• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种受混沌理论启发的云计算异步双向加密机制。

A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing.

作者信息

Peechara Ravinder Rao, V Sucharita

机构信息

Department of Computer Science, Koneru Lakshmaiah Education Foundation, Guntur, Andra Pradesh, India.

Department of Computer Science and Engineering, Koneru Lakshmaiah Education FoundationGuntur, Andra Pradesh, India.

出版信息

PeerJ Comput Sci. 2021 Aug 9;7:e628. doi: 10.7717/peerj-cs.628. eCollection 2021.

DOI:10.7717/peerj-cs.628
PMID:34458569
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8372001/
Abstract

Data exchange over the Internet and other access channels is on the rise, leads to the insecurity of consequences. Many experiments have been conducted to investigate time-efficient and high-randomized encryption methods for the data. The latest studies, however, have still been debated because of different factors. The study outcomes do not yield completely random keys for encryption methods that are longer than this. Prominent repetition makes the processes predictable and susceptible to assaults. Furthermore, recently generated keys need recent algorithms to run at a high volume of transactional data successfully. In this article, the proposed solutions to these two critical issues are presented. In the beginning, one must use the chaotic series of events for generating keys is sufficient to obtain a high degree of randomness. Moreover, this work also proposes a novel and non-traditional validation test to determine the true randomness of the keys produced from a correlation algorithm. An approximate 100% probability of the vital phase over almost infinitely long-time intervals minimizes the algorithms' complexity for the higher volume of data security. It is suggested that these algorithms are mainly intended for cloud-based transactions. Data volume is potentially higher and extremely changeable 3% to 4% of the improvement in data transmission time with suggested algorithms. This research has the potential to improve communication systems over ten years by unblocking decades-long bottlenecks.

摘要

通过互联网和其他接入渠道进行的数据交换正在增加,这导致了不安全的后果。已经进行了许多实验来研究数据的高效且高度随机化的加密方法。然而,由于不同因素,最新的研究仍存在争议。对于比这更长的加密方法,研究结果并未产生完全随机的密钥。显著的重复使得过程可预测且容易受到攻击。此外,最近生成的密钥需要最新的算法才能成功处理大量的交易数据。在本文中,针对这两个关键问题提出了相应的解决方案。首先,使用混沌事件序列来生成密钥足以获得高度的随机性。此外,这项工作还提出了一种新颖的非传统验证测试,以确定由相关算法生成的密钥的真正随机性。在几乎无限长的时间间隔内,关键阶段的近似 100%概率可将算法的复杂度降至最低,以实现更高的数据安全性。建议这些算法主要用于基于云的交易。数据量可能更高且变化极大,使用建议算法可使数据传输时间提高 3%至 4%。这项研究有可能通过消除长达数十年的瓶颈来在十年内改善通信系统。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eb4f/8372001/68305de3eca7/peerj-cs-07-628-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eb4f/8372001/d81eb9f746d7/peerj-cs-07-628-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eb4f/8372001/d388c41d5ba1/peerj-cs-07-628-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eb4f/8372001/e8f587a73bd9/peerj-cs-07-628-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eb4f/8372001/68305de3eca7/peerj-cs-07-628-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eb4f/8372001/d81eb9f746d7/peerj-cs-07-628-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eb4f/8372001/d388c41d5ba1/peerj-cs-07-628-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eb4f/8372001/e8f587a73bd9/peerj-cs-07-628-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eb4f/8372001/68305de3eca7/peerj-cs-07-628-g004.jpg

相似文献

1
A chaos theory inspired, asynchronous two-way encryption mechanism for cloud computing.一种受混沌理论启发的云计算异步双向加密机制。
PeerJ Comput Sci. 2021 Aug 9;7:e628. doi: 10.7717/peerj-cs.628. eCollection 2021.
2
Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption.用于增强视频加密性能的混沌与朴素方法集成
ScientificWorldJournal. 2015;2015:458272. doi: 10.1155/2015/458272. Epub 2015 Oct 13.
3
A New Algorithm for Digital Image Encryption Based on Chaos Theory.一种基于混沌理论的数字图像加密新算法。
Entropy (Basel). 2021 Mar 13;23(3):341. doi: 10.3390/e23030341.
4
Enhanced Serpent algorithm using Lorenz 96 Chaos-based block key generation and parallel computing for RGB image encryption.基于洛伦兹96混沌的分组密钥生成及并行计算的增强型蛇形算法用于RGB图像加密
PeerJ Comput Sci. 2021 Dec 17;7:e812. doi: 10.7717/peerj-cs.812. eCollection 2021.
5
Data Access Control and Secured Data Sharing Approach for Health Care Data in Cloud Environment.云环境中医疗数据的数据访问控制和安全数据共享方法。
J Med Syst. 2019 Jul 1;43(8):258. doi: 10.1007/s10916-019-1381-7.
6
Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain.基于水下声学和骑士巡游链中的自然随机性的分组密码代换盒生成。
Comput Intell Neurosci. 2022 May 20;2022:8338508. doi: 10.1155/2022/8338508. eCollection 2022.
7
A novel algorithm for thermal image encryption.一种用于热图像加密的新型算法。
J Integr Neurosci. 2018;17(3-4):447-461. doi: 10.3233/JIN-180081.
8
Study on an efficient hyper-chaos-based image encryption scheme using global bit permutation.基于全局位置置乱的高效超混沌图像加密方案研究。
Technol Health Care. 2020;28(S1):303-309. doi: 10.3233/THC-209030.
9
Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine.基于二进制相移键控和混沌的远程医疗多用户通信方案。
Comput Methods Programs Biomed. 2018 Aug;162:165-175. doi: 10.1016/j.cmpb.2018.05.021. Epub 2018 May 17.
10
Non-Linear Hopped Chaos Parameters-Based Image Encryption Algorithm Using Histogram Equalization.基于直方图均衡化的非线性跳变混沌参数图像加密算法
Entropy (Basel). 2021 Apr 27;23(5):535. doi: 10.3390/e23050535.

本文引用的文献

1
Simultaneous fusion, compression, and encryption of multiple images.多图像的同步融合、压缩和加密。
Opt Express. 2011 Nov 21;19(24):24023-9. doi: 10.1364/OE.19.024023.