A secure encryption scheme using a Composite Logistic Sine Map (CLSM) and SHA-256

被引:21
|
作者
Suman, Rajiv Ranjan [1 ]
Mondal, Bhaskar [2 ]
Mandal, Tarni [3 ]
机构
[1] Natl Inst Technol Jamshedpur, Dept Comp Sci & Engn, Jamshedpur 831014, Bihar, India
[2] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna, Bihar, India
[3] Natl Inst Technol Jamshedpur, Dept Math, Jamshedpur 831014, Bihar, India
关键词
Encryption; Chaotic map; Random number generation; PRNG; PRNS; SHA256; IMAGE ENCRYPTION; ALGORITHM;
D O I
10.1007/s11042-021-11460-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present an algorithm for image encryption for secure transmission and storage of images over insecure public networks. Our algorithm uses Composite Logistic Sine Map (CLSM) and Secure Hash Algorithm-256 (SHA-256). The algorithm first scrambles the pixels of the plain image based on pseudo random number sequence (PRNS) generated by the CLSM. This is followed by diffusing the pixel values by using values generated by SHA-256. The initial conditions and parameters of the CLSM together with a nonce chosen by the user act as key for the algorithm. The nonce is used to initialize the SHA-256 that generates hash values for the diffusion phase. The algorithm has a very wide key space to defeat any brute force or guessing attack. The proposed algorithm was tested with several images of different characteristics against nine security measures. The tests results show that the scheme is robust, scalable and capable of providing strong security to data. The lightweight arithmetic and logical operations involved in the used chaotic map and in permutation-substitution steps enable it to have fast speed due to low computational overhead. This makes it suitable for low power battery operated devices equipped with inexpensive processors having limited computing speed.
引用
收藏
页码:27089 / 27110
页数:22
相关论文
共 50 条
  • [1] A secure encryption scheme using a Composite Logistic Sine Map (CLSM) and SHA-256
    Rajiv Ranjan Suman
    Bhaskar Mondal
    Tarni Mandal
    Multimedia Tools and Applications, 2022, 81 : 27089 - 27110
  • [2] A Fast Encryption Scheme Suitable for Video Surveillance Applications Using SHA-256 Hash Function and 1D Sine-Sine Chaotic Map
    Panwar, Kirtee
    Purwar, Ravindra Kumar
    Srivastava, Garima
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2021, 21 (02)
  • [3] A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256
    Zhu, Shuqin
    Zhu, Congxu
    Wang, Wenhong
    ENTROPY, 2018, 20 (09)
  • [4] CLSM-IEA: a novel cosine-logistic-sine map and its application in a new image encryption scheme
    Gao, Xiaosong
    Liu, Xingbin
    SIGNAL IMAGE AND VIDEO PROCESSING, 2024, 18 (04) : 3063 - 3077
  • [5] CLSM-IEA: a novel cosine-logistic-sine map and its application in a new image encryption scheme
    Xiaosong Gao
    Xingbin Liu
    Signal, Image and Video Processing, 2024, 18 : 3063 - 3077
  • [6] Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function
    Rahul B.
    Kuppusamy K.
    Senthilrajan A.
    Optik, 2023, 289
  • [7] Implementation of Efficient SHA-256 Hash Algorithm for Secure Vehicle Communication using FPGA
    Jeong, Chanbok
    Kim, Youngmin
    2014 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2014, : 224 - 225
  • [8] Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL
    Bensalem, Hachem
    Blaquiere, Yves
    Savaria, Yvon
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [9] Efficient FPGA Hardware Implementation of Secure Hash Function SHA-256/Blake-256
    Kahri, Fatma
    Mestiri, Hassen
    Bouallegue, Belgacem
    Machhout, Mohsen
    2015 IEEE 12TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2015,
  • [10] A Novel Chaotic Image Encryption Algorithm Based on Coordinate Descent and SHA-256
    Sun, Xiyu
    Chen, Zhong
    IEEE ACCESS, 2022, 10 : 114597 - 114611