登录    注册    忘记密码    使用帮助

详细信息

Quantum logistic image encryption algorithm based on SHA-3 and RSA  ( SCI-EXPANDED收录 EI收录)   被引量:44

文献类型:期刊文献

英文题名:Quantum logistic image encryption algorithm based on SHA-3 and RSA

作者:Ye, Guodong[1];Jiao, Kaixin[1];Huang, Xiaoling[1]

机构:[1]Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China

年份:2021

卷号:104

期号:3

起止页码:2807

外文期刊名:NONLINEAR DYNAMICS

收录:SCI-EXPANDED(收录号:WOS:000638526800001)、、EI(收录号:20211610232957)、Scopus(收录号:2-s2.0-85104257268)、WOS

基金:The authors would like to thank the anonymous reviewers for their valuable comments and the editor's helpful suggestions. This work was supported in part by the National Natural Science Foundation of China (No.61972103), the Natural Science Foundation of Guangdong Province of China (No.2019A1515011361), and the Key Scientific Research Project of Education Department of Guangdong Province of China (No.2020ZDZX3064).

语种:英文

外文关键词:SHA-3; RSA; Quantum logistic map; Secure communication; Image encryption

外文摘要:This study proposes a quantum logistic image encryption algorithm based on the Rivest-Shamir-Adleman (RSA) and secure hash (SHA-3) algorithms. First, the asymmetric encryption algorithm RSA is used to randomly generate key pairs with private key and public key. A fixed matrix is then produced to confuse the plain image by additive modular operation and get preprocessed image. Second, the preprocessed image is computed by the hash function SHA-3 to obtain the plain message that is then stored secretly. Using RSA algorithm, the cipher message can be obtained corresponding to the plain message. After combining both the plain and cipher messages, the initial conditions of the quantum logistic map are calculated using a new mathematical model. Random keystream can then be generated from the quantum logistic map. Third, the keystream is further employed to cyclically confuse row and column pixels in the preprocessed image with different directions. Then, diffusion operations to odd row and odd column are carried out followed by even row and column, respectively. Finally, the cipher image can be reconstructed by both inverse cyclic confusion and inverse diffusion to each row and column. The test results show that the algorithm has strong plaintext sensitivity and key sensitivity as well as an enhanced ability to resist various cryptographic attacks. Therefore, the proposed algorithm is suitable for secure communication of network image in conjunction with a public cryptosystem.

参考文献:

正在载入数据...

版权所有©广东海洋大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心