现代加密技术的本质 密码朋克宣言 互联网加密技术TLS 互联网加密技术HTTPS 互联网安全的核心机制- PKI系统 现代PKI系统的涅槃 正确的使用网站加密技术 Web PKI 安全生态问题 加密技术后门 强者需要透明 弱者需要隐私 “量子霸权”的到来 密码算法安全级别对比 NIST 后量子密码算法标准征集 现有国密算法的抗量子计算对策 我们是如何在CertCloud和HSG上实现加密敏捷性 全连接,全加密,IOT安全与加密 未来已来,加密与你同在
2021-08-12 09:00:47 3.71MB 加密 加密算法 密码 密码安全
With the increasing requirements of the performance in secure communication filed based on chaos, chaotic systems have been gradually developed into higher dimensions. Because the sequence generated by onedimension chaos, such as Chebyshev map has the problem of weak chaotic properties and uneven distribution, a new two-dimensional chaotic map, called Logistic-Adjusted-Chebyshev map (2D-LACM), is proposed in this paper which enlarges the range of chaotic control parameter, and expands the range of surjection to the entire control parameter interval to make the distribution of the sequence more uniform. Compared with other improved chaotic maps, the proposed 2D-LACM in this paper has more complex chaotic properties and better ergodicity. Next, a visualized image encryption algorithm based on 2D-LACM is proposed (LACM-VIEA), which can encrypt the plain image into a noisy image, and then embed it into a cover image of the same size. In order to demonstrate the security of LACM-VIEA, the algorithm is analyzed in detail from the aspects of key, histogram, visual effect, robustness and anti-plaintext attacks, etc. The final analysis results show that LACM-VIEA has good security performance.
2021-08-11 22:00:09 16.98MB 混沌系统设计 视觉安全加密
1
A new two-dimensional chaotic system in the form of a cascade structure is designed, which is derived from the Chebyshev system and the infinite collapse system. Performance analysis including trajectory, Lyapunov exponent and approximate entropy indicate that it has a larger chaotic range, better ergodicity and more complex chaotic behaviour than those of advanced two-dimensional chaotic system recently proposed. Moreover, to protect the security of the crowd image data, the newly designed two-dimensional chaotic system is utilized to propose a visually meaningful image cryptosystem combined with singular value decomposition and Bernstein polynomial. First, the plain image is compressed by singular value decomposition, and then encrypted to the noise-like cipher image by scrambling and diffusion algorithm. Later, the steganographic image is obtained by randomly embedding the cipher image into a carrier image in spatial domain through the Bernstein polynomial based embedding method, thereby realizing the double security of image information and image appearance. Besides, the visual quality of the steganographic image can be improved by the adjustment factor according to different carrier images during the embedding process. Ultimately, security analyses indicate that it has higher encryption efficiency (2 Mbps) and the visual quality of steganography image can reach 39 dB.
1
行业分类-物理装置-一种用于磁卡数据的加密算法.zip