Bassem Abd-El-Atty, M. Amin, A. El-latif, H. Ugail, I. Mehmood
{"title":"基于Logistic-Chebyshev映射的高效密码系统","authors":"Bassem Abd-El-Atty, M. Amin, A. El-latif, H. Ugail, I. Mehmood","doi":"10.1109/SKIMA47702.2019.8982535","DOIUrl":null,"url":null,"abstract":"We utilise the Logistic-Chebyshev map as a cascade discrete-time chaotic system to design a new form of a cryptosystem. Based on the Logistic-Chebyshev map, we present a novel method for constructing substitution boxes or S-boxes. The performance of the proposed S-box scheme is investigated. Our results shows that the constructed S-box has significant qualities for viable applications in security related domains. Additionally, we utilise a new pseudo-random number generator (PRNG) scheme for the purpose of generating keystreams for further encryption. We utilise this technique to demonstrate how a PRNG based chaotic system can be utilsied for image encryption. Our simulation results and analysis show that the proposed scheme has efficient performance for cryptographic based image processing applications.","PeriodicalId":245523,"journal":{"name":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"771 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"An Efficient Cryptosystem based on the Logistic-Chebyshev Map\",\"authors\":\"Bassem Abd-El-Atty, M. Amin, A. El-latif, H. Ugail, I. Mehmood\",\"doi\":\"10.1109/SKIMA47702.2019.8982535\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We utilise the Logistic-Chebyshev map as a cascade discrete-time chaotic system to design a new form of a cryptosystem. Based on the Logistic-Chebyshev map, we present a novel method for constructing substitution boxes or S-boxes. The performance of the proposed S-box scheme is investigated. Our results shows that the constructed S-box has significant qualities for viable applications in security related domains. Additionally, we utilise a new pseudo-random number generator (PRNG) scheme for the purpose of generating keystreams for further encryption. We utilise this technique to demonstrate how a PRNG based chaotic system can be utilsied for image encryption. Our simulation results and analysis show that the proposed scheme has efficient performance for cryptographic based image processing applications.\",\"PeriodicalId\":245523,\"journal\":{\"name\":\"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)\",\"volume\":\"771 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SKIMA47702.2019.8982535\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SKIMA47702.2019.8982535","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Efficient Cryptosystem based on the Logistic-Chebyshev Map
We utilise the Logistic-Chebyshev map as a cascade discrete-time chaotic system to design a new form of a cryptosystem. Based on the Logistic-Chebyshev map, we present a novel method for constructing substitution boxes or S-boxes. The performance of the proposed S-box scheme is investigated. Our results shows that the constructed S-box has significant qualities for viable applications in security related domains. Additionally, we utilise a new pseudo-random number generator (PRNG) scheme for the purpose of generating keystreams for further encryption. We utilise this technique to demonstrate how a PRNG based chaotic system can be utilsied for image encryption. Our simulation results and analysis show that the proposed scheme has efficient performance for cryptographic based image processing applications.