一种使用流密码算法进行图像加解密的方法

Belmeguenai Aissa, Derouiche Nadir, Med Ammar
{"title":"一种使用流密码算法进行图像加解密的方法","authors":"Belmeguenai Aissa, Derouiche Nadir, Med Ammar","doi":"10.1109/STA.2014.7086692","DOIUrl":null,"url":null,"abstract":"This paper treats the protection of images. We are dealing with the problem of image encryption and decryption. The encryption scheme is done by using the stream cipher system based on the nonlinear combination generator. The proposed keystream generator consists of fourteen binary primitive nonlinear feedback shift registers (NLFSRs) and one Boolean function. The Boolean function combines the output sequences of the fourteen NLFSRs to produce the keystream. All feedback shift registers employed in the keystream generator are primitive and nonlinear. The proposed encryption scheme is simple and highly efficient. Security analysis covers key sensitivity analysis, key space analysis, correlation coefficient analysis, noise analysis, statistical attacks, Berlekamp-Massey attack, correlation attack and algebraic attack. Based on experiment results and the security analysis it can be concluded that the proposed encryption scheme is highly key sensitive, highly resistance to the noises and shows a good resistance against brute-force, statistical attacks, Berlekamp-Massey attack, correlation attack and algebraic attack.","PeriodicalId":125957,"journal":{"name":"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"An approach using stream cipher algorithm for image encryption and decryption\",\"authors\":\"Belmeguenai Aissa, Derouiche Nadir, Med Ammar\",\"doi\":\"10.1109/STA.2014.7086692\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper treats the protection of images. We are dealing with the problem of image encryption and decryption. The encryption scheme is done by using the stream cipher system based on the nonlinear combination generator. The proposed keystream generator consists of fourteen binary primitive nonlinear feedback shift registers (NLFSRs) and one Boolean function. The Boolean function combines the output sequences of the fourteen NLFSRs to produce the keystream. All feedback shift registers employed in the keystream generator are primitive and nonlinear. The proposed encryption scheme is simple and highly efficient. Security analysis covers key sensitivity analysis, key space analysis, correlation coefficient analysis, noise analysis, statistical attacks, Berlekamp-Massey attack, correlation attack and algebraic attack. Based on experiment results and the security analysis it can be concluded that the proposed encryption scheme is highly key sensitive, highly resistance to the noises and shows a good resistance against brute-force, statistical attacks, Berlekamp-Massey attack, correlation attack and algebraic attack.\",\"PeriodicalId\":125957,\"journal\":{\"name\":\"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/STA.2014.7086692\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/STA.2014.7086692","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

本文主要讨论图像保护问题。我们正在处理图像加密和解密的问题。加密方案采用基于非线性组合发生器的流密码系统实现。所提出的密钥流生成器由14个二进制原始非线性反馈移位寄存器(NLFSRs)和一个布尔函数组成。布尔函数将14个nlfsr的输出序列组合在一起以生成密钥流。在键流发生器中使用的所有反馈移位寄存器都是原始的和非线性的。所提出的加密方案简单、高效。安全分析包括密钥敏感性分析、密钥空间分析、相关系数分析、噪声分析、统计攻击、Berlekamp-Massey攻击、相关攻击和代数攻击。实验结果和安全性分析表明,所提出的加密方案具有较高的密钥敏感性和较强的抗噪声能力,对暴力破解、统计攻击、Berlekamp-Massey攻击、相关攻击和代数攻击具有较好的抵抗能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An approach using stream cipher algorithm for image encryption and decryption
This paper treats the protection of images. We are dealing with the problem of image encryption and decryption. The encryption scheme is done by using the stream cipher system based on the nonlinear combination generator. The proposed keystream generator consists of fourteen binary primitive nonlinear feedback shift registers (NLFSRs) and one Boolean function. The Boolean function combines the output sequences of the fourteen NLFSRs to produce the keystream. All feedback shift registers employed in the keystream generator are primitive and nonlinear. The proposed encryption scheme is simple and highly efficient. Security analysis covers key sensitivity analysis, key space analysis, correlation coefficient analysis, noise analysis, statistical attacks, Berlekamp-Massey attack, correlation attack and algebraic attack. Based on experiment results and the security analysis it can be concluded that the proposed encryption scheme is highly key sensitive, highly resistance to the noises and shows a good resistance against brute-force, statistical attacks, Berlekamp-Massey attack, correlation attack and algebraic attack.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Robustness analysis and evaluation of a PMSG-based marine current turbine system under faulty conditions Application of functional specification and operational safety conventional methods for a networked control system suitable qualitative analysis A comparative study between a 20-sim and a Simulink single PEM cell model Markerless extraction of gait features using Haar-like template for view-invariant biometrics A high gain observer coupled to a sliding mode technique for electropneumatic system control
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1