A Delayed Feedback Chaotic Encryption Algorithm Based on Polar Codes

Author(s):  
Xinjin Lu ◽  
Jing Lei ◽  
Wei Li ◽  
Zhipeng Pan
2018 ◽  
Vol 8 (7) ◽  
pp. 1183 ◽  
Author(s):  
Carlos Villaseñor ◽  
Eric Gutierrez-Frias ◽  
Nancy Arana-Daniel ◽  
Alma Alanis ◽  
Carlos Lopez-Franco

Hyperspectral images (HI) collect information from across the electromagnetic spectrum, and they are an essential tool for identifying materials, recognizing processes and finding objects. However, the information on an HI could be sensitive and must to be protected. Although there are many encryption schemes for images and raw data, there are not specific schemes for HI. In this paper, we introduce the idea of crossed chaotic systems and we present an ad hoc parallel crossed chaotic encryption algorithm for HI, in which we take advantage of the multidimensionality nature of the HI. Consequently, we obtain a faster encryption algorithm and with a higher entropy result than others state of the art chaotic schemes.


2013 ◽  
Vol 11 (04) ◽  
pp. 1350036 ◽  
Author(s):  
YING GUO ◽  
XIN SUN ◽  
WEI ZHANG

A chaos-based arbitrated quantum signature (AQS) scheme is designed on the basis of an improved quantum chaotic encryption algorithm whose security is ensured due to the implementation of the quantum one-time pad that embraces the key-dependent chaotic operation string. It involves in a small-scale quantum computation network with three participants in three phases, i.e. initializing phase, signing phase and verifying phase. The signatory signs the encrypted message and then the receiver verifies the signature is valid with the aid of an arbitrator who plays a crucial role when a dispute arises. Analysis shows that the signature can neither be forged nor disavowed by the malicious attackers.


2020 ◽  
Author(s):  
Baolong Liu ◽  
Jianfang Yang ◽  
Hua Chen

Abstract In recent years, chaotic encryption has been well applied in the field of cryptography by virtue of its unique characteristics, and it has received more and more attention in the security of RFID data transmission. Using the same key for encryption and decryption operations is a lightweight encryption algorithm. However, there are various problems in the application process of chaotic encryption: (1) nonlinear dynamic characteristics degradation and short-cycle cycle problems will occur under the influence of computer limited accuracy; (2) numerical conversion operations are required during application, to a certain extent It will affect the randomness of the iterative sequence; (3) During the iterative process, the iterative sequence cannot be spread over the entire value interval, and the randomness is poor. This paper proposes an improved segmented Logistic mapping encryption algorithm, uses the m-sequence to perturb initial value and sets a fixed step to change the control parameter value to generate a chaotic key stream sequence, and applies it to the RFID system data transmission security mechanism to encrypt the data.Experimental simulation and performance analysis show that the iterated chaotic sequence has good random distribution characteristics, unpredictability and traversability. Compared with the previous improvement, the key space is increased to reach the size of 1024 space and can meet the security needs, which improve RFID data security and can effectively avoid various security problems.


Open Physics ◽  
2018 ◽  
Vol 16 (1) ◽  
pp. 989-999
Author(s):  
Lijie Yin ◽  
Nasruddin Hassan

AbstractThe traditional RSA information encryption algorithm uses one-dimensional chaotic equations to generate pseudo-random sequences that meet the encryption requirements. This encryption method is too simple and the security performance is poor. A multi-level encryption algorithm for user-related information across social networks is proposed, and a user association model across social networks is constructed to obtain user-related information across social networks. This multi-level chaotic encryption algorithm based on neural network is used to select three different chaotic mapping models based on user-related information, and a multi-level chaotic encryption algorithm is designed. According to the characteristics of error sensitivity of chaotic system, the neural network is used to inversely propagate the error. A chaotic encryption algorithm that implements multi-level encryption of user-related information across social networks is optimized. The experimental results show that the average rate for which the proposed algorithm correctly identified the user-related information across social networks was 97.6%, the highest frequency of average character distribution probability in cipher text was 0.021, and the average time for encryption was 18.45 Mbps. The average time for decryption was 21.90Mbps.


2020 ◽  
Vol 79 (25-26) ◽  
pp. 18317-18342
Author(s):  
Yujing Wang ◽  
Chenchen Wu ◽  
Shouqiang Kang ◽  
Qingyan Wang ◽  
V. I. Mikulovich

Sign in / Sign up

Export Citation Format

Share Document