首页    期刊浏览 2024年11月28日 星期四
登录注册

文章基本信息

  • 标题:HYBRID CHAOTIC KEYSTREAM GENERATION (HCKG) FOR SYMMETRIC IMAGE ENCRYPTION
  • 本地全文:下载
  • 作者:ALI H. KASHMAR ; AHMED K. HASSN ; E. S. ISMAIL
  • 期刊名称:Journal of Theoretical and Applied Information Technology
  • 印刷版ISSN:1992-8645
  • 电子版ISSN:1817-3195
  • 出版年度:2019
  • 卷号:97
  • 期号:3
  • 页码:984-993
  • 出版社:Journal of Theoretical and Applied
  • 摘要:Today, data security is the main objective to protected personal data from unauthorized access users, because of the high-speed development of unsecured networks. The aim of apply symmetric-key algorithms is to produce a good encrypt data in order to safety transmitted information through unsecure networks; such goal is achieve by design efficient keystream generator mechanism. However, there are many properties should be taken in consideration to design a good ciphers including; implement strong and high-speed keystream generation, utilize a complex invertible round functions, as well as time execution and security level. This paper suggested a new technique for design efficient keystream generator mechanism called Hybrid Chaotic Keystream Generator (HCKG) that is suitable for symmetric image encryption. HCKG generator passes through four stages; firstly, choose the chaotic maps, including, Chebyshev, Tent, Gaussian, Henon, and Duffing maps. The secondly stage, exponential function [exp(x)] and the next stage is machine words multiplexer to find the floating-point representation group of random numbers. The final stage, random matrix table as a dynamic substitution box (S-box) depend on random key, shifting, logistic maps for (1D, 2D, 3D), and particle swarm algorithm. Visual Studio was employed as a programming language to implement the algorithms of proposal system. The output of HCKG is testing in several measurements represent including complexity, time execution and avalanche criterion balance; the numerical results show that the keystream generation successfully passed through NIST (statistical package tests for randomness). Finally, image encryption for the corresponding algorithm was done; preliminary results show that HCKG algorithm has good cryptographic strength and resistant against security attacks.
  • 关键词:Cryptography; Symmetric key; Chaotic Maps; Image encryption; NIST
国家哲学社会科学文献中心版权所有