| 研究生: |
董士碩 Tung, Shih-shuo |
|---|---|
| 論文名稱: |
嶄新的混沌亂數產生器應用於改良後的盲演算法的影像加密系統 A New Chaotic PRNG Applied in Improved BSS-based Image Encryption System |
| 指導教授: |
陳進興
Chen, Chin-hsing |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2009 |
| 畢業學年度: | 97 |
| 語文別: | 英文 |
| 論文頁數: | 95 |
| 中文關鍵詞: | 虛擬亂數產生器 、影像加密 、混沌 、盲演算法 |
| 外文關鍵詞: | blind source separation, chaos theory, image encryption, pseudo random number generator |
| 相關次數: | 點閱:100 下載:1 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著科技的快速發展,電腦通訊的安全性變得很重要。因此,密碼學吸引了許多學者的興趣。一般來說,在一個密碼系統裡面,亂數產生器決定了這個系統的效能與安全性。由於亂數產生器的重要性,因此有許多關於影像或是語音的加密方法被提出來。但是因為硬體的限制和即時的傳輸,所以一個低複雜度且高速的亂數產生器非常急切需要。基於這些理由,一個虛擬亂數產生器的設計乃是一項艱困的挑戰。
本論文提出一混沌虛擬亂數產生器,它是基於S. Li 和 X. Wang所提出的亂數產生器所建構而成的。我們採取串連多個混沌系統和參數擾亂的方法來抵擋數位退化,因此它擁有長週期、隨機性、高速且低複雜度的特性。此外,我們也針對Q. Lin所提出的以盲演算法為基礎的加密演算法作了一些改善。我們經由修正原演算法的混合矩陣且增加2維與3維的混沌擾亂來增強此加密系統的安全性。最後,我們將所提出的混沌虛擬亂數產生器應用在改良後的盲演算法的影像加密演算法裡。
本論文所提的混沌虛擬亂數產生器通過了一些標準的統計測試,且表現出很好隨機性。它的週期長度接近2^169;在90000到250000個位元中,位元0和位元1的數量比幾乎相等;它的自相關函數類似 函數且交相關函數幾乎為0;此虛擬亂數產生器也通過了FIPS PUB 140-2測試。而我們所提出的影像加密系統通過了許多安全性分析,它們包括key space的分析、靈敏度的分析、統計上的分析、information entropy的分析和攻擊的分析。它的key space大於2^410,足夠抵擋所有類型的暴力攻擊法;且加密後影像的entropy非常接近理論值8,因此它可以有效的抵擋information entropy攻擊。此外,對一張512×512的影像,系統的加密時間約0.35秒,解密時間約0.15秒,它能夠被一般所接受且加密後影像的大小和原始影像一樣。無疑的,這個加密系統安全而適合實際應用。
By the rapid development of the technology, the security of computer communication becomes an important issue. As a result, cryptography has been attracting more interests and researches to solve this problem. General speaking, the random number generator (RNG) determines the performance and security of a cryptosystem. Due to the importance of the RNG, there are many encryption methods proposed for image and speech. Because of limited hardware and real time transmission, a low complexity and high speed RNG is needed. For these reasons, the design of a PRNG is a challenge.
In this thesis, we proposed a chaotic PRNG. The concept of the proposed PRNG is based on the CCS-PRBG proposed by S. Li and the PRBG proposed by X. Wang. We adopt the methods of cascading multiple chaotic systems and perturbation to avoid digital degradation. The proposed PRNG scheme possesses the following properties: long cycle length, good randomness, high speed and low complexity. Besides, we made some improvement over the BSS (Blind Source Separation) based encryption scheme proposed by Q. Lin. We enhance the security of the encryption by revising the mixing matrix of the algorithm and add the 2D and 3D chaotic permutation to the cryptosystem. Finally, we adopt the chaotic PRNG in the improved BSS-based image encryption algorithm.
The proposed chaotic PRNG passes some standard statistical tests and shows good properties of randomness. The cycle length is nearly 2^169, the 0:1 ration is almost equal to 1 from 90000 bits to 250000 bits, the auto-correlation is also -like, and the cross-correlation is nearly zero. The proposed PRNG also passed FIPS PUB 140-2 test. Our proposed image encryption scheme passed security analyses such as key space analysis, sensitivity analysis, statistical analysis, information entropy analysis and attack analysis. The key space size is over 2^410, it is large enough to resist all kinds of brute-force attacks. The entropy of every encrypted image is very close to the theoretical value of 8, showing the suggested encryption scheme is sufficiently secure against the entropy attack. In addition, the encryption time is about 0.35 sec and the decryption time is about 0.15 sec for a 512×512 image, the speed is acceptable and the size of ciphered image is the same as the plain image. The cryptosystem is no doubt secure and suitable for practical application.
[1] T. Addabbo, M. Alioto, A. Fort, S. Rocchi, and V. Vignoli, “A feedback strategy to improve the entropy of a chaos-based random bit generator,” IEEE Transactions on Circuits and Systems, Vol. 53, No. 2, pp. 326-337, Feb. 2006.
