Abstract

In recent years, the research of chaos theory has developed from simple cognition and analysis to practical engineering application. In particular, hyperchaotic systems with more complex and changeable chaotic characteristics are more sensitive and unpredictable, so they are widely used in more fields. In this paper, two important engineering applications based on hyperchaos pseudorandom number generator (PRNG) and image encryption are studied. Firstly, the coupling 6D memristive hyperchaotic system and a 2D SF-SIMM discrete hyperchaotic mapping are used as the double entropy source structure. The double entropy source structure can realize a new PRNG that meets the security requirements, which can pass the NIST statistical test when the XOR postprocessing method is used. Secondly, based on the double entropy source structure, a new image encryption algorithm is proposed. The algorithm uses the diffusion-scrambling-diffusion encryption scheme to realize the conversion from the original plaintext image to the ciphertext image. Finally, we analyze the security of the proposed PRNG and image encryption mechanism, respectively. The results show that the proposed PRNG has good statistical output characteristics and the proposed image encryption scheme has high security, so they can be effectively applied in the field of information security and encryption system.

Highlights

  • With the rapid development of computer technology and communication technology, information has become an important resource in today’s society, and the information security issues caused by it have become increasingly prominent [1,2,3,4,5]

  • In [69], the authors presented a pseudorandom number generator (PRNG) algorithm based on two chaotic maps which enables to produce about 2213 pseudorandom sequences. en, in 2015, Stoyanov and Kordov [70] proposed to construct a PRNG based on two Tinkerbell maps and obtained that the key space of the system is 2183

  • Based on [36], the authors proposed a PRNG algorithm based on piecewise logistic map (PLM), which is an optimized version of logistic map. e security and efficiency of PRNG are analyzed. e key space of PLM is 9.14 × 1040

Read more

Summary

Introduction

With the rapid development of computer technology and communication technology, information has become an important resource in today’s society, and the information security issues caused by it have become increasingly prominent [1,2,3,4,5]. PRNs are widely used in image processing, the Internet of ings, and secure communications due to their. Complexity advantages such as fast generation, reusability, and relatively small storage memory required [12]. E rapid development of modern communication and information security technologies usually requires PRNs to have good randomness and complexity. E complexity of these sequences is low, and there are security flaws in the application of information security, and the application in cryptographic design is limited by the speed of password generation. How to construct a good PRNG and generate high-performance and high-quality PRNs has always been a hot topic for scholars

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call