Chaos-Based Synchronized Dynamic Keys and Their Application to Image Encryption with an Improved AES Algorithm

被引:26
作者
Lin, Chih-Hsueh [1 ]
Hu, Guo-Hsin [1 ,2 ]
Chan, Che-Yu [1 ]
Yan, Jun-Juh [3 ]
机构
[1] Natl Kaohsiung Univ Sci & Technol, Dept Elect Engn, Kaohsiung 80778, Taiwan
[2] Met Ind Res & Dev Ctr, Dept Ind Upgrading Serv, Kaohsiung 81160, Taiwan
[3] Natl Chin Yi Univ Technol, Dept Elect Engn, Taichung 41107, Taiwan
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 03期
关键词
advanced encryption standard; rippling sliding mode control; synchronization; dynamic random key; image encryption;
D O I
10.3390/app11031329
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
This study aimed to design chaos-based synchronized dynamic keys and develop an improved chaos-based advanced encryption standard (AES) algorithm with the proposed synchronized random keys. First, based on sliding mode control (SMC) technology, a rippling control scheme was introduced to guarantee the synchronization between master-slave discrete chaotic systems. Under the synchronization, the same dynamic random chaos signals could be simultaneously obtained at the transmitter and receiver in communication systems. Then, a novel modified AES cryptosystem with dynamic random keys based on chaos synchronization was presented. In a traditional AES cryptosystem, a static key is used, and it must be exchanged in advance and confirmed to be safely kept. However, in the proposed design, by introducing the synchronization technology of chaotic systems, the static key becomes dynamic and random, and it does not need to be kept or transmitted in open channels. Consequently, the disadvantage of key storage could be eliminated and the security of encryption could be improved. Finally, the developed chaos-based AES (CAES) algorithm has been applied to construct a novel image encryption algorithm. The statistical analysis, histogram, information entropy, and correlation indexes have been calculated and analyzed through simulation experiments in order to demonstrate the capability and improvement of this presented CAES cryptosystem.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 28 条
  • [1] Image encryption based on Independent Component Analysis and Arnold's Cat Map
    Abbas, Nidaa AbdulMohsin
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2016, 17 (01) : 139 - 146
  • [2] [Anonymous], 2007, Foresight: The International Journal of Applied Forecasting
  • [3] [Anonymous], 2001, NIST SPECIAL PUBLICA
  • [4] [Anonymous], Using AES Encryption in CC111xFx and CC251xFx. Application Report, SWRA172C-August 2008-Revised March 2015, Copyright © 2008-2015
  • [5] An image encryption method based on chaos system and AES algorithm
    Arab, Alireza
    Rostami, Mohammad Javad
    Ghavami, Behnam
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (10) : 6663 - 6682
  • [6] Quantum supremacy using a programmable superconducting processor
    Arute, Frank
    Arya, Kunal
    Babbush, Ryan
    Bacon, Dave
    Bardin, Joseph C.
    Barends, Rami
    Biswas, Rupak
    Boixo, Sergio
    Brandao, Fernando G. S. L.
    Buell, David A.
    Burkett, Brian
    Chen, Yu
    Chen, Zijun
    Chiaro, Ben
    Collins, Roberto
    Courtney, William
    Dunsworth, Andrew
    Farhi, Edward
    Foxen, Brooks
    Fowler, Austin
    Gidney, Craig
    Giustina, Marissa
    Graff, Rob
    Guerin, Keith
    Habegger, Steve
    Harrigan, Matthew P.
    Hartmann, Michael J.
    Ho, Alan
    Hoffmann, Markus
    Huang, Trent
    Humble, Travis S.
    Isakov, Sergei V.
    Jeffrey, Evan
    Jiang, Zhang
    Kafri, Dvir
    Kechedzhi, Kostyantyn
    Kelly, Julian
    Klimov, Paul V.
    Knysh, Sergey
    Korotkov, Alexander
    Kostritsa, Fedor
    Landhuis, David
    Lindmark, Mike
    Lucero, Erik
    Lyakh, Dmitry
    Mandra, Salvatore
    McClean, Jarrod R.
    McEwen, Matthew
    Megrant, Anthony
    Mi, Xiao
    [J]. NATURE, 2019, 574 (7779) : 505 - +
  • [7] An error-tolerant approach for efficient AES key retrieval in the presence of cacheprefetching - experiments, results, analysis
    Ashokkumar, C.
    Venkatesh, M. Bhargav Sri
    Giri, Ravi Prakash
    Roy, Bholanath
    Menezes, Bernard
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (04):
  • [8] Delfs H., 2007, SYMMETRIC KEY ENCRYP
  • [9] Selective Encryption Framework for Secure Multimedia Transmission over Wireless Multimedia Sensor Networks
    Durdi, Vinod B.
    Kulkarni, Prahlad T.
    Sudha, K. L.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 2, 2017, 469 : 469 - 480
  • [10] Gilbert H, 2004, LECT NOTES COMPUT SC, V3006, P175