• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于椭圆曲线的伪随机数生成器的通用框架及其在图像加密中的应用。

A generalized framework for elliptic curves based PRNG and its utilization in image encryption.

作者信息

AbdElHaleem Sherif H, Abd-El-Hafiz Salwa K, Radwan Ahmed G

机构信息

Engineering Mathematics Department, Faculty of Engineering, Cairo University, Giza, 12613, Egypt.

School of Engineering and Applied Sciences, Nile University, Giza, 12588, Egypt.

出版信息

Sci Rep. 2022 Aug 2;12(1):13278. doi: 10.1038/s41598-022-17045-x.

DOI:10.1038/s41598-022-17045-x
PMID:35918396
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9346143/
Abstract

In the last decade, Elliptic Curves (ECs) have shown their efficacy as a safe fundamental component in encryption systems, mainly when used in Pseudorandom Number Generator (PRNG) design. This paper proposes a framework for designing EC-based PRNG and maps recent PRNG design techniques into the framework, classifying them as iterative and non-iterative. Furthermore, a PRNG is designed based on the framework and verified using the National Institute of Standards and Technology (NIST) statistical test suite. The PRNG is then utilized in an image encryption system where statistical measures, differential attack measures, the NIST statistical test suite, and system key sensitivity analysis are used to demonstrate the system's security. The results are good and promising as compared with other related work.

摘要

在过去十年中,椭圆曲线(ECs)已证明其作为加密系统中安全基础组件的有效性,主要是在用于伪随机数生成器(PRNG)设计时。本文提出了一个基于椭圆曲线的伪随机数生成器设计框架,并将最近的伪随机数生成器设计技术映射到该框架中,将它们分类为迭代式和非迭代式。此外,基于该框架设计了一个伪随机数生成器,并使用美国国家标准与技术研究院(NIST)统计测试套件进行了验证。然后将该伪随机数生成器应用于图像加密系统,其中使用统计度量、差分攻击度量、NIST统计测试套件和系统密钥敏感性分析来证明系统的安全性。与其他相关工作相比,结果良好且前景乐观。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/8c210a15738e/41598_2022_17045_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/fba628427fba/41598_2022_17045_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/4b7c3a5c5104/41598_2022_17045_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/9a3b22f1bcd7/41598_2022_17045_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/7854af13c41d/41598_2022_17045_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/8c68bc3fc4a6/41598_2022_17045_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/1a9158165165/41598_2022_17045_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/73662b04d1f0/41598_2022_17045_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/3615896f9265/41598_2022_17045_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/7a5ccd7bd9ca/41598_2022_17045_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/86a270ca80f3/41598_2022_17045_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/6ba8e55a7725/41598_2022_17045_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/27cb5d4d7702/41598_2022_17045_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/8c210a15738e/41598_2022_17045_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/fba628427fba/41598_2022_17045_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/4b7c3a5c5104/41598_2022_17045_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/9a3b22f1bcd7/41598_2022_17045_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/7854af13c41d/41598_2022_17045_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/8c68bc3fc4a6/41598_2022_17045_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/1a9158165165/41598_2022_17045_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/73662b04d1f0/41598_2022_17045_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/3615896f9265/41598_2022_17045_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/7a5ccd7bd9ca/41598_2022_17045_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/86a270ca80f3/41598_2022_17045_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/6ba8e55a7725/41598_2022_17045_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/27cb5d4d7702/41598_2022_17045_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ff5/9346143/8c210a15738e/41598_2022_17045_Fig13_HTML.jpg

