Chaotic encryption algorithm based on control word

被引:0
|
作者
Zhang, Li [1 ]
Zhang, Liyong [2 ]
Yang, Chang [2 ]
Sun, Cao [2 ]
机构
[1] School of Information Sci. and Technol., Liaoning University, Shenyang 110036, China
[2] School of Electr. and Inf. Eng., Dalian Univ. of Technol., Dalian 116023, China
来源
关键词
Chaotic systems;
D O I
暂无
中图分类号
N94 [系统科学]; C94 [];
学科分类号
0711 ; 081103 ; 1201 ;
摘要
In order to solve the problem of short period in chaotic maps, a chaotic encryption algorithm based on control word is presented. The control word switches the sequence which is actually used to encrypt. It also determines how to get some information from one of the sequences. The information combined with the value of pixel is used to be the input of the hash function SHA-1, and the output of SHA-1 acts as the disturbance to the two-dimensional maps. The control word also determines which sequence should be disturbed. The analysis of security and the experiment results show that the algorithm can improve the ability to fight against the attack and contribute to encrypting. © 2008 Binary Information Press December 2008.
引用
收藏
页码:2529 / 2536
相关论文
共 50 条
  • [1] Encryption algorithm based on chaotic sequences
    Guan, Chun-Yang
    Gao, Fei
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2003, 23 (03): : 363 - 366
  • [2] A watermarking algorithm based on chaotic encryption
    Xiao, WW
    Zhen, J
    Zhang, JH
    Wu, WY
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 545 - 548
  • [3] New chaotic encryption algorithm based on ergodicity
    School of Electronic and Information Engineering, Dalian University of Technology, Dalian 116024, China
    Jisuan Wuli, 2006, 5 (621-625):
  • [4] A speech chaotic encryption algorithm based on network
    Liu, Jing
    Gao, Fei
    Ma, Haiyan
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 283 - 286
  • [5] Image Encryption Algorithm Based on Chaotic Sequence
    Chen, Xiaodi
    Wu, Hong
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL II: SIGNAL PROCESSING, 2020, 516 : 262 - 265
  • [6] Image encryption algorithm based on chaotic system
    Fan, Jiu-Lun
    Zhang, Xue-Feng
    7TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, 2006, : 767 - 771
  • [7] Image Encryption Algorithm Based on Chaotic Mapping
    Dong, Yupu
    Liu, Jiasheng
    Zhu, Canyan
    Wang, Yiming
    PROCEEDINGS 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, (ICCSIT 2010), VOL 1, 2010, : 289 - 291
  • [8] Image encryption algorithm based on chaotic sequence
    Zhang, Yong-Hong
    Kang, Bao-Sheng
    Zhang, Xue-Feng
    ICAT 2006: 16TH INTERNATIONAL CONFERENCE ON ARTIFICIAL REALITY AND TELEXISTENCE - WORSHOPS, PROCEEDINGS, 2006, : 221 - +
  • [9] New chaotic encryption algorithm based on chaotic sequence and plain text
    Wang, Xing-Yuan
    Gu, Sheng-Xian
    IET INFORMATION SECURITY, 2014, 8 (03) : 213 - 216
  • [10] A Novel Image Encryption Algorithm Based on Parameter-Control Scroll Chaotic Attractors
    Wang, Tao
    Song, Liwen
    Wang, Minghui
    Zhuang, Zhiben
    IEEE ACCESS, 2020, 8 : 36281 - 36292