Patsnap Eureka AI that helps you search prior art, draft patents, and assess FTO risks, powered by patent and scientific literature data.
54 results about "Known-plaintext attack" patented technology
Filter
Efficacy Topic
Property
Owner
Technical Advancement
Application Domain
Technology Topic
Technology Field Word
Patent Country/Region
Patent Type
Patent Status
Application Year
Inventor
The known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib), and its encrypted version (ciphertext). These can be used to reveal further secret information such as secret keys and code books. The term "crib" originated at Bletchley Park, the British World War II decryption operation.
The invention relates to an image encryption method and an image decryption method with visual security and data security based on compressed sensing. The image encryption method comprises the steps of: firstly, utilizing an SHA 256 hash function to obtain a 256-bit hash value of a plaintext image as an image secret key, and calculating initial numerical values of one-dimensional skew tent chaotic mapping and zigzag scrambling; carrying out sparse processing on the plaintext image, and carrying out zigzag scrambling on a coefficient matrix; and then utilizing the one-dimensional skew tent chaotic mapping to generate a measurement matrix, measuring and quantifying a scrambling matrix to obtain a compressed and encrypted image, and embedding the image into a carrier image with visual significance to obtain a final ciphertext image with visual significance. The image encryption method realizes the visual security and data security of the plaintext image, has large secret key space, is highly sensitive to plaintext, has higher capacity of resisting brute-force attack, chosen-plaintext attack and known-plaintext attack, does not need an additional storage space, and can transmit and store the ciphertext image quickly and effectively.
The invention relates to an image encryptionalgorithm based on a chaoticsystem, used for solving security problems that the image encryptionalgorithm is small in key space and poor in capacity of resisting to plaintext attacks. The algorithm comprises four modules such as a hyperchaos sequence generator, a forward diffusion module, a scrambling module and a reverse diffusion module. Firstly thehyperchaos Chen system is used for generating four chaotic pseudorandom sequences, a chaotic sequence and a plaintext image are used for performing forward diffusion operation to acquire a matrix A,then computation is performed in combination with the pseudorandom sequences and information related to the plaintext image to acquire a scrambled coordinate, the coordinate scrambling is performed onthe matrix A to acquire a matrix B, and at last the chaotic pseudorandom sequences and the matrix B are used for performing reverse diffusion operation to acquire a ciphertext image C. An experimentsimulation result expresses that the algorithm can improve the defect that the image encryption algorithm is small in key space, effectively resist to statistical attacks, differential attacks, and chosen-plaintext attacks, and achieve good encryption effect.
The invention discloses an asymmetric double-image encryption method based on a joint of a fourier transformation and a phase cutting. Under modulation of random phase masks, two plain texts are modulated by the joint of the fourier transformation and the phase cutting, so that symmetrical and linear characteristics of a traditional double random phase encryption method are eliminated, so that the anti-attack capability of the encryptionsystem is greatly improved. An encryption process, a decryption process and the asymmetry of an encryption key and a decryption key are achieved, and an optical asymmetric encryption system based on the double random encryption method is established. The test shows that, compared with traditional double random encryption techniques which are easy to be attacked, the asymmetric double image encryption method can resist violent attacks, known plaintext attacks, direct public key attacks and iterative amplitude recoveryalgorithm attacks, so that high security is provided.
A common key block encryption device includes a first hash unit applying locked key permutation to a variable-length s-bit plaintext, and outputting a fixed-length n-bit first block and a second (s-n)-bit block; a first encryptionprocessing unit outputting a third block encrypted by element of n-bit block tweakable block cipher using tweak, inputting the first block; a second encryptionprocessing unit generating a random number (s-n)-bit block with a result of group computation of the third block and the first block as input by using an arbitrary cipher having theoretical security at least against a known-plaintextattack; and a second hash unit applying the locked key permutation to the result of the group computation of the random number block and the second block, and to the third block to output a fifth n-bit block and a sixth (s-n)-bit block. The fifth and sixth blocks are concatenated into an s-bit encryption.
