Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption

被引:75
作者
Abd EL-Latif, Ahmed A. [1 ,2 ,3 ,4 ]
Abd-El-Atty, Bassem [1 ]
Venegas-Andraca, Salvador E. [5 ]
机构
[1] Menoufia Univ, Fac Sci, Math & Comp Sci Dept, Shibin Al Kawm 32511, Egypt
[2] Univ Jeddah, Coll Comp Sci & Engn, Dept Cybersecur, Jeddah 23890, Saudi Arabia
[3] Nile Univ, Sch Informat Technol & Comp Sci, Sheikh Zayed 12588, Egypt
[4] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150080, Peoples R China
[5] Tecnol Monterrey, Escuela Ingn & Ciencias, Ave Eugenio Garza Sada 2501, Monterrey 64849, NL, Mexico
关键词
Quantum walks; Quantum image processing; PRNG; Image encryption; REPRESENTATION; WATERMARKING; TRANSFORM;
D O I
10.1016/j.physa.2019.123869
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Pseudo-random number generator (PRNG) are a key component in the design of modern cryptographic mechanisms and are regarded as a backbone element of many modern cryptographic applications. However and in spite of their robustness, quantum computers could crack down PNGR-based systems. Quantum walks, a universal model of quantum computation, have nonlinear properties that make them a robust candidate to produce PRNG. In this paper, we utilize controlled alternate quantum walk (CAQW) to create PRNG. Moreover, we use the presented PRNG mechanism as a component of a new quantum color image encryption protocol. The quantum color image is encrypted via quantum C-Not (controlled-Not) gate which ruled by the key sequence generated from the PRNG mechanism. Simulation results and numerical analyses demonstrate that the suggested PRNG mechanism and its application to quantum color image encryption have high efficiency with high security. (C) 2019 Published by Elsevier B.V.
引用
收藏
页数:17
相关论文
共 55 条
  • [1] Efficient quantum-based security protocols for information sharing and data protection in 5G networks
    Abd EL-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    Mazurczyk, Wojciech
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 893 - 906
  • [2] A novel image steganography technique based on quantum substitution boxes
    Abd EL-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    [J]. OPTICS AND LASER TECHNOLOGY, 2019, 116 : 92 - 102
  • [3] Efficient Quantum Information Hiding for Remote Medical Image Sharing
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Hossain, M. Shamim
    Rahman, Md. Abdur
    Alamri, Atif
    Gupta, B. B.
    [J]. IEEE ACCESS, 2018, 6 : 21075 - 21083
  • [4] Robust Encryption of Quantum Medical Images
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Talha, Muhammad
    [J]. IEEE ACCESS, 2018, 6 : 1073 - 1081
  • [5] Abd-El-Atty B, 2016, INT C ADV INT SYST I, P342
  • [6] An encryption protocol for NEQR images based on one-particle quantum walks on a circle
    Abd-El-Atty, Bassem
    Abd El-Latif, Ahmed A.
    Venegas-Andraca, Salvador E.
    [J]. QUANTUM INFORMATION PROCESSING, 2019, 18 (09)
  • [7] Abd-El-Atty B, 2018, STUD BIG DATA, V33, P3, DOI 10.1007/978-3-319-63639-9_1
  • [8] Pseudo random number generator based on quantum chaotic map
    Akhshani, A.
    Akhavan, A.
    Mobaraki, A.
    Lim, S. -C.
    Hassan, Z.
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (01) : 101 - 111
  • [9] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [10] [Anonymous], 2019, BICUBIC INTERPOLATIO