Implementing hardware primitives into cryptosystem has become a new trend in electronic community.Memristor,with intrinsic stochastic characteristics including the switching voltages,times and energies,as well as the ...Implementing hardware primitives into cryptosystem has become a new trend in electronic community.Memristor,with intrinsic stochastic characteristics including the switching voltages,times and energies,as well as the fluctuations of the resistance state over time,could be a naturally good entropy source for cryptographic key generation.In this study,based on kinetic Monte Carlo Simula-tion,multiple Artificial Intelligence techniques,as well as kernel density map and time constant analysis,memristive spatiotemporal variability within graphene based conductive bridging RAM(CBRAM)have been synergistically analyzed to verify the inher-ent randomness of the memristive stochasticity.Moreover,the ran-dom number based on hardware primitives passed the Hamming Distance calculation with high randomness and uniqueness,and has been integrated into a Rivest-Shamir-Adleman(RSA)cryptosystem.The security of the holistic cryptosystem relies both the modular arithmetic algorithm and the intrinsic randomness of the hardware primitive(to be more reliable,the random num-ber could be as large as possible,better larger than 2048 bits as NIST suggested).The spatiotemporal-variability-based random number is highly random,physically unpredictable and machinelearningattack resilient,improving the robustness of the entire cryptosystem.展开更多
Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shami...Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8.展开更多
Despite many online messaging services,short message service(SMS)is still used because of its simplicity.However,such services can be easily cracked,making SMS more vulnerable to send confidential information.Therefor...Despite many online messaging services,short message service(SMS)is still used because of its simplicity.However,such services can be easily cracked,making SMS more vulnerable to send confidential information.Therefore,appropriate cryptographic algorithms must be applied to ensure security.One of the most common cryptographic techniques used for encrypting and decrypting messages is the Vigenere cipher.However,Vigenere cipher can be cracked easily because the previous approach involved 26×10 matrixes,and the key comprised of alphabets.If the key length is small,then it becomes easier to crack the plain text by permutation.So here in this work,we have proposed a modified Vigenere cipher technique to enhance its security standards.Existing Vigenere cipher attack is not more secured,and thus we developed a method that improves the security in Vigenere cipher using Rivest-Shamir-Adleman(RSA).RSA is an asymmetric algorithm that has public and private keys.The advantage of using this algorithm is that finding factors for the large composite numbers is difficult.This method is secured but time consuming.In this proposed method,we combined RSA with Vigenere cipher so that the proposed algorithm is secured and consumes less time than RSA algorithm.This approach is widely used to encrypt SMS.展开更多
We propose a new asymmetric pixel confusion algorithm for images based on the Rivest-Shamir-Adleman(RSA)public-key cryptosystem and Arnold map.First,the RSA asymmetric algorithm is used to generate two groups of Arnol...We propose a new asymmetric pixel confusion algorithm for images based on the Rivest-Shamir-Adleman(RSA)public-key cryptosystem and Arnold map.First,the RSA asymmetric algorithm is used to generate two groups of Arnold transform parameters to address the problem of symmetrical distribution of Arnold map parameters.Second,the image is divided into blocks,and the first group of parameters is used to perform Arnold confusion on each sub-block.Then,the second group of parameters is used to perform Arnold confusion on the entire image.The image correlation is thereby fully weakened,and the image confusion degree and effect are further enhanced.The experimental results show that the proposed image pixel confusion algorithm has better confusion effect than the classical Arnold map based confusion and the row-column exchange based confusion.Specifically,the values of gray difference are close to one.In addition,the security of the new confusion operation is dependent on RSA,and it can act as one part of a confusion-substitution structure in a cipher.展开更多
基金This study was supported by grants from National Nat-ural Science Foundation of China(62174008)Beijing Municipal Education Commission(KZ202110005001)+1 种基金the Ministry of Science and Technology,Taiwan,China(MOST 111-2119-M-492-002-MBK,MOST 111-2622-8-182-001-TS1,MOST 109-2221-E-182-013-MY3,and MOST 110-2221-E-182-043-MY3)the Chang Gung Memorial Hospital(CORPD2J0073).