The present invention provides an encryption method for a video data, which comprises the following procedures: the macro block information of the video data is abstracted; a primary scrambling matrix is created; the macro block information is scrambled according to the primary scrambling matrix; the scrambling result of the primary scrambling matrix is divided into a plurality of areas, and a relative area scrambling rule for each area is determined; a secondary scrambling matrix for the entire video data is gained according to the collocation result by the coding information and the relative area scrambling rule of the macro block in each area; the scrambling result of the primary scrambling matrix is scrambled again according to the secondary scrambling matrix; a stream data is built and an encryption result is gained. The present invention solves the problem of the existing macro block scrambling algorithm that a partial encryption effect is inadequate, provides a better visual encryption effect, and the known plain textattack is ineffective. In conclusion, the present invention does not increase the stream, the speed is quick, the computing source occupation is low, the security is high, and the present invention is more suitable for the most real time application scene of the video encryption.
A Method and Apparatus for a Security System for Wireless Networks is described. The technique involves encryption and decryption at the Physical layer. It also develops a criterion for choosing the encryption / decryption methodology for a particular embodiment for communication systems typically using a Viterbi Decoder and describes how the difficult-to-invert property of the Viterbi Decoder can be utilized to provide security against known-plaintext attacks. Some candidate encryption / decryption methodologies satisfying the developed criterion are also discussed.
The embodiment of the invention discloses a streaming media video encryption method and device based on H.264. The encryption method includes the steps that context-based adaptive variable length coding and QTC encryption are synchronously performed on the QTC, and the processed QTC is obtained; the prediction mode and motion vectors are scrambled, and the scrambled prediction mode and the scrambled motion vectors are obtained; multiplexing is performed on the processed QTC, the scrambled prediction mode and the scrambled motion vectors, and encrypted video data streams are input. Through the encryption method and device, the intra-frame prediction mode scrambling method in the prior art is improved, and Friedman key guessing and known plaintext attach can be prevented; safety of motion content is enhanced; the method is easy to achieve, real-time application complexity of data encryption in real-time application can be reduced, and the code error robustness of transmission of encrypted code streams is improved.
The invention discloses an image encryption method based on the projection synchronization of a hyperchaotic system. The method comprises the steps of plaintext image quantifying and ciphertext image quantifying. The first step comprises generating of a hyperchaotic sequence of a hyperchaotic driving system, image row scrambling, image column scrambling, image diffusing, circulation image row scrambling, image column scrambling, multiple rounds of image diffusing, and a ciphertext image is acquired. The second step comprises ciphertext image quantifying, generating of a hyperchaotic sequence of a hyperchaotic response system, time acquiring, column scrambling index and line scrambling index valuing, image inverse diffusing, image inverse column scrambling, image inverse row scrambling, circulation image inverse diffusing, image inverse column scrambling, multiple rounds of image inverse row scrambling, and a decrypted image is acquired. According to the invention, a feedback mechanism with the current image is introduced; the row (column) scrambling address code and the key matrix are dynamically changed in each round of encryption; experiments show that the method has the advantages of good encryption effect, high security and large key space, can resist selected plaintext attacks, known plaintext attacks and various statistical attacks.
The invention discloses a homomorphic encryptionalgorithm based on modulo-like oepration. The homomorphic encryptionalgorithm comprises following steps: step 1, system initialization: key generationand parameter selection; step 2, encryption operation: primary encryption transform and homomorphic encryption operation; and step 3, decryption operation: homomorphic decryption operation and primary encryption inverse transform. According to the homomorphic encryption algorithm, known plaintext attacks can be resisted, and the leakage of plaintext information and an algorithm structure can be effectively avoided; and a conventional random function is replaced by an interference function so that the consumption of computing resources caused by generation of random numbers is avoided, and theexecution efficiency of the algorithm on a cloud computing platform is effectively improved.
