Joint Optimization-Encryption Model Based on Auto Encoder Neural Network, Variable-Length Dynamic S-Box and New Stream Encryption

被引:0
作者
Hu, Anqi [1 ]
Gong, Xiaoxue [1 ]
Guo, Lei [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, 2 Chongwen Rd, Chongqing 400065, Peoples R China
来源
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS | 2022年 / 32卷 / 14期
基金
中国博士后科学基金;
关键词
Auto encoder neural network; variable-length dynamic S-box; new stream encryption; joint optimization-encryption; TRIGGERED IMAGE ENCRYPTION; CHAOTIC SYSTEM; SECURITY; ALGORITHM;
D O I
10.1142/S0218127422502327
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The openness of the Internet makes information transmission prone to the risk of illegal eavesdropping, and data security and user privacy protection have become one of the key research hotspots. Aiming to solve the problem that a single encryption method cannot provide comprehensive security guarantees and the traditional one-time pad encryption method consumes a large amount of secure channel resource, this paper innovatively proposes a variable-length dynamic S-box and a cross-mapping sequence-based new type of stream encryption, and an improved method of synchronizing keys during a one-time pad transmission. On this basis, this paper innovatively proposes a joint optimization-encryption model based on the auto encoder neural network, variable-length dynamic S-box and new stream encryption. Finally, taking the optical fiber transmission as an example, the simulation results show that the joint optimization-encryption model proposed in this paper can save security channel resources and effectively resist common security attacks in the process of high-speed information transmission.
引用
收藏
页数:15
相关论文
共 42 条
[1]   An image encryption algorithm based on new generalized fusion fractal structure [J].
Ahmad, Musheer ;
Agarwal, Shafali ;
Alkhayyat, Ahmed ;
Alhudhaif, Adi ;
Alenezi, Fayadh ;
Zahid, Amjad Hussain ;
Aljehane, Nojood O. .
INFORMATION SCIENCES, 2022, 592 :1-20
[2]   Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption [J].
Attaullah ;
Javeed, Adnan ;
Shah, Tariq .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) :31467-31484
[3]   An image encryption scheme based on a new hybrid chaotic map and optimized substitution box [J].
Ben Farah, M. A. ;
Farah, A. ;
Farah, T. .
NONLINEAR DYNAMICS, 2020, 99 (04) :3041-3064
[4]   Secure image encryption algorithm design using a novel chaos based S-Box [J].
Cavusoglu, Unal ;
Kacar, Sezgin ;
Pehlivan, Ihsan ;
Zengin, Ahmet .
CHAOS SOLITONS & FRACTALS, 2017, 95 :92-101
[5]   Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography [J].
Chamola, Vinay ;
Jolfaei, Alireza ;
Chanana, Vaibhav ;
Parashari, Prakhar ;
Hassija, Vikas .
COMPUTER COMMUNICATIONS, 2021, 176 :99-118
[6]  
Fan C.L., 2019, INT J BIFURCATION CH, V29
[7]  
Gaffar AFO, 2019, 2019 5TH INTERNATIONAL CONFERENCE ON SCIENCE ININFORMATION TECHNOLOGY (ICSITECH), P128, DOI [10.1109/ICSITech46713.2019.8987462, 10.1109/icsitech46713.2019.8987462]
[8]   A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences [J].
Girdhar, Ashish ;
Kumar, Vijay .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (20) :27017-27039
[9]   On the Security Analysis of a Hopfield Chaotic Neural Network-Based Image Encryption Algorithm [J].
Hu, Yingchun ;
Yu, Simin ;
Zhang, Zeqing .
COMPLEXITY, 2020, 2020 (2020)
[10]   Two-Dimensional Parametric Polynomial Chaotic System [J].
Hua, Zhongyun ;
Chen, Yongyong ;
Bao, Han ;
Zhou, Yicong .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (07) :4402-4414