[2] W. Alexi, B. Chor, O. Goldreich, and C. P. Schnorr, “RSA and Rabin functions: certain parts are as hard as the whole,” SIAM Journal on Computing, Vol. 17, No.2, pp. 194-209, Apr. 1988.
[3] G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos, Vol. 16, No. 8, pp. 2129-2151, Aug. 2006.
[4] J. M. Amigo, L. Kocarve, and J. Szczepanski, “Theory and practice of chaotic cryptography,” Physics Letters A, Vol. 366, No. 3, pp. 211-216, Jun. 2007.
[5] S. Behnia, A. Akhshani, A. Akhavan, and H. Mahmodi, “Applications of tripled chaotic maps in cryptography,” arXiv.org, The Cornell University, May 2007.
[6] S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solutions and Fractals, Vol. 35, No. 2, pp. 408-419, Jan. 2008.
[7] H. J. Beker and F. C. Piper, “Secure speech communications,” London, Academic Press, 1985.
[8] L. Blum, M. Blum, and M. Shub, “A simple unpredictable pseudo-random number generator,” SIAM Journal on Computing, Vol. 15, No. 2, pp. 364-383, May 1986.
[9] R. Bose and S. Pathak, “A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system,” IEEE Transaction on Circuits and Systems, Vol. 53, No. 4, pp. 848-857, Apr. 2006.
[10] X. R. Cao and R. W. Liu, “General approach to blind source separation,” IEEE Transactions on Signal Processing, Vol. 44, No. 3, pp. 562-571, Mar. 1996.
[11] J. Cernak, “Digital generators of chaos,” Physics Letters A, Vol. 214, pp. 151-160, Feb. 1996.
[12] G. Chen, Y. Mao, C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solutions & Fractals, Vol. 21, No. 3, pp. 749-761, Jul. 2004.
[13] H. Gao, Y. Zhang, S. Liang, and D. Li, “A new chaotic algorithm for image encryption,” Chaos, Solutions and Fractals, Vol. 29, No. 2, pp. 393-399, Jul. 2006.
[14] J. A. Gonzalez and R. Pino, “Chaotic and stochastic functions,” Physics Letters A, Vol. 276, No. 3-4, pp. 425-440, Feb. 2000.
[15] Z. H. Guan, F. Huang, and W. Guan, “A general chaos-based key stream generator,” Circuits, Systems, and Signal Processing, Vol. 24, No. 5, pp. 549-555, 2005.
[16] Z. H. Guan, F. Huang, and W. Guan, “Chaos-based image encryption algorithm,” Physics Letters A, Vol. 346, No. 1-3, pp. 153-157, Oct. 2005.
[17] G. Heidari-Bateni, and C. D. McGillem, “A chaotic direct-sequence spread-spectrum communication system,” IEEE Transaction on Communications, Vol. 42, No. 4, Apr. 1994.
[18] L. Kocarev, “Chaos-based cryptography: a brief overview,” IEEE Circuits and
Systems Magazine, Vol. 1, No. 3, pp. 6-21, 2001.
[19] L. Kocarev and G. Jakimoski, “Logistic map as a block encryption algorithm,”
Physics Letters A, Vol. 289, No. 4-5, pp. 199-206, Oct. 2001.
[20] L. Kocarev and G. Jakimoski, “Pseudorandom bits generated by chaotic maps,” IEEE Transaction on Circuits and Systems, Vol. 50, No. 1, pp. 123-126, Jan. 2003.
[21] L. Kocarev, G. Jakimoski, and Z. Tasev, “Chaos and pseudo-randomness,” Lecture Notes in Control and Information Sciences, Vol. 292, pp. 247-263, 2004.
[22] P. L’Ecuyer, “Uniform random number generation,” Annals of Operations Research, Vol. 53, No. 1, pp. 77-120, Dec. 1994.
[23] P. H. Lee, S. C. Pei, and Y. Y. Chen, “Generating chaotic stream ciphers using chaotic systems,” Chinese Journal of Physics, Vol. 41, No. 6, pp. 559-581, Dec. 2003.
[24] C. T. Li, “Compliant encryption of JPEG2000 code streams based on chaotic systems,” Master Thesis, Department of Electrical Engineering, NCKU, June 2008.
[25] S. Li, X. Mou, and Y. Cai, “Improving security of a chaotic encryption approach,” Physics Letters A, Vol. 290, No. 3-4, pp. 127-133, Nov. 2001.
[26] S. Li, X. Mou, and Y. Cai, “Pseudo-random bit generator based on couple chaotic systems and its applications in stream cipher cryptography,” in Progress in Cryptology-INDOCRYPT 2001, Lecture Notes in Computer Science, Vol. 2247, pp. 316-329, 2001.
[27] K. Li, Y. C. Soh, and Z. G. Li, “Chaotic cryptosystem with high sensitivity to parameter mismatch,” IEEE Transaction on Circuits and Systems, Vol. 50, No. 4, pp. 579-583, Apr. 2003.
[28] S. Li, X. Mou, B. L. Yang, Z. Ji, and J. Zhang, