• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种使用流行病传播模型进行加密的新型扩散策略。

A New Diffusion Strategy Using an Epidemic Spreading Model for Encryption.

作者信息

Zhang Wei, Zhu Guangdong, Xing Meng, Yang Jingjing, Yu Hai, Zhu Zhiliang

机构信息

College of Software, Northeastern University, Shenyang 110167, China.

出版信息

Entropy (Basel). 2024 Sep 5;26(9):760. doi: 10.3390/e26090760.

DOI:10.3390/e26090760
PMID:39330093
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11431050/
Abstract

The diffusion phenomenon that exhibits intrinsic similarities is pervasive in cryptography and natural systems, evident in liquid diffusion, epidemic spread, animal migration, and encryption techniques. In cryptography, bytes are systematically diffused in a sequential manner to encrypt the value of each byte in the plaintext in a linear fashion. In contrast, within an epidemic spreading model, the diffusion process can be represented within a complex, multilayered network, encompassing layers such as familial and social transmission dynamics. Transmission links establish connections both within and between individual layers. It has had a more rapid spread than linear approaches due to the particularization of non-linear transmission. In this study, the novelty of a cryptography diffusion strategy based on an epidemic model is first proposed, in which pixels and their dynamic adjacency are considered as vertices and edges, respectively, within a complex network framework. Subsequently, the encryption process is governed by the Susceptible-Vaccinated-Infected-Recovered (SVIR) model integrated with chaotic dynamics. Simulation results demonstrate that the proposed algorithm exhibits faster encryption speed while effectively resisting brute force, statistical, and differential attacks. Furthermore, it demonstrates strong robustness against noise interference and data loss.

摘要

这种表现出内在相似性的扩散现象在密码学和自然系统中普遍存在,在液体扩散、流行病传播、动物迁徙和加密技术中都很明显。在密码学中,字节以有序的方式系统地扩散,以线性方式加密明文中每个字节的值。相比之下,在流行病传播模型中,扩散过程可以在一个复杂的多层网络中表示,包括家庭和社会传播动态等层面。传播链接在各个层面内部和之间建立连接。由于非线性传播的特殊性,它比线性方法传播得更快。在本研究中,首次提出了一种基于流行病模型的密码学扩散策略的新颖之处,其中在复杂网络框架内,像素及其动态邻接关系分别被视为顶点和边。随后,加密过程由与混沌动力学相结合的易感-接种-感染-康复(SVIR)模型控制。仿真结果表明,所提出的算法具有更快的加密速度,同时能有效抵御暴力攻击、统计攻击和差分攻击。此外,它对噪声干扰和数据丢失具有很强的鲁棒性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/1c9621ef8af2/entropy-26-00760-g009a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/aae9c1d406be/entropy-26-00760-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/33de616fbb8a/entropy-26-00760-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/535de3e96070/entropy-26-00760-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/bf47256f45b6/entropy-26-00760-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/d37b8b620d84/entropy-26-00760-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/a43dd331994c/entropy-26-00760-g006a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/fcab222a0d9a/entropy-26-00760-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/ba377c200065/entropy-26-00760-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/1c9621ef8af2/entropy-26-00760-g009a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/aae9c1d406be/entropy-26-00760-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/33de616fbb8a/entropy-26-00760-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/535de3e96070/entropy-26-00760-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/bf47256f45b6/entropy-26-00760-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/d37b8b620d84/entropy-26-00760-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/a43dd331994c/entropy-26-00760-g006a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/fcab222a0d9a/entropy-26-00760-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/ba377c200065/entropy-26-00760-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ad86/11431050/1c9621ef8af2/entropy-26-00760-g009a.jpg

相似文献

1
A New Diffusion Strategy Using an Epidemic Spreading Model for Encryption.一种使用流行病传播模型进行加密的新型扩散策略。
Entropy (Basel). 2024 Sep 5;26(9):760. doi: 10.3390/e26090760.
2
A new encryption algorithm for image data based on two-way chaotic maps and iterative cellular automata.一种基于双向混沌映射和迭代细胞自动机的图像数据加密新算法。
Sci Rep. 2024 Jul 19;14(1):16701. doi: 10.1038/s41598-024-64741-x.
3
An Image Encryption Algorithm Based on Complex Network Scrambling and Multi-Directional Diffusion.一种基于复杂网络置乱与多方向扩散的图像加密算法。
Entropy (Basel). 2022 Sep 5;24(9):1247. doi: 10.3390/e24091247.
4
Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation.基于新型混合混沌映射和螺旋变换的图像加密
Entropy (Basel). 2023 Nov 5;25(11):1516. doi: 10.3390/e25111516.
5
An image encryption algorithm based on the double time-delay Lorenz system.一种基于双时滞洛伦兹系统的图像加密算法。
Math Biosci Eng. 2023 Sep 27;20(10):18491-18522. doi: 10.3934/mbe.2023821.
6
Double graph correlation encryption based on hyperchaos.基于超混沌的双图关联加密。
PLoS One. 2023 Sep 28;18(9):e0291759. doi: 10.1371/journal.pone.0291759. eCollection 2023.
7
Non-Linear Hopped Chaos Parameters-Based Image Encryption Algorithm Using Histogram Equalization.基于直方图均衡化的非线性跳变混沌参数图像加密算法
Entropy (Basel). 2021 Apr 27;23(5):535. doi: 10.3390/e23050535.
8
A Novel Hybrid Secure Image Encryption Based on the Shuffle Algorithm and the Hidden Attractor Chaos System.一种基于洗牌算法和隐藏吸引子混沌系统的新型混合安全图像加密方法。
Entropy (Basel). 2020 Jun 9;22(6):640. doi: 10.3390/e22060640.
9
A New Image Encryption Algorithm Based on Composite Chaos and Hyperchaos Combined with DNA Coding.一种基于复合混沌与超混沌结合DNA编码的新型图像加密算法
Entropy (Basel). 2020 Feb 2;22(2):171. doi: 10.3390/e22020171.
10
Chaos-based block permutation and dynamic sequence multiplexing for video encryption.用于视频加密的基于混沌的分组置换和动态序列复用
Sci Rep. 2023 Sep 7;13(1):14721. doi: 10.1038/s41598-023-41082-9.

本文引用的文献

1
Enhanced payload volume in the least significant bits image steganography using hash function.使用哈希函数在最低有效位图像隐写术中增强有效载荷量。
PeerJ Comput Sci. 2023 Nov 13;9:e1606. doi: 10.7717/peerj-cs.1606. eCollection 2023.
2
COVID-19 and SARS-CoV-2. Modeling the present, looking at the future.新型冠状病毒肺炎与严重急性呼吸综合征冠状病毒2。模拟当下,展望未来。
Phys Rep. 2020 Jul 10;869:1-51. doi: 10.1016/j.physrep.2020.07.005. Epub 2020 Jul 28.
3
The Epidemic Curve.流行曲线。
Proc Natl Acad Sci U S A. 1942 Sep;28(9):361-7. doi: 10.1073/pnas.28.9.361.