4.5 Article

Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption

期刊

COMPLEXITY
卷 2020, 期 -, 页码 -

出版社

WILEY-HINDAWI
DOI: 10.1155/2020/8274685

关键词

-

资金

  1. National Natural Science Foundation of China [61504013, 61702052, 61901169, 61674054]
  2. Natural Science Foundation of Hunan Province [2019JJ50648, 2020JJ4622, 2019JJ40190, 2020JJ4221]
  3. Guangxi Key Laboratory of Cryptography and Information Security [GCIS201919]
  4. Postgraduate Training Innovation Base Construction Project of Hunan Province [2020-172-48]
  5. Postgraduate Scientic Research Innovation Project of Hunan Province [CX20200884]
  6. Scientific Research Fund of Hunan Provincial Education Department [18A137]
  7. Young Teacher Development Program Project of Changsha University of Science and Technology [2019QJCZ013]

向作者/读者索取更多资源

In this paper, we propose a method to design the pseudorandom number generator (PRNG) using three kinds of four-wing memristive hyperchaotic systems (FWMHSs) with different dimensions as multientropy sources. The principle of this method is to obtain pseudorandom numbers with good randomness by coupling XOR operation on the three kinds of FWMHSs with different dimensions. In order to prove its potential application in secure communication, the security of PRNG based on this scheme is analyzed from the perspective of cryptography. In addition, PRNG has passed the NIST 800.22 and ENT test, which shows that PRNG has good statistical characteristics. Finally, an image encryption algorithm based on PRNG is adopted. In the encryption algorithm, the optimized Arnold matrix scrambling method and the diffusion processing based on XOR are used to obtain the final encrypted image. Through the evaluation of encryption performance, it is concluded that there is no direct relationship between the pristine image and encrypted image. The results show that the proposed image encryption scheme has good statistical output characteristics and security performance in line with cryptography.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据