TITLE

Research on General Permutation Encryption Module based on Chaos Theory

AUTHOR(S)
Wenjie Sun
PUB. DATE
October 2014
SOURCE
Applied Mechanics & Materials;2014, Issue 686, p381
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.
ACCESSION #
99647901

 

Related Articles

  • Cryptographic Properties of Bipermutive Cellular Automata Rules. LEPORATI, ALBERTO; MARIOT, LUCA // Journal of Cellular Automata;2014, Vol. 9 Issue 5/6, p437 

    Bipermutive rules are known to induce both expansive and mixing chaotic cellular automata. In this paper, we study some cryptographic properties of bipermutive rules, initially proving that they also satisfy 1-resiliency, which combines balancedness and first order correlation immunity. We thus...

  • A new method for decoding an encrypted text by genetic algorithms and its comparison with tabu search and simulated annealing. Sadeghzadeh, Mahdi; Taherbaghal, Mahsa // Management Science Letters;2014, Vol. 4 Issue 2, p213 

    Genetic Algorithm is an algorithm based on population and many optimization problems are solved with this method, successfully. With increasing demand for computer attacks, security, efficient and reliable Internet has increased. Cryptographic systems have studied the science of communication is...

  • Cryptanalysis of Blind Signature Schemes. Singh, Nitu; Das, Sumanjit // International Journal of Computer Science & Network Security;May2014, Vol. 14 Issue 5, p73 

    Security of the consumer's data over internet is the major problem in present time. In this paper we have analyzed blind signature schemes based on RSA and with taking advantage of elliptic curve cryptography to achieve the security goals. Blind signature scheme is one of the security protocol...

  • A chaotic block encryption algorithm. WEI Feng // Journal of Zhengzhou University of Light Industry, Natural Scien;Dec2014, Vol. 29 Issue 6, p73 

    Aiming at the security problem of chaos theory in cryptography application, a chaotic block encryption algorithm was designed based on the theory of discrete coupled map lattice and asymptotic deterministic randomness. The algorithm used aymptotic deterministic randomness key to diffuse the...

  • Tweakable parallel OFB mode of operation with delayed thread synchronization. Damjanović, Boris; Simić, Dejan // Security & Communication Networks;7/10/2016, Vol. 9 Issue 10, p1119 

    Introduction of various cryptographic modes of operation is induced with noted imperfections of symmetric block algorithms. Design of some cryptographic modes of operation has already been exploited as an idea for parallelization of certain algorithms execution. To the best of our knowledge,...

  • Detail Power Analysis of the SHA-3 Hashing Algorithm Candidates on Xilinx Spartan-3E. Jaffar, Amar; Martinez, Christopher J. // International Journal of Computer & Electrical Engineering;Aug2013, Vol. 5 Issue 4, p410 

    The United States National Institute of Standards and Technology (NIST) created an open competition to find a new standard for cryptographic hashing in 2007. The competition was composed of a number of rounds that ended with 5 finalists (BLAKE, Grostl, JH, Keccak, Skein) in December of 2010....

  • A New Approach for Chaotic Encrypted Data Hiding in Color Image. Talee, Ghada TH.; Jelmeran, Melad J.; Mohammed, Saja J. // International Journal of Computer Applications;Jan2014, Vol. 86, p23 

    Sending encrypted messages frequently will draw the attention of third parties, i.e. crackers and hackers, perhaps causing attempts and revealing the original messages. In digital world, Steganography is introduced to hide the existence of the communication by concealing encryption message...

  • Image Encryption Using Parallel RSA Algorithm on CUDA. Tuteja, Vaibhav // International Journal of Computer Networks & Communications Secu;Jul2014, Vol. 2 Issue 7, p232 

    In this paper we discuss Image Encryption and Decryption using RSA Algorithm which was earlier used for text encryption. In today's era it is a crucial concern that proper encryption decryption should be applied so that unauthorized access can be prevented. We intend to build a general RSA...

  • Substitution-Permutation Based Image Cipher Using Chaotic Henon and Baker's Maps. Jolfaei, Alireza; Mirghadri, Abdolrasoul // International Review on Computers & Software;Jan2011, Vol. 6 Issue 1, p40 

    In this paper we propose a new image encryption scheme using chaotic maps to protect the distribution of digital images in an efficient and secure way. In order to check the efficiency of proposed method, the new encryption scheme is compared with two current classes of stream ciphers: W7 and...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics