Asymmetric image encryption method based on RSA and fractional order chaotic system

A chaotic system and encryption method technology, applied in digital transmission systems, secure communication through chaotic signals, transmission systems, etc., can solve the difficulties of incomplete restoration of plaintext images, secure key transmission and storage, and distribution and storage of symmetric encryption keys And other issues

Active Publication Date: 2020-04-03
GUANGDONG OCEAN UNIVERSITY
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The encryption and decryption of the symmetric cryptosystem use the same key, the problem is: how to securely transmit and store the key
At present, experts and scholars at home and abroad have proposed many image encryption algorithms, but there...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric image encryption method based on RSA and fractional order chaotic system
  • Asymmetric image encryption method based on RSA and fractional order chaotic system
  • Asymmetric image encryption method based on RSA and fractional order chaotic system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] Such as figure 1 As shown, an asymmetric image encryption method based on RSA and fractional order chaotic system includes the following steps:

[0079] S1: Use the RSA algorithm to randomly generate a pair of public and private keys, use the public key to encrypt randomly selected plaintext information, and obtain public ciphertext information;

[0080] S2: Establish a new conversion map to convert the public ciphertext information into the initial key;

[0081] S3: Substitute the initial key into the fractional hyperchaotic system equation, and obtain the key stream after iterating through the estimation and correction method;

[0082] S4: According to the obtained key stream, the final ciphertext image is obtained after performing XOR diffusion, single non-repetitive perturbation, Arnold random perturbation, modulus and circular left shift diffusion on the plaintext image, and the encryption of the asymmetric image is completed.

[0083] In the specific implementat...

Embodiment 2

[0085] More specifically, on the basis of Example 1, such as figure 2 As shown in the frame diagram of image encryption, input: a plaintext image P with a size of M×N, two prime numbers p=857, q=877, and public key e=29. Set four plaintext passwords: m 1 =3,m 2 =5,m 3 =7,m 4 =9, integration time step h=0.01, number of iterations k1=5000, k2=5000, order α=0.9, control parameters a'=5.1, b'=8.6, c'=6, d'=2.7, e '=0.01, f'=-9.4. According to symmetry, image 3 It is the image decryption frame diagram of the present invention.

[0086] In the specific implementation process, first, the receiving party randomly selects two larger different prime numbers p and q, and calculates n=p×q and f(n)=(p-1)×(q-1); for the selected The p and q used as the key are strictly kept secret; the receiver finds an integer e that satisfies gcd(f(n),e)=1 and 1

Embodiment 3

[0120] In the specific implementation process, the present invention is in terms of security testing, such as Figure 7 The histogram of the original Lena plot shown, Figure 8 The histogram of the shown encrypted Lena image; it can be seen that the histogram of the original plaintext image is ups and downs, and the encrypted ciphertext histogram is very flat, so the method of the present invention is safe and effective. Figure 9 is the original all-black image, Figure 10 is an encrypted all-black image, Figure 11 is the original all-white image, Figure 12 is an encrypted all-white image.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an asymmetric image encryption method based on RSA and a fractional order chaotic system, and the method comprises the steps: randomly generating a pair of public and private secret keys through an RSA algorithm, encrypting randomly selected plaintext information through a public key, and obtaining ciphertext information; establishing new conversion mapping, and converting the ciphertext information into an initial key; substituting the initial key into a fractional order hyperchaotic system equation to obtain a key stream; and performing exclusive-OR diffusion, single non-repeated disturbance, Arnold random disturbance, modulo addition and cyclic left shift diffusion on the plaintext image according to the key stream to obtain a final ciphertext image. According tothe asymmetric image encryption method, the RSA public key and the symmetric password are combined, and the encryption mode solves the problem that the symmetric password secret key is difficult to distribute. A new conversion mapping is designed, an integer generated by an RSA algorithm is converted into a decimal to serve as an initial value of a fractional order nonlinear chaotic system, and therefore a key stream is generated, and the problem that a plaintext image is not completely recovered is effectively solved.

Description

technical field [0001] The present invention relates to the technical field of image encryption, and more specifically, relates to an asymmetric image encryption method based on RSA and a fractional order chaotic system. Background technique [0002] As a simple, intuitive and informative information interaction carrier, images have always occupied an important position in people's work and life. However, the openness of the public network makes the protection of image information more and more widely concerned and researched by experts and scholars. [0003] According to the system classification, cryptography can be divided into symmetric cryptosystem and asymmetric cryptosystem. The encryption and decryption of the symmetric cryptosystem use the same key, the problem is: how to securely transmit and store the key. In an asymmetric cryptosystem, the encryption and decryption parties use different keys. The information encrypted by the public key can only be decrypted by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/08H04L9/30H04L29/06G06F21/60
CPCH04L9/001H04L9/0816H04L9/0861H04L9/302H04L63/0442G06F21/602Y02D30/50
Inventor 黄小玲董友霞叶国栋潘晨焦开心
Owner GUANGDONG OCEAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products