A secure encryption scheme using a Composite Logistic Sine Map (CLSM) and SHA-256

被引:21
|
作者
Suman, Rajiv Ranjan [1 ]
Mondal, Bhaskar [2 ]
Mandal, Tarni [3 ]
机构
[1] Natl Inst Technol Jamshedpur, Dept Comp Sci & Engn, Jamshedpur 831014, Bihar, India
[2] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna, Bihar, India
[3] Natl Inst Technol Jamshedpur, Dept Math, Jamshedpur 831014, Bihar, India
关键词
Encryption; Chaotic map; Random number generation; PRNG; PRNS; SHA256; IMAGE ENCRYPTION; ALGORITHM;
D O I
10.1007/s11042-021-11460-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present an algorithm for image encryption for secure transmission and storage of images over insecure public networks. Our algorithm uses Composite Logistic Sine Map (CLSM) and Secure Hash Algorithm-256 (SHA-256). The algorithm first scrambles the pixels of the plain image based on pseudo random number sequence (PRNS) generated by the CLSM. This is followed by diffusing the pixel values by using values generated by SHA-256. The initial conditions and parameters of the CLSM together with a nonce chosen by the user act as key for the algorithm. The nonce is used to initialize the SHA-256 that generates hash values for the diffusion phase. The algorithm has a very wide key space to defeat any brute force or guessing attack. The proposed algorithm was tested with several images of different characteristics against nine security measures. The tests results show that the scheme is robust, scalable and capable of providing strong security to data. The lightweight arithmetic and logical operations involved in the used chaotic map and in permutation-substitution steps enable it to have fast speed due to low computational overhead. This makes it suitable for low power battery operated devices equipped with inexpensive processors having limited computing speed.
引用
收藏
页码:27089 / 27110
页数:22
相关论文
共 50 条
  • [31] Image Encryption Enabling Chaotic Ergodicity with Logistic and Sine Map
    Khan, Mohammad Ahmar
    Khan, Jalaluddin
    Alghamdi, Abdulrahman Abdullah
    Saidan, Sarah Mohammed Awadh Bait
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (07) : 437 - 442
  • [32] 基于SHA-256和Arnold映射的量子Logistic映射图像加密算法
    杨宇光
    王嘉伟
    安徽大学学报(自然科学版), 2024, 48 (01) : 35 - 42
  • [33] Image encryption using 2D Logistic-Sine chaotic map
    Hua, Zhongyun
    Zhou, Yicong
    Pun, Chi-Man
    Chen, C. L. Philip
    2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 3229 - 3234
  • [34] Image encryption using 2D Logistic-adjusted-Sine map
    Hua, Zhongyun
    Zhou, Yicong
    INFORMATION SCIENCES, 2016, 339 : 237 - 253
  • [35] A Novel Color Image Encryption Scheme Using Logistic Map and Quadratic Map Systems
    Herbadji, Djamel
    Belmeguenai, Aissa
    Derouiche, Nadir
    Zennir, Youcef
    Ouchtati, Salim
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11005 LNCS : 13 - 23
  • [36] A Random Number Generator Using Ring Oscillators and SHA-256 as Post-Processing
    Loza, Szymon
    Matuszewski, Lukasz
    Jessa, Mieczyslaw
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2015, 61 (02) : 199 - 204
  • [37] Power-Efficient Approach to Optimize SHA-256 Bit Using Reversible Logic
    Rohini, S. H.
    Nischal, G.
    Shettar, Rajashekar B.
    COMPUTING AND NETWORK SUSTAINABILITY, 2019, 75
  • [38] Security audit in cloud-based server by using encrypted data AES-256 and SHA-256
    Husni, M.
    Ciptaningtyas, H. T.
    Suadi, W.
    Ijtihadie, R. M.
    Anggoro, R.
    Salam, M. F.
    Arifiani, S.
    INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION 2019 (ICIEVE 2019), PTS 1-4, 2020, 830
  • [39] A secure and robust images encryption scheme using chaos game representation, logistic map and convolutional auto-encoder
    Ramezanipour, Nafise
    Moattar, Mohammad Hossein
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (30) : 74413 - 74440
  • [40] A secure algorithm using high-dimensional sine map for color image encryption
    Ahuja B.
    Doriya R.
    International Journal of Information Technology, 2023, 15 (3) : 1535 - 1543