A Highly Secure Stream Cipher Based On Analog-Digital Hybrid Chaotic System

Author(s):  
Jun Zheng ◽  
Hanping Hu
Keyword(s):  
2021 ◽  
Vol 18 (6) ◽  
pp. 9410-9429
Author(s):  
Qing Ye ◽  
◽  
Qiaojia Zhang ◽  
Sijie Liu ◽  
Kaiqiang Chen ◽  
...  

<abstract> <p>Video information is currently widely used in various fields. Compared with image and text data, video data has the characteristics of large data volume, strong data relevance, and large data redundancy, which makes traditional cryptographic systems no longer suitable for video encryption systems. The paper proposes a new chaotic system based on coupled map lattice (CML) and applies it to high efficiency video coding (HEVC) video encryption. The chaotic system logistic-iterative chaotic map with infinite collapses-coupled map lattice (L-ICMIC-CML), which is improved on the basis of the ICMIC system and combined with CML, generates stream ciphers and encrypts some syntax elements of HEVC. The experimental results show that the stream cipher generated by the L-ICMIC-CML system passes the SP800-22 Revla test and has strong randomness. Applying the stream cipher to the proposed HEVC encryption scheme, through the analysis of the encryption scheme's security, encryption time and encryption efficiency, it is better than other chaotic system encryption schemes. The video encryption system proposed in this paper is both safe and efficient.</p> </abstract>


Symmetry ◽  
2019 ◽  
Vol 11 (7) ◽  
pp. 853 ◽  
Author(s):  
Lina Ding ◽  
Chunyuan Liu ◽  
Yanpeng Zhang ◽  
Qun Ding

A chaotic system and two Nonlinear Feadback Shift Registers (NFSRs) are used to generate a new stream cipher in this paper. This design can be used for efficient encryption in resource-constrained devices or environments. The chaotic system is quantified and integrated with two NFSRs based on the technology of Field Programmable Gate Array (FPGA). Many analyses are made from the angle of entropy in order to verify the cryptographic characteristics of the stream cipher, and National Institute of Standards and Technology (NIST) statistical test is completed to analyze the cipher. The test results show that the stream cipher here has good cryptographic characteristics.


2009 ◽  
Vol 23 (25) ◽  
pp. 5085-5092
Author(s):  
XINGYUAN WANG ◽  
WEI LIU ◽  
NINI GU ◽  
HUAGUANG ZHANG

Limitations caused by degeneration of dynamics characteristics may exist in the traditional single chaotic system. The authors propose a method i.e., switch controller chaos and pseudo random bit generator (it is called SCS-PRBG for short), which is based on multiple chaotic systems and switch control. By the theoretic analysis of random key stream and performance of SCS-PRBG, we can see that its digital stream cipher has better randomicity and security. And if using hardware parallel computation, the speed of encryption can be improved sharply. The results of the experiments also present better security of this arithmetic.


2007 ◽  
Vol 32 (5) ◽  
pp. 1867-1876 ◽  
Author(s):  
Ping Li ◽  
Zhong Li ◽  
Wolfgang A. Halang ◽  
Guanrong Chen

2018 ◽  
Vol 1 (2) ◽  
pp. 33-40
Author(s):  
Laith Abdulhussien Hamood ◽  
Mahmood Khalel Ibrahem

the huge development and use of digital multimedia (video, image) over computer networks has led to increase the need for securing of these digital data. Video encryption is widely used as a method for providing security for digital video. In this paper video encryption method is developed using chaotic system for key generator and stream cipher, it uses chaotic map as one-time key generator which produce key used for encryption process. Chaotic systems have been successfully used for multimedia encryption. Chaotic cryptography have good characteristic such as pseudo-randomness, and sensitivity to initial conditions. Video encryption method have successfully designed and implemented, the tests and analysis results have showed the succeed of the encryption method in term of speed and security.


2006 ◽  
Vol 39 (8) ◽  
pp. 341-346 ◽  
Author(s):  
Ping Li ◽  
Zhong Li ◽  
Wolfgang A. Halang ◽  
Guanrong Chen

Sign in / Sign up

Export Citation Format

Share Document