相似文献

1
A generalized framework for elliptic curves based PRNG and its utilization in image encryption.基于椭圆曲线的伪随机数生成器的通用框架及其在图像加密中的应用。
Sci Rep. 2022 Aug 2;12(1):13278. doi: 10.1038/s41598-022-17045-x.
2
Pseudorandom number generator based on novel 2D Hénon-Sine hyperchaotic map with microcontroller implementation.基于新型二维Hénon-Sine超混沌映射的伪随机数发生器及其微控制器实现
Nonlinear Dyn. 2023;111(7):6773-6789. doi: 10.1007/s11071-022-08101-2. Epub 2022 Nov 27.
3
A Pseudorandom Number Generator Based on the Chaotic Map and Quantum Random Walks.一种基于混沌映射和量子随机游走的伪随机数发生器。
Entropy (Basel). 2023 Jan 13;25(1):166. doi: 10.3390/e25010166.
4
Novel pseudo-random number generator based on quantum random walks.基于量子随机游走的新型伪随机数生成器。
Sci Rep. 2016 Feb 4;6:20362. doi: 10.1038/srep20362.
5
FPGA based implementation of a perturbed Chen oscillator for secure embedded cryptosystems.基于现场可编程门阵列实现用于安全嵌入式密码系统的扰动陈氏振荡器
Sci Rep. 2024 Sep 11;14(1):21262. doi: 10.1038/s41598-024-71531-y.
6
A Novel Image Encryption Scheme Based on Elliptic Curves over Finite Rings.一种基于有限环上椭圆曲线的新型图像加密方案。
Entropy (Basel). 2022 Apr 19;24(5):571. doi: 10.3390/e24050571.
7
A High-Performance FPGA PRNG Based on Multiple Deep-Dynamic Transformations.一种基于多重深度动态变换的高性能现场可编程门阵列伪随机数发生器
Entropy (Basel). 2024 Aug 7;26(8):671. doi: 10.3390/e26080671.
8
Symmetric encryption algorithms using chaotic and non-chaotic generators: A review.对称加密算法使用混沌和非混沌发生器:综述。
J Adv Res. 2016 Mar;7(2):193-208. doi: 10.1016/j.jare.2015.07.002. Epub 2015 Aug 1.
9
Generalized double-humped logistic map-based medical image encryption.基于广义双峰逻辑斯谛映射的医学图像加密
J Adv Res. 2018 Feb 3;10:85-98. doi: 10.1016/j.jare.2018.01.009. eCollection 2018 Mar.
10
Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application.基于深度卷积神经网络的用于网络安全图像加密应用的认证公钥椭圆曲线
Sensors (Basel). 2023 Jul 21;23(14):6589. doi: 10.3390/s23146589.

引用本文的文献

1
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications.基于复数理论的圆锥曲线加密与数字签名在网络安全应用中的研究
Sci Rep. 2025 Jul 1;15(1):21566. doi: 10.1038/s41598-025-00334-6.
2
Security primitives for memoryless IoT devices based on Physical Unclonable Functions and True Random Number Generators.基于物理不可克隆函数和真随机数发生器的无记忆物联网设备安全原语。
Sci Rep. 2024 Oct 14;14(1):24060. doi: 10.1038/s41598-024-75373-6.
3
Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application.

本文引用的文献

1
A Novel Image Encryption Scheme Based on Elliptic Curves over Finite Rings.一种基于有限环上椭圆曲线的新型图像加密方案。
Entropy (Basel). 2022 Apr 19;24(5):571. doi: 10.3390/e24050571.
2
A new image encryption scheme based on fractional-order hyperchaotic system and multiple image fusion.一种基于分数阶超混沌系统和多图像融合的新型图像加密方案。
Sci Rep. 2021 Aug 3;11(1):15737. doi: 10.1038/s41598-021-94748-7.
3
A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things.一种用于边缘计算和物联网的基于椭圆曲线密码体制的安全高效方案。
基于深度卷积神经网络的用于网络安全图像加密应用的认证公钥椭圆曲线
Sensors (Basel). 2023 Jul 21;23(14):6589. doi: 10.3390/s23146589.
Sensors (Basel). 2020 Oct 29;20(21):6158. doi: 10.3390/s20216158.
4
Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications.具有诱导混沌动力学和密码学应用的量子启发级联离散时间量子行走
Sci Rep. 2020 Feb 6;10(1):1930. doi: 10.1038/s41598-020-58636-w.
5
Symmetric encryption algorithms using chaotic and non-chaotic generators: A review.对称加密算法使用混沌和非混沌发生器:综述。
J Adv Res. 2016 Mar;7(2):193-208. doi: 10.1016/j.jare.2015.07.002. Epub 2015 Aug 1.
6
Communication theory of secrecy systems. 1945.保密系统的通信理论。1945年。
MD Comput. 1998 Jan-Feb;15(1):57-64.