A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation

被引:0
作者
Sundas Tariq
Majid Khan
Abdullah Alghafis
Muhammad Amin
机构
[1] Institute of Space Technology,Cyber and Information Security Lab (CISL)
[2] Institute of Space Technology,Department of Applied Mathematics and Statistics
[3] King Abdulaziz City for Science and Technology,undefined
来源
Multimedia Tools and Applications | 2020年 / 79卷
关键词
Confidentiality scheme; Lorenz chaotic system; Encryption;
D O I
暂无
中图分类号
学科分类号
摘要
The digital information is transmitted through different communication channels with ease within no time. The sphere of digital world is evolving and become one of the key aspects of our daily lives. In this regard, confidentially to this digital information which are fundamentally transmitted over insecure line of communication is one of the mandatory concerns. This digital information is placed in different databases available online. In this article, our aim is to perform cryptanalysis of Logarithmic based image encryption scheme and investigate its potential key leakages by utilizing public key to recover its private key. Moreover, we have suggested chaos-based Logarithm scheme which is more secure. The Lorenz system is utilized in an anticipated mechanism which is sensitive to initial conditions and chaotic parameters. The proposed scheme is then authenticated by using available security performance benchmarks. To measure the security against different cryptographic attacks, we utilized the statistical analyses which are entropy and the correlation between the pixels, and the differential analyses which are number of changing pixel rate (NPCR) and the unified averaged changed intensity (UACI). In order to resist the brute force attacks, key sensitivity analyses and key space analyses is also performed. The randomness of proposed encryption scheme investigated through entropy and NIST randomness suit tests. An application on digital images is investigated. Also, we have compared our modified confidentiality scheme with existing benchmarks which suggested our encryption technique is quite reasonable for digital multimedia security.
引用
收藏
页码:23507 / 23529
页数:22
相关论文
共 72 条
  • [41] Wang W(undefined)undefined undefined undefined undefined-undefined
  • [42] Si M(undefined)undefined undefined undefined undefined-undefined
  • [43] Yu P(undefined)undefined undefined undefined undefined-undefined
  • [44] Ran P(undefined)undefined undefined undefined undefined-undefined
  • [45] Wang H(undefined)undefined undefined undefined undefined-undefined
  • [46] Jiang X(undefined)undefined undefined undefined undefined-undefined
  • [47] Yu L(undefined)undefined undefined undefined undefined-undefined
  • [48] Waseem HM(undefined)undefined undefined undefined undefined-undefined
  • [49] Khan M(undefined)undefined undefined undefined undefined-undefined
  • [50] Shah T(undefined)undefined undefined undefined undefined-undefined