• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

通过在具有多处理器的嵌入式系统上执行并行计算来实现混沌密码系统。

Implementing a Chaotic Cryptosystem by Performing Parallel Computing on Embedded Systems with Multiprocessors.

作者信息

Flores-Vergara Abraham, Inzunza-González Everardo, García-Guerrero Enrique Efren, López-Bonilla Oscar Roberto, Rodríguez-Orozco Eduardo, Hernández-Ontiveros Juan Miguel, Cárdenas-Valdez José Ricardo, Tlelo-Cuautle Esteban

机构信息

UABC, Engineering, Architecture and Design Faculty, 22860 Ensenada, Mexico.

ITE, Department of Electrical and Electronic Engineering, Ensenada Institute of Technology, 22780 Ensenada, Mexico.

出版信息

Entropy (Basel). 2019 Mar 9;21(3):268. doi: 10.3390/e21030268.

DOI:10.3390/e21030268
PMID:33266983
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7514748/
Abstract

Profiling and parallel computing techniques in a cluster of six embedded systems with multiprocessors are introduced herein to implement a chaotic cryptosystem for digital color images. The proposed encryption method is based on stream encryption using a pseudo-random number generator with high-precision arithmetic and data processing in parallel with collective communication. The profiling and parallel computing techniques allow discovery of the optimal number of processors that are necessary to improve the efficiency of the cryptosystem. That is, the processing speed improves the time for generating chaotic sequences and execution of the encryption algorithm. In addition, the high numerical precision reduces the digital degradation in a chaotic system and increases the security levels of the cryptosystem. The security analysis confirms that the proposed cryptosystem is secure and robust against different attacks that have been widely reported in the literature. Accordingly, we highlight that the proposed encryption method is potentially feasible to be implemented in practical applications, such as modern telecommunication devices employing multiprocessors, e.g., smart phones, tablets, and in any embedded system with multi-core hardware.

摘要

本文介绍了在一个具有多处理器的六个嵌入式系统集群中的剖析和并行计算技术,以实现一种用于数字彩色图像的混沌密码系统。所提出的加密方法基于流加密,使用具有高精度算术的伪随机数生成器,并通过集体通信进行并行数据处理。剖析和并行计算技术有助于发现提高密码系统效率所需的最佳处理器数量。也就是说,处理速度缩短了生成混沌序列和执行加密算法的时间。此外,高数值精度减少了混沌系统中的数字退化,并提高了密码系统的安全级别。安全分析证实,所提出的密码系统对于文献中广泛报道的不同攻击是安全且稳健的。因此,我们强调所提出的加密方法在实际应用中具有潜在的可行性,例如采用多处理器的现代电信设备,如智能手机、平板电脑,以及任何具有多核硬件的嵌入式系统。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/ae1399b8b59b/entropy-21-00268-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/616f096cbbaf/entropy-21-00268-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/f42501f775ae/entropy-21-00268-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/dd7c963b06e8/entropy-21-00268-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/f148142a4a99/entropy-21-00268-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/754d5abe5c9d/entropy-21-00268-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/3f191633a84a/entropy-21-00268-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/b9f2b6b5f09a/entropy-21-00268-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/7d18ad157d4d/entropy-21-00268-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/191469ab27eb/entropy-21-00268-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/a2b19bc67900/entropy-21-00268-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/a4ab5a3ca444/entropy-21-00268-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/b75a1e20c5a7/entropy-21-00268-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/26d64757a3f2/entropy-21-00268-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/264b5449acb7/entropy-21-00268-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/c51a5a24b61a/entropy-21-00268-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/ae1399b8b59b/entropy-21-00268-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/616f096cbbaf/entropy-21-00268-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/f42501f775ae/entropy-21-00268-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/dd7c963b06e8/entropy-21-00268-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/f148142a4a99/entropy-21-00268-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/754d5abe5c9d/entropy-21-00268-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/3f191633a84a/entropy-21-00268-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/b9f2b6b5f09a/entropy-21-00268-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/7d18ad157d4d/entropy-21-00268-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/191469ab27eb/entropy-21-00268-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/a2b19bc67900/entropy-21-00268-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/a4ab5a3ca444/entropy-21-00268-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/b75a1e20c5a7/entropy-21-00268-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/26d64757a3f2/entropy-21-00268-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/264b5449acb7/entropy-21-00268-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/c51a5a24b61a/entropy-21-00268-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c635/7514748/ae1399b8b59b/entropy-21-00268-g016.jpg