文摘Implementing hardware primitives into cryptosystem has become a new trend in electronic community.Memristor,with intrinsic stochastic characteristics including the switching voltages,times and energies,as well as the fluctuations of the resistance state over time,could be a naturally good entropy source for cryptographic key generation.In this study,based on kinetic Monte Carlo Simula-tion,multiple Artificial Intelligence techniques,as well as kernel density map and time constant analysis,memristive spatiotemporal variability within graphene based conductive bridging RAM(CBRAM)have been synergistically analyzed to verify the inher-ent randomness of the memristive stochasticity.Moreover,the ran-dom number based on hardware primitives passed the Hamming Distance calculation with high randomness and uniqueness,and has been integrated into a Rivest-Shamir-Adleman(RSA)cryptosystem.The security of the holistic cryptosystem relies both the modular arithmetic algorithm and the intrinsic randomness of the hardware primitive(to be more reliable,the random num-ber could be as large as possible,better larger than 2048 bits as NIST suggested).The spatiotemporal-variability-based random number is highly random,physically unpredictable and machinelearningattack resilient,improving the robustness of the entire cryptosystem.
基金the National Natural Science Foundation of China(Grant No.61972103)the Natural Science Foundation of Guangdong Province of China(Grant No.2023A1515011207)+3 种基金the Special Project in Key Area of General University in Guangdong Province of China(Grant No.2020ZDZX3064)the Characteristic Innovation Project of General University in Guangdong Province of China(Grant No.2022KTSCX051)the Postgraduate Education Innovation Project of Guangdong Ocean University of China(Grant No.202263)the Foundation of Guangdong Provincial Engineering and Technology Research Center of Far Sea Fisheries Management and Fishing of South China Sea.
文摘Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8.
文摘Despite many online messaging services,short message service(SMS)is still used because of its simplicity.However,such services can be easily cracked,making SMS more vulnerable to send confidential information.Therefore,appropriate cryptographic algorithms must be applied to ensure security.One of the most common cryptographic techniques used for encrypting and decrypting messages is the Vigenere cipher.However,Vigenere cipher can be cracked easily because the previous approach involved 26×10 matrixes,and the key comprised of alphabets.If the key length is small,then it becomes easier to crack the plain text by permutation.So here in this work,we have proposed a modified Vigenere cipher technique to enhance its security standards.Existing Vigenere cipher attack is not more secured,and thus we developed a method that improves the security in Vigenere cipher using Rivest-Shamir-Adleman(RSA).RSA is an asymmetric algorithm that has public and private keys.The advantage of using this algorithm is that finding factors for the large composite numbers is difficult.This method is secured but time consuming.In this proposed method,we combined RSA with Vigenere cipher so that the proposed algorithm is secured and consumes less time than RSA algorithm.This approach is widely used to encrypt SMS.
基金Project supported by the National Natural Science Foundation of China(Nos.61972103 and 61702116)the Natural Science Foundation of Guangdong Province,China(No.2019A1515011361)+1 种基金the Project of Enhancing School with Innovation of Guangdong Ocean University(No.Q18306)the Guangdong Postgraduate Education Innovation Project(No.2020JGXM059)。
文摘We propose a new asymmetric pixel confusion algorithm for images based on the Rivest-Shamir-Adleman(RSA)public-key cryptosystem and Arnold map.First,the RSA asymmetric algorithm is used to generate two groups of Arnold transform parameters to address the problem of symmetrical distribution of Arnold map parameters.Second,the image is divided into blocks,and the first group of parameters is used to perform Arnold confusion on each sub-block.Then,the second group of parameters is used to perform Arnold confusion on the entire image.The image correlation is thereby fully weakened,and the image confusion degree and effect are further enhanced.The experimental results show that the proposed image pixel confusion algorithm has better confusion effect than the classical Arnold map based confusion and the row-column exchange based confusion.Specifically,the values of gray difference are close to one.In addition,the security of the new confusion operation is dependent on RSA,and it can act as one part of a confusion-substitution structure in a cipher.