The present invention provides a JPEG image encryption method compatible in format and invariant in size, and belongs to the technical field of multimedia information safety. The method of the presentinvention includes three encryption steps: 1) classifying and scrambling AC coefficient-encoded zero runs; 2) grouping and scrambling DC coefficient-differentially encoded adjacent same symbols; 3) grouping and iteratively encrypting DC coefficient differential codes. According to the invention, the method can be used for protecting the safety and the privacy of military images, commercial images, medical images or personal images when the images are transmitted through a public channel or stored in the public cloud. The method aims to improve the ubiquitous defect that the size of a ciphertext image increases and the format compatibility of the image is not ideal based on existing JPEG image encryption methods. The above method can resist the known-plaintextattack, and substantially maintain the size of the ciphertext image to be unchanged. Meanwhile, the format compatibility is better and the encryption strength is adjustable.
The invention provides an optical imageencryption method based on circuitous cylindrical diffraction and compressive sensing. According to the method, a simple improvement on a classical first-compressive sensing and second-double random phase encoding encryption technique is performed, a cylindrical phase plate is used to replace a plane phase plate, and two reflection relay cylindrical diffraction processes are used to replace two continuous relay plane diffraction processes. By using the asymmetry between the two reflection relay cylindrical diffraction processes and a reverse process, thesecurity of the encryption method can be greatly improved, particularly, known plaintext attacks, ciphertext-only attacks and phase recovery attacks can be effectively resisted, keys are large in number and strong in sensitivity, a large key space can be realized, and good security can be ensured.
A configuration method of an optical signal, an encryption device, and an encryptionsystem makes it possible for a legitimate communicating party to ensure information-theoretic security against a known plain textattack and to communicate long-distance. By adding a transmission information data sequence randomization device to the Yuen encrypted communications device according to the present information, which divides transmission information data into blocks, appends sequence numbers thereto, randomly switches the sequence of the blocks with a digitized signal of output of an electrical noise generator, and inputs same into a transmission data generator of a conventional Yuen encrypted optical transmitter, the relation between a known transmission information data sequence (plain text) and an optical signal which is outputted from the transmitter is randomized, allowing forcibly making even a circumstance wherein a known-plain textattack would be possible into a cipher-text-only attack, realizing information-theoretic security against a known-plain text attack.
The invention provides an image encryption method based on a filling curve and adjacent pixel bit scrambling. The method comprises the following steps: converting a gray level image into a two-dimensional image matrix; calculating a hash value of the image matrix, and calculating an initial value of a four-dimensional hyper-chaoticsystem; scrambling the image matrix by using the V-shaped filling curve, and transposing the image matrix for second scrambling; iterating the hyper-chaoticsystem according to the obtained initial value to respectively obtain four chaotic sequences; taking one chaotic sequence as a starting point and one chaotic sequence as a step length, and performing adjacent pixel bit scrambling by utilizing binary bits of adjacent pixels of a Josephf traversal image matrix; and performing forward diffusion and reverse diffusion on the image by using a sequence matrix obtained by the chaotic sequence to obtain a ciphertext image. According to the invention, the high correlation between the pixels is broken through dual replacement of the bit level and the pixel level, selection / known plaintext attacks and common image related statistical attacks are overcome, and the method has high key sensitivity and differential attack resistance.
The invention belongs to the field of communication signalencryption technology, and specifically designs a packet physical layerencryption method based on matrix transformation. The method comprises the following steps: (1) transforming plaintext signals S into an information sequence S' through bits; (2) modulating the information sequence S' to obtain modulation information X; and (3) performing block transformation on the modulation information X according to key information to output ciphertext signals Y. The invention also provides a packet physical layerencryption method of a block chaining mode, which adds a logical operation vector based on the matrix physical layer encryption method based on matrix transformation, so that each ciphertext block depends on all plaintext blocks in front. The method has larger ciphertext space and key space, increases the difficulty of deciphering, can resist known plaintext attacks and selective plaintext attacks, can protect training symbols, and has no loss on bit error rate performance but high constellation map chaos, and well protects constellation information.
