Chaos-based image hybrid encryption algorithm using key stretching and hash feedback

被引:19
|
作者
Liu, Hongjun [1 ,2 ]
Xu, Yanqiu [3 ]
Ma, Chao [1 ]
机构
[1] Univ Jinan, Sch Math Sci, Jinan 250022, Shandong, Peoples R China
[2] Weifang Vocat Coll, Shandong Famous Teachers Workshop, Weifang 262737, Shandong, Peoples R China
[3] Weifang Vocat Coll, Off Sci & Technol Adm, Weifang 262737, Shandong, Peoples R China
来源
OPTIK | 2020年 / 216卷
基金
中国国家自然科学基金;
关键词
Image block encryption; Hash function; Key stretching; Side channel attack; SCHEME; MAP; SYSTEM;
D O I
10.1016/j.ijleo.2020.164925
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The paper proposes a chaos-based image hybrid stream and block encryption algorithm, a key stretching method is implemented to further enhance its security. The random time span sequence and salt sequences are generated by the Logistic-Sine map. The key stretching method repeatedly feeds salt and current intermediate hash value of state variables back into the next round message for hash function simultaneously, and the state variables are extracted from Sprott C system through time span sequence, the aim of redundant iterations of Sprott C system is to resist side channel attack. After multiple iteration loops, the key stream is generated by Sprott C system to encrypt pixel blocks of the pre-encoded image. Experimental results and security analysis demonstrated the scheme's effectiveness and resistance to all kinds of known attacks.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Chaos-based image encryption using hybrid model of linear-feedback shift register system and deoxyribonucleic acid
    Ghanbari, Hasan
    Enayatifar, Rasul
    Motameni, Homayun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (22) : 31815 - 31830
  • [42] Design of a chaos-based digitlal image encryption algorithm in time domain
    Wang, JiaYan
    Chen, Geng
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 26 - 29
  • [43] Cryptanalysis and security enhancement for a chaos-based color image encryption algorithm
    Huang, Rong
    Liao, Xiaojuan
    Dong, Aihua
    Sun, Shaoyuan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (37-38) : 27483 - 27509
  • [44] Cryptanalysis and security enhancement for a chaos-based color image encryption algorithm
    Rong Huang
    Xiaojuan Liao
    Aihua Dong
    Shaoyuan Sun
    Multimedia Tools and Applications, 2020, 79 : 27483 - 27509
  • [45] Chaos-Based Image Encryption Using an AONT Mode of Operation
    Rickus, Andrius
    Pfluegel, Eckhard
    Atkins, Nigel
    2015 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA), 2015,
  • [46] Chaos-Based Cryptography: Text Encryption Using Image Algorithms
    Lawnik, Marcin
    Moysis, Lazaros
    Volos, Christos
    ELECTRONICS, 2022, 11 (19)
  • [47] A Chaos-based Image Encryption ASIC Using Reconfigurable Logic
    Zhang, Yiwei
    Liu, Zexiang
    Zheng, Xinjian
    2008 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2008), VOLS 1-4, 2008, : 1782 - 1785
  • [48] Efficient Image Encryption Using a Chaos-based PWL Memristor
    Lin, Zhaohui
    Wang, Hongxia
    IETE TECHNICAL REVIEW, 2010, 27 (04) : 318 - 325
  • [49] Chaos-Based Medical Image Encryption Using Symmetric Cryptography
    Ashtiyani, Meghdad
    Birgani, Parmida Moradi
    Hosseini, Hesam M.
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2633 - +
  • [50] An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption
    Ahmed, Hossam El-Din H.
    Kalash, Hamdy M.
    Allah, Osama S. Farag
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2007, 31 (01): : 121 - 129