Abstract

In order to overcome the difficulty of key management in “one time pad” encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architecture of confusion and diffusion is adopted. Firstly, the surrounding of a plaintext image is surrounded by a sequence generated from the SHA-256 hash value of the plaintext to ensure that each encrypted result is different. Secondly, the image is scrambled according to the random sequence obtained by adding the disturbance term associated with the plaintext to the chaotic sequence. Third, the cyphertext (plaintext) feedback mechanism of the dynamic index in the diffusion stage is adopted, that is, the location index of the cyphertext (plaintext) used for feedback is dynamic. The above measures can ensure that the algorithm can resist chosen plaintext attacks and can overcome the difficulty of key management in “one time pad” encryption scheme. Also, experimental results such as key space analysis, key sensitivity analysis, differential analysis, histograms, information entropy, and correlation coefficients show that the image encryption algorithm is safe and reliable, and has high application potential.

Highlights

  • In recent years, with the rapid development of computer technology, digital image processing technology has rapidly developed and penetrated into all aspects of life, such as remote sensing, industrial detection, medicine, meteorology, communication, investigation, intelligent robots, etc.image information has attracted widespread attention

  • The hash value of the image is not needed in decryption, which reduces the difficulty of key management

  • Gfurther is not part of the the sequence tt is which different when different images, which strengthens the decryption key, which reduces the difficulty of key management

Read more

Summary

A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256

School of Information Science and Engineering, Central South University, Changsha 410083, China School of Physics and Electronics, Central South University, Changsha 410083, China Guangxi Colleges and Universities Key Laboratory of Complex System Optimization and Big Data Received: 23 August 2018; Accepted: 17 September 2018; Published: 19 September 2018

Introduction
Adding Surrounding Pixels
Hyper-Chaotic System and Chebyshev Map
Statistical
Architecture of the Proposed Cryptosystem
Encryption Algorithm
Decryption Algorithm
Application of the Algorithm for Color Images
The Advantages in the New Encryption Scheme
Results
Key Space
Key Sensitivity
Statistical Analysis
Statistical Histogram Analysis
Chi-Square
Information Entropy
Computational Speed Analysis
This shows our algorithm
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.