4.7 Article

Quantum logistic image encryption algorithm based on SHA-3 and RSA

期刊

NONLINEAR DYNAMICS
卷 104, 期 3, 页码 2807-2827

出版社

SPRINGER
DOI: 10.1007/s11071-021-06422-2

关键词

SHA-3; RSA; Quantum logistic map; Secure communication; Image encryption

资金

  1. National Natural Science Foundation of China [61972103]
  2. Natural Science Foundation of Guangdong Province of China [2019A1515011361]
  3. Key Scientific Research Project of Education Department of Guangdong Province of China [2020ZDZX3064]

向作者/读者索取更多资源

The study introduces a quantum logistic image encryption algorithm based on RSA and SHA-3 algorithms, which enhances resistance to cryptographic attacks and is suitable for secure communication of network images.
This study proposes a quantum logistic image encryption algorithm based on the Rivest-Shamir-Adleman (RSA) and secure hash (SHA-3) algorithms. First, the asymmetric encryption algorithm RSA is used to randomly generate key pairs with private key and public key. A fixed matrix is then produced to confuse the plain image by additive modular operation and get preprocessed image. Second, the preprocessed image is computed by the hash function SHA-3 to obtain the plain message that is then stored secretly. Using RSA algorithm, the cipher message can be obtained corresponding to the plain message. After combining both the plain and cipher messages, the initial conditions of the quantum logistic map are calculated using a new mathematical model. Random keystream can then be generated from the quantum logistic map. Third, the keystream is further employed to cyclically confuse row and column pixels in the preprocessed image with different directions. Then, diffusion operations to odd row and odd column are carried out followed by even row and column, respectively. Finally, the cipher image can be reconstructed by both inverse cyclic confusion and inverse diffusion to each row and column. The test results show that the algorithm has strong plaintext sensitivity and key sensitivity as well as an enhanced ability to resist various cryptographic attacks. Therefore, the proposed algorithm is suitable for secure communication of network image in conjunction with a public cryptosystem.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据