The invention provides an image encryption method based on integer wavelet transform and compressed sensing, and solves the problem of insufficient encryption security of a mode of directly embedding a carrier after compressed sensing in a current spatial domain image encryption method based on compressed sensing. The method comprises the steps: preprocessing a plaintext image, and associating a random sequence generated by a chaoticsystem with plaintext image information, so that known plaintext attacks and selected plaintext attacks can be powerfully resisted; carrying out sparse processing on the preprocessed plaintext image, and sequentially carrying out scrambling operation; generating a measurement matrix, carrying out compressed sensing on a plaintext image after scrambling operation by using the measurement matrix, executing diffusion operation before embedding a carrier image to further improve the security of image encryption, finally obtaining a frequency coefficient by using integer wavelet transform, carrying out embedding operation on the carrier image, and then executing inverse integer wavelet transform. The data loss caused by frequency domain transformation is reduced, and the encryption security of the image information is improved.
The invention relates to the technical field of image information safety and light information processing and aims at effectively resisting known plaintext attack and selected plaintextattack, making key management and transmission convenient, further ensuring the safety and obtaining good violent attack, statistics attack, noise attack and shear attack resisting capability. According to the adopted technical scheme, a regularized cosine transformation chaotic double-random phase encoding optical imageencryption method comprises the following steps that 1, a two-dimensional regularized cosine transformation CCT system is established; 2, a chaotic secret key is generated, wherein two random phase masks playing a main secret key effect are respectively generated by a one-dimensional sine chaoticsystem controlled by different chaotic parameters, and an initial value and control parameters of the sine chaotic system serve as main secret keys; 3, image encryption and decryption process is performed, wherein decrypted images are obtained. The method is mainly applied to image information safety and light information processing occasions.
The invention discloses a region-of-interest medical image chaoticencryption method based on an information entropy update key, and relates to the technical field of image information security, whichcan overcome the security defects that an existing medical image encryption technology is low in encryption efficiency and cannot resist attacks of known plaintexts and selected plaintexts. Accordingto the information entropy updating key-based region-of-interest medical image chaotic encryption and decryption method provided by the invention, the region-of-interest of the medical image is processed by utilizing wavelet transform, so that the frequency domain encryption of the image is realized. Meanwhile, the hyperchaotic system is used for scrambling and diffusing the region of interest ofthe medical image, so that the protection of the image in a spatial domain is realized. Besides, according to the information entropy key updating method designed by the invention, the key is not only related to the parameters of the chaoticsystem, but also related to the plaintext image, so that known plaintext attacks or selected plaintext attacks can be resisted.
A new cryptographic technique is disclosed, called decoy bits method, which can be used to obtain near ideal information theoretic security in both quantum and classical key generation and data encryption, not only for raw security but also under known-plaintext attacks. The technique relates to a method of data encryption by insertion of random bits, called decoy bits, into a data sequence whereby the decoy bits are discarded upon decryption. The positions of the decoy bits are determined by a decoy position determining mechanism. This method can be used in conjunction with other standards of encryption to increase security.
The invention discloses an encryption and decryption method based on coupling and self-triggering cellular automata. The encryption and decryption method comprises: according to the properties of the coupling and self-triggering cellular automata, adopting n interactional cellular automata as an entirety, and constructing an encryption and decryption system of coupling and self-triggering cellular automata. A simulation experiment result indicates that the algorithm greatly improves the key space and effectively prevents brute forceattack; and meanwhile, when a random number is introduced in an encryption process to prevent an attacker from obtaining an exclusive plaintext and ciphertext pair, so that known plaintext attach and selective ciphertext attach are effectively prevented.
A common key block encryption device includes a first hash unit applying locked key permutation to a variable-length s-bit plaintext, and outputting a fixed-length n-bit first block and a second (s-n)-bit block; a first encryptionprocessing unit outputting a third block encrypted by element of n-bit block tweakable block cipher using tweak, inputting the first block; a second encryptionprocessing unit generating a random number (s-n)-bit block with a result of group computation of the third block and the first block as input by using an arbitrary cipher having theoretical security at least against a known-plaintextattack; and a second hash unit applying the locked key permutation to the result of the group computation of the random number block and the second block, and to the third block to output a fifth n-bit block and a sixth (s-n)-bit block. The fifth and sixth blocks are concatenated into an s-bit encryption.