相似文献

1
Implementing a Chaotic Cryptosystem by Performing Parallel Computing on Embedded Systems with Multiprocessors.通过在具有多处理器的嵌入式系统上执行并行计算来实现混沌密码系统。
Entropy (Basel). 2019 Mar 9;21(3):268. doi: 10.3390/e21030268.
2
A Secure and Fast Image Encryption Scheme Based on Double Chaotic S-Boxes.一种基于双混沌S盒的安全快速图像加密方案。
Entropy (Basel). 2019 Aug 13;21(8):790. doi: 10.3390/e21080790.
3
Secure chaotic map based block cryptosystem with application to camera sensor networks.基于安全混沌映射的分组密码体制及其在相机传感器网络中的应用。
Sensors (Basel). 2011;11(2):1607-19. doi: 10.3390/s110201607. Epub 2011 Jan 27.
4
Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps.基于分形的混合密码系统:利用RSA、同态加密和混沌映射增强图像加密
Entropy (Basel). 2023 Oct 25;25(11):1478. doi: 10.3390/e25111478.
5
Physical Layer Authenticated Image Encryption for IoT Network Based on Biometric Chaotic Signature for MPFrFT OFDM System.基于MPFrFT OFDM系统生物特征混沌签名的物联网网络物理层认证图像加密
Sensors (Basel). 2023 Sep 12;23(18):7843. doi: 10.3390/s23187843.
6
A Hardware Pseudo-Random Number Generator Using Stochastic Computing and Logistic Map.一种使用随机计算和逻辑斯谛映射的硬件伪随机数发生器。
Micromachines (Basel). 2020 Dec 30;12(1):31. doi: 10.3390/mi12010031.
7
A new spatiotemporally chaotic cryptosystem and its security and performance analyses.一种新的时空混沌密码系统及其安全性与性能分析。
Chaos. 2004 Sep;14(3):617-29. doi: 10.1063/1.1772731.
8
A new color image encryption scheme using CML and a fractional-order chaotic system.一种使用耦合映象格子(CML)和分数阶混沌系统的新型彩色图像加密方案。
PLoS One. 2015 Mar 31;10(3):e0119660. doi: 10.1371/journal.pone.0119660. eCollection 2015.
9
Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps.基于一维混沌映射组合的图像加密方案的改进密码分析与增强
Entropy (Basel). 2018 Nov 3;20(11):843. doi: 10.3390/e20110843.
10
Secure lightweight cryptosystem for IoT and pervasive computing.适用于物联网和普适计算的安全轻量级密码系统。
Sci Rep. 2022 Nov 16;12(1):19649. doi: 10.1038/s41598-022-20373-7.

引用本文的文献

1
Image Encryption Based on Pixel-Level Diffusion with Dynamic Filtering and DNA-Level Permutation with 3D Latin Cubes.基于动态滤波的像素级扩散和三维拉丁立方体的DNA级排列的图像加密
Entropy (Basel). 2019 Mar 24;21(3):319. doi: 10.3390/e21030319.
2
Design and Construction of an ROV for Underwater Exploration.水下探索用遥控潜水器的设计与制造。
Sensors (Basel). 2019 Dec 6;19(24):5387. doi: 10.3390/s19245387.

本文引用的文献

1
Three Techniques for Enhancing Chaos-Based Joint Compression and Encryption Schemes.增强基于混沌的联合压缩与加密方案的三种技术
Entropy (Basel). 2019 Jan 9;21(1):40. doi: 10.3390/e21010040.
2
Dynamics and Complexity of a New 4D Chaotic Laser System.一种新型四维混沌激光系统的动力学与复杂性
Entropy (Basel). 2019 Jan 7;21(1):34. doi: 10.3390/e21010034.
3
Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps.基于一维混沌映射组合的图像加密方案的改进密码分析与增强
Entropy (Basel). 2018 Nov 3;20(11):843. doi: 10.3390/e20110843.
4
A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256.一种基于混沌与安全哈希算法SHA - 256的新型图像加密算法
Entropy (Basel). 2018 Sep 19;20(9):716. doi: 10.3390/e20090716.
5
A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion.一种基于简单混沌映射的图像加密系统,该系统同时使用与明文相关的置换和扩散。
Entropy (Basel). 2018 Jul 18;20(7):535. doi: 10.3390/e20070535.
6
On the synchronization techniques of chaotic oscillators and their FPGA-based implementation for secure image transmission.基于混沌振荡器同步技术及其 FPGA 实现的安全图像传输。
PLoS One. 2019 Feb 6;14(2):e0209618. doi: 10.1371/journal.pone.0209618. eCollection 2019.
7
Hausdorff Distance Model-Based Identity Authentication for IP Circuits in Service-Centric Internet-of-Things Environment.基于 Hausdorff 距离模型的服务中心物联网环境中 IP 电路的身份认证。
Sensors (Basel). 2019 Jan 24;19(3):487. doi: 10.3390/s19030487.
8
The atomic simulation environment-a Python library for working with atoms.原子模拟环境——一个用于处理原子的Python库。
J Phys Condens Matter. 2017 Jul 12;29(27):273002. doi: 10.1088/1361-648X/aa680e. Epub 2017 Mar 21.
9
A chaos-based digital image encryption scheme with an improved diffusion strategy.一种具有改进扩散策略的基于混沌的数字图像加密方案。
Opt Express. 2012 Jan 30;20(3):2363-78. doi: 10.1364/OE.20.002363.