Author(s):  
Guanrong Chen ◽  
Yuming Shi

In this paper, the notion of anti-control of chaos (or chaotification) is introduced, which means to make an originally non-chaotic dynamical system chaotic or enhance the existing chaos of a chaotic system. The main interest in this paper is to employ the classical feedback control techniques. Only the discrete case is discussed in detail, including both finite-dimensional and infinite-dimensional settings.


2014 ◽  
Vol 686 ◽  
pp. 381-387
Author(s):  
Wen Jie Sun

Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.


Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 671
Author(s):  
Zijing Jiang ◽  
Qun Ding

An S-box is the most important part of a symmetric encryption algorithm. Various schemes are put forward by using chaos theory. In this paper, a construction method of S-boxes with good cryptographic properties is proposed. The output of an S-box can be regarded as a group of Boolean functions. Therefore, we can use the different properties of chaos and Bent functions to generate a random Bent function with a high nonlinearity. By constructing a set of Bent functions as the output of an S-box, we can create an S-box with good cryptological properties. The nonlinearity, differential uniformity, strict avalanche criterion and the independence criterion of output bits are then analyzed and tested. A security analysis shows that the proposed S-box has excellent cryptographic properties.


2011 ◽  
Vol 467-469 ◽  
pp. 231-235
Author(s):  
Hong Ye Zhang

An image encryption algorithm based on self-adaptive and chaos theory is presented. The scrambling transformation is completed with Logistic chaos and S-box first. Then self-adaptive image encryption scheme is used to deal with gray transformation for each pixel and image encryption is finished at last. Theoretical analyses and simulated experiment show that the proposed image encryption algorithm provides perfect results, larger key space, simple and easy to be implemented and fast running speed, so this encryption algorithm has excellent performance against many kinds of attacks and has strong practicality.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 172275-172295
Author(s):  
Aqeel Ur Rehman ◽  
Amnah Firdous ◽  
Salman Iqbal ◽  
Zahid Abbas ◽  
Malik M. Ali Shahid ◽  
...  

2016 ◽  
Vol 2016 ◽  
pp. 1-11 ◽  
Author(s):  
Jian Zhang ◽  
Dezhi Hou ◽  
Honge Ren

With the development of national information processes, specific image information from secret departments or individuals is often required to be confidentially transmitted. Numerous image encryption methods exist, especially since the initial value sensitivity and other characteristics of chaos theory and chaos theory-based encryption have become increasingly important in recent years. At present, DNA coding constitutes a new research direction of image encryption that uses the four base pairs of DNA code and image pixel values to establish a special correspondence, in order to achieve pixel diffusion. There are eight DNA encoding rules, and current methods of selecting the DNA encoding rules are largely fixed. Thus, the security of encoded data is not high. In this paper, we use the Lorenz chaotic system, Chen’s hyperchaotic system, and the DNA encoding combination and present a new image encryption algorithm that can dynamically select eight types of DNA encoding rules and eight types of DNA addition and subtraction rules, with significant improvements in security. Through simulation experiments and histograms, correlations, and NPCR analyses, we have determined that the algorithm possesses numerous desirable features, including good encryption effects and antishear and antinoise performances.


Sign in / Sign up

Export Citation Format

Share Document