The invention relates to a multi-diffusion image encryption and decryption method based on cellular neural network chaos, which relates to the technical field of image encryption and solves the problems that the existing image encryption method is insufficient in key space and insufficient in randomness and solves the safety defects that known plaintext attacks and selected plaintext attacks can not be effectively resisted. A chaos control table and a quantum exchange table are generated by a quantumcellular neural network, intra-block and inter-block scrambling for plaintext images is carried out, and the correlation between image pixels is removed through multiple chaoticdiffusion steps with positive and negative diffusion and dynamic diffusion included. A quantumcellular neural network hyperchaotic system has a higher key dimension, larger key space, stronger sensitivity and stronger ability to resist various safety attacks, and as a quantum chaoticsystem is a novel nano-scale device which mutually transmits information under Coulomb interaction between quantum dots and a quantum cellular automata, the quantum cellular neural network hyperchaotic system has the advantages ofultra-high integration, low power consumption, lead-free integration and the like.
A new cryptographic technique is disclosed, called decoy bits method, which can be used to obtain near ideal information theoretic security in both quantum and classical key generation and data encryption, not only for raw security but also under known-plaintext attacks. The technique relates to a method of data encryption by insertion of random bits, called decoy bits, into a data sequence whereby the decoy bits are discarded upon decryption. The positions of the decoy bits are determined by a decoy position determining mechanism. This method can be used in conjunction with other standards of encryption to increase security.
The invention relates to the technical field of image information security and optical information processing, can effectively resist known-plaintextattack and chosen-plaintextattack, and solves the problem of being inconvenient in key management and transmission on an aspect of key generation so as to further guarantee security. The optical imageencryption method based on four-step generalized phase shifting and multi-step Fresnel transform comprises the following steps of: 1) a key generation part: two random phase masks which perform a main key function are independently generated by Tinkerbell chaotic systems controlled by different chaotic parameters; 2) an image encryption part: four holograms are used for obtaining an encrypted image; and 3) an image decryption part: after an input image is subjected to Fresnel inverse transform of which the distance is Z2, the input image is subjected to complex conjugation modulation by a second chaotic random phase mask and is subjected to the complex conjugation modulation by a first chaotic random phase mask, and then, the obtained input image is subjected to the Fresnel inverse transform of which the distance is Z to obtain a decrypted image. The method is mainly applied to the field of image information security.
The invention discloses a video encryption method for resisting contour attacks, which comprises the following steps of receiving a video to be encrypted, and decoding a bit stream of the video; dividing the macro block of the current frame into four regions, wherein the macro blocks in each region respectively form a one-dimensional macro block sequence; scrambling the macro block sequence by using chaotic mapping; using a 2D-LSCM for generating chaotic sequences with the number equal to that of non-zero DCT coefficients of the current frame, and conducting exclusive-OR operation encryption on the chaotic sequences and sign bits of the DCT coefficients; and performing partial recoding on syntax elements of the macro block changed by the encryption operation in the to-be-encrypted video toobtain an encrypted video bit stream, thereby finishing encryption. According to the invention, encryption is realized by using optimally designed macro block scrambling, so that various types of existing contour attacks can be effectively resisted. Meanwhile, the encryption key of the method is related to the non-zero DCT coefficient quantity histogram of the video frame to be encrypted, so thatthe known plaintext attack can be effectively resisted.
[Problem] To perform, by use of an existing encryption scheme, an encryption that is excellent in encoding rate and suitable for streamencryption and that exhibits a high security against known plain text attacks. [Solution] From a random number sequence matrix consisting of random number sequences having no mutual correlations and having different lengths, a random number sequence is selected by using, as an index, a random number that is independently generated by means of a physical random number or the like. A plain text to be encrypted is then camouflaged on the basis of the selected random number sequence, further coupled to the aforementioned random number and thereafter subjected to application of a conventional type of encryption algorithm.
The invention discloses technique includes encrpytion and decrpytion at physical layer. The invention also develops guidelines for specific implement case to select method of encrpytion / decrpytion. The said implement case is in use for communication system of using typical viterbi decoder. The invention also discloses how to implement characteristic of viterbi decoder difficult to be reversed in order to provide security for preventing known-plain textattack. The invention also discusses candidate method of encrpytion / decrpytion of satisfying the said guidelines of development.