2010
DOI: 10.1007/s11071-010-9821-4
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic encryption algorithm based on alternant of stream cipher and block cipher

Abstract: In recent years, a growing number of discrete chaotic cryptographic algorithms have been proposed. However, most of them encounter some problems such as the lack of robustness and security. In this paper, a new encryption algorithm is proposed, which encrypts the plaintext based on alternant of the stream cipher and block cipher. A pseudo-random number is used to control which encryption mode is chosen. Using this algorithm, multiple kinds of files (such as TXT, DOC, WMA, and JPEG) are encrypted and decrypted,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
29
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 88 publications
(29 citation statements)
references
References 32 publications
0
29
0
Order By: Relevance
“…The security performance of the proposed stream cipher is evaluated in Table 8 as compared with four recent chaos-based image encryption systems [18][19][20][21]. This comparison is based on the mean values of the correlation coefficients, entropy and differential analysis.…”
Section: Comparison With Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The security performance of the proposed stream cipher is evaluated in Table 8 as compared with four recent chaos-based image encryption systems [18][19][20][21]. This comparison is based on the mean values of the correlation coefficients, entropy and differential analysis.…”
Section: Comparison With Previous Workmentioning
confidence: 99%
“…The work done by Huang [18] reports using Chebyshev function to generate the key stream to mask and permute image pixels in addition to two-dimentional Chebyshev function to avoid known-plaintext and chosen-plaintext attacks. Wang et al [19] also used three chaotic maps in his encryption that alters between block and stream ciphering. Liu and Wanga [20] utilised a true random number generator to provide the seed for a piecewise linear chaotic map which generates a key stream for image encryption.…”
Section: Introductionmentioning
confidence: 99%
“…Wang et al proposed to combine the permutation and diffusion operations [21] and in thus doing so, obtained a higher encryption speed. Many other algorithms presenting both higher encryption speed and security level have been proposed [22][23][24][25][26][27][28][29][30].…”
Section: Introductionmentioning
confidence: 99%
“…These features characterize excellent properties of diffusion and confusion, which are required by cryptography, especially secret key cryptosystems. The chaotic map has been used in the design of symmetric encryption protocols [2][3][4][5][6], S-boxes [7,8], and hash functions [9,10]. The key agreement protocol using a chaotic map also has been studied widely.…”
Section: Introductionmentioning
confidence: 99%