, Qu Bayi,et al. Image scrambling basedon chaotic sequences and Vegin^re cipher [ J ]. Multimedia Toolsand Applications,2013,66(3) :573-588.
  • 5Norouzi B,Mirzakuchaki S, Seyedzadeh S M, ef al. A simple sensi-tive and secure image encryption algorithm based on hyper-chaoticsystem with only one round diffusion [ J ]. Multimedia Tools and Ap-plications,2014,71 (3) :1469-1497.
  • 6Wong K W,Kwok B, Law W. A fast image encryption scheme basedon chaotic standard map [ J] . Physics Letters A, 2008,372 .15):2645-2652.
  • 7Xiao Di,Shih F Y . Using the self-synchronizing method to improvesecurity of the multi chaotic systems-based image encryption[ J]. Op-tics Communications,2010,283(15) :3030-3036.
  • 8Zhang Yushu,Xiao Di . Double optical image encryption using dis-crete Chirikov standard map and chaos-based fractional random trans-form[J]. Optics and Lasers in Engineering,2013,51 (4):472-480.
  • 9Zhang Yushu,Xiao Di, Shu Yonlu, et al. A novel image encryptionscheme based on a linear hyperbolic chaotic system o. partial differen-tial equations [ J ]. Signal Processing: Image Communication,2013,28(3) :292-300.
  • 10Zhang Yushu, Xiao Di, Wen Wenying, et al. Cryptanalyzing a novelimage cipher based on mixed transformed logistic maps[ J]. Mllltirne-dia Tools and Applications,2014,73(3) ; 1885-1896.

共引文献30

同被引文献51

引证文献6

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部