scholarly journals Application of Chaotic Encryption Algorithm Based on Variable Parameters in RFID Security

2020 ◽  
Author(s):  
Baolong Liu ◽  
Jianfang Yang ◽  
Hua Chen

Abstract In recent years, chaotic encryption has been well applied in the field of cryptography by virtue of its unique characteristics, and it has received more and more attention in the security of RFID data transmission. Using the same key for encryption and decryption operations is a lightweight encryption algorithm. However, there are various problems in the application process of chaotic encryption: (1) nonlinear dynamic characteristics degradation and short-cycle cycle problems will occur under the influence of computer limited accuracy; (2) numerical conversion operations are required during application, to a certain extent It will affect the randomness of the iterative sequence; (3) During the iterative process, the iterative sequence cannot be spread over the entire value interval, and the randomness is poor. This paper proposes an improved segmented Logistic mapping encryption algorithm, uses the m-sequence to perturb initial value and sets a fixed step to change the control parameter value to generate a chaotic key stream sequence, and applies it to the RFID system data transmission security mechanism to encrypt the data.Experimental simulation and performance analysis show that the iterated chaotic sequence has good random distribution characteristics, unpredictability and traversability. Compared with the previous improvement, the key space is increased to reach the size of 1024 space and can meet the security needs, which improve RFID data security and can effectively avoid various security problems.

2021 ◽  
Author(s):  
Yi Guo ◽  
Jianfang Yang ◽  
Baolong Liu

Abstract In recent years, chaotic encryption has been applied in the field of cryptography by virtue of its unique characteristics, and it has received more and more attention in the security of RFID data transmission. Using the same key for encryption and decryption operations is a lightweight encryption algorithm. However, there are various problems in the application process of chaotic encryption: (1) nonlinear dynamic characteristics degradation and short-cycle cycle problems will occur under the influence of computer limited accuracy; (2) numerical conversion operations are required during application, to a certain extent It will affect the randomness of the iterative sequence; (3) During the iterative process, the iterative sequence cannot be spread over the entire value interval, and the randomness is poor. This paper proposes an improved segmented Logistic mapping encryption algorithm, uses the m-sequence to perturb initial value and sets a fixed step to change the control parameter value to generate a chaotic key stream sequence, and applies it to the RFID system data transmission security mechanism to encrypt the data. Experimental simulation and performance analysis show that the iterated chaotic sequence has good random distribution characteristics, unpredictability and traversability. Compared to the previous improvement, the key space is increased to reach the size of 1024 space and can meet the security needs, which improve RFID data security and can effectively avoid various security problems.


Author(s):  
Yi Guo ◽  
Jianfang Yang ◽  
Baolong Liu

AbstractIn the development of the Internet of Things technology, RFID technology plays a very important role in the application of the Internet of Things. However, due to the safety problems caused by the non-contact sensing of the RFID system, the further development of RFID technology in the application is largely hindered. In recent years, chaotic encryption has been applied in the field of cryptography by virtue of its unique characteristics, and it has received more and more attention in the security of RFID data transmission. Using the same key for encryption and decryption operations is a lightweight encryption algorithm. However, there are various problems in the application process of chaotic encryption: (1) nonlinear dynamic characteristics degradation and short-cycle cycle problems will occur under the influence of computer limited accuracy; (2) numerical conversion operations are required during application, to a certain extent It will affect the randomness of the iterative sequence; (3) During the iterative process, the iterative sequence cannot be spread over the entire value interval, and the randomness is poor. This paper proposes an improved segmented Logistic mapping encryption algorithm, uses the m-sequence to perturb initial value and sets a fixed step to change the control parameter value to generate a chaotic key stream sequence, and applies it to the RFID system data transmission security mechanism to encrypt the data. Experimental simulation and performance analysis show that the iterated chaotic sequence has good random distribution characteristics, unpredictability, and traversability. Compared to the previous improvement, the key space is increased to reach the size of 1024 space and can meet the security needs, which improve RFID data security and can effectively avoid various security problems.


2021 ◽  
Vol 15 (4) ◽  
pp. 118-131
Author(s):  
Sadiq A. Mehdi

In this paper, a novel four-dimensional chaotic system has been created, which has characteristics such as high sensitivity to the initial conditions and parameters. It also has two a positive Lyapunov exponents. This means the system is hyper chaotic. In addition, a new algorithm was suggested based on which they constructed an image cryptosystem. In the permutation stage, the pixel positions are scrambled via a chaotic sequence sorting. In the substitution stage, pixel values are mixed with a pseudorandom sequence generated from the 4D chaotic system using XOR operation. A simulation has been conducted to evaluate the algorithm, using the standardized tests such as information entropy, histogram, number of pixel change rate, unified average change intensity, and key space. Experimental results and performance analyses demonstrate that the proposed encryption algorithm achieves high security and efficiency.


2012 ◽  
Vol 459 ◽  
pp. 544-548 ◽  
Author(s):  
Wei Liang ◽  
Jian Bo Xu ◽  
Wei Hong Huang ◽  
Li Peng

Network security technology ensures secure data transmission in network. Meanwhile, it brings extra overhead of security system in terms of cost and performance, which seriously affects the rapid development of existing high-speed encryption systems. The existing encryption technology cannot meet the demand of high security, low cost and high real-time. For solving above problems, an ECC encryption engine architecture based on scalable public key cipher and a high-speed configurable multiplication algorithm are designed. The algorithm was tested on FPGA platform and the experiment results show that the system has better computation speed and lower cost overhead. By comparing with other systems, our system has benefits in terms of hardware overhead and encryption time ratio


2018 ◽  
Vol 8 (7) ◽  
pp. 1183 ◽  
Author(s):  
Carlos Villaseñor ◽  
Eric Gutierrez-Frias ◽  
Nancy Arana-Daniel ◽  
Alma Alanis ◽  
Carlos Lopez-Franco

Hyperspectral images (HI) collect information from across the electromagnetic spectrum, and they are an essential tool for identifying materials, recognizing processes and finding objects. However, the information on an HI could be sensitive and must to be protected. Although there are many encryption schemes for images and raw data, there are not specific schemes for HI. In this paper, we introduce the idea of crossed chaotic systems and we present an ad hoc parallel crossed chaotic encryption algorithm for HI, in which we take advantage of the multidimensionality nature of the HI. Consequently, we obtain a faster encryption algorithm and with a higher entropy result than others state of the art chaotic schemes.


2014 ◽  
Vol 565 ◽  
pp. 179-182 ◽  
Author(s):  
Yue Tao Ge ◽  
Xiao Ming Liu ◽  
Xiao Tong Yin

In order to realize wireless remoter not only securely but also quickly data transmission in the public communication network, the Tiny Encryption Algorithm (TEA) encryption and decryption algorithm is studied in this paper and the properties of TEA are analyzed. According to communication protocol of remoter, encryption and decryption program process are designed. Because of TEA encryption, remoter transmitter and receiver can communicate strongly in the public communication network.


2021 ◽  
Vol 248 ◽  
pp. 01060
Author(s):  
Qi Hu ◽  
Yutao Chen ◽  
Yuqian He

A large number of operation data will be generated in the process of ship propulsion system operation. Aiming at the processing, analysis and application of these operation data, a data warehouse for propulsion system is constructed based on the operation data of a ship, and the multidimensional analysis and result display of data are realized by combining OLAP technology with visual analysis software tableau. On the basis of the data warehouse, the soft sensing of parameters is applied to the data warehouse. Based on the soft sensing data, the hydrodynamic characteristics of the propeller are studied, and the hydrodynamic characteristic curves of the propeller are obtained. The research of ship propulsion system based on data warehouse provides support for the comprehensive information of propulsion system data.


2019 ◽  
Vol 8 (1) ◽  
pp. 2
Author(s):  
Mehdi Lotfi ◽  
Hossein Kheiri ◽  
Azizeh Jabbari

Introduction:  In this paper, an encryption algorithm for the security of medical images is presented, which has extraordinary security. Given that the confidentiality of patient data is one of the priorities of medical informatics, the algorithm can be used to store and send medical image.Material and Methods:  In this paper, the solutions of chaotic differential equations are used to generate encryption keys. This method is more than other methods used in encoding medical images, resistant to statistics attacks, low encryption and decryption time and very high key space. In the proposed algorithm, unlike other methods that use random key generation, this method uses the production of solutions of the chaotic differential equations in a given time period for generating a key. All simulations and coding are done in MATLAB software.Results:   Chaotic Differential Equations have two very important features that make it possible to encode medical images. One is the unpredictability of the system's behavior and the other is a severe sensitivity to the initial condition.Conclusion: These two features make the method resistant to possible attacks to decode the concept of synchronization chaotic systems. Using the results of the method, medical information can be made safer than existing ones.


2015 ◽  
Vol 743 ◽  
pp. 379-384 ◽  
Author(s):  
Zhang Li Lan ◽  
Lin Zhu ◽  
Yi Cai Li ◽  
Jun Liu

Key space will be reduced after using the traditional DES algorithm to directly encrypt color images. Through combining the chaotic capability of the logistic function and by means of a specific algorithm, the fake chaotic son key’s space which is produced by the logistic chaotic pseudo-random function could be acquired. Then use the key generation algorithm to replace the traditional DES key generation algorithm. Experiment illustrates that the proposed algorithm has stronger robustness and anti-jamming capability to noise, and larger key’s space, sensitive initial keys, and better encryption effect, meanwhile it is better immune to multiple attacks.


Sign in / Sign up

Export Citation Format

Share Document