改进的混沌- RSA -基于混合密码系统的图像加密和身份验证

M. Gafsi, Rim Amdouni, Mohamed Ali Hajjaji, J. Malek, A. Mtibaa
{"title":"改进的混沌- RSA -基于混合密码系统的图像加密和身份验证","authors":"M. Gafsi, Rim Amdouni, Mohamed Ali Hajjaji, J. Malek, A. Mtibaa","doi":"10.1002/cpe.7187","DOIUrl":null,"url":null,"abstract":"This article puts forward a fast chaos‐RSA‐based hybrid cryptosystem to secure and authenticate secret images. The SHA‐512 is used to generate a 512‐bit initial key. The RSA system is used to encrypt the initial secret key and signature generation for both the sender and image authentication. In fact, a powerful block‐cipher algorithm is developed to encrypt and decrypt images with a high level of security. At this stage, a strong PRNG based on four chaotic systems is propounded to generate high‐quality keys. Therefore, an improved architecture is suggested. It performs confusion and diffusion of images with low computational complexity. In the final step, the encrypted secret key, signature, and encrypted image are combined together in order to obtain an encrypted signed image. The block‐cipher algorithm is evaluated in‐depth for several ordinary and medical images with different types, content, and size. The obtained simulation results demonstrate that the system enables high‐level security. The entropy has achieved a value of 7.9998 which is the most important feature of randomness. A comparative study against numerous recent encryption algorithms demonstrates that the proposed algorithm provides good results.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"42 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Improved chaos‐RSA‐based hybrid cryptosystem for image encryption and authentication\",\"authors\":\"M. Gafsi, Rim Amdouni, Mohamed Ali Hajjaji, J. Malek, A. Mtibaa\",\"doi\":\"10.1002/cpe.7187\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article puts forward a fast chaos‐RSA‐based hybrid cryptosystem to secure and authenticate secret images. The SHA‐512 is used to generate a 512‐bit initial key. The RSA system is used to encrypt the initial secret key and signature generation for both the sender and image authentication. In fact, a powerful block‐cipher algorithm is developed to encrypt and decrypt images with a high level of security. At this stage, a strong PRNG based on four chaotic systems is propounded to generate high‐quality keys. Therefore, an improved architecture is suggested. It performs confusion and diffusion of images with low computational complexity. In the final step, the encrypted secret key, signature, and encrypted image are combined together in order to obtain an encrypted signed image. The block‐cipher algorithm is evaluated in‐depth for several ordinary and medical images with different types, content, and size. The obtained simulation results demonstrate that the system enables high‐level security. The entropy has achieved a value of 7.9998 which is the most important feature of randomness. A comparative study against numerous recent encryption algorithms demonstrates that the proposed algorithm provides good results.\",\"PeriodicalId\":10584,\"journal\":{\"name\":\"Concurrency and Computation: Practice and Experience\",\"volume\":\"42 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Concurrency and Computation: Practice and Experience\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/cpe.7187\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation: Practice and Experience","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/cpe.7187","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

本文提出了一种基于混沌- RSA的快速混合密码系统来保护和认证秘密图像。SHA‐512用于生成512位的初始密钥。RSA系统用于对发送方和图像认证的初始密钥和签名生成进行加密。事实上,一个强大的块密码算法开发加密和解密图像具有高水平的安全性。在此阶段,提出了一种基于四混沌系统的强PRNG来生成高质量的密钥。因此,提出了一种改进的体系结构。它以较低的计算复杂度对图像进行混淆和扩散。在最后一步中,将加密的秘密密钥、签名和加密的图像组合在一起,以获得加密的签名图像。块密码算法对几种不同类型、内容和大小的普通和医学图像进行了深入的评估。仿真结果表明,该系统具有较高的安全性。熵达到了7.9998的值,这是随机性最重要的特征。通过与众多加密算法的比较研究,表明该算法具有较好的效果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Improved chaos‐RSA‐based hybrid cryptosystem for image encryption and authentication
This article puts forward a fast chaos‐RSA‐based hybrid cryptosystem to secure and authenticate secret images. The SHA‐512 is used to generate a 512‐bit initial key. The RSA system is used to encrypt the initial secret key and signature generation for both the sender and image authentication. In fact, a powerful block‐cipher algorithm is developed to encrypt and decrypt images with a high level of security. At this stage, a strong PRNG based on four chaotic systems is propounded to generate high‐quality keys. Therefore, an improved architecture is suggested. It performs confusion and diffusion of images with low computational complexity. In the final step, the encrypted secret key, signature, and encrypted image are combined together in order to obtain an encrypted signed image. The block‐cipher algorithm is evaluated in‐depth for several ordinary and medical images with different types, content, and size. The obtained simulation results demonstrate that the system enables high‐level security. The entropy has achieved a value of 7.9998 which is the most important feature of randomness. A comparative study against numerous recent encryption algorithms demonstrates that the proposed algorithm provides good results.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Time‐based DDoS attack detection through hybrid LSTM‐CNN model architectures: An investigation of many‐to‐one and many‐to‐many approaches Distributed low‐latency broadcast scheduling for multi‐channel duty‐cycled wireless IoT networks Open‐domain event schema induction via weighted attentive hypergraph neural network Fused GEMMs towards an efficient GPU implementation of the ADER‐DG method in SeisSol Simulation method for infrared radiation transmission characteristics of typical ship targets based on optical remote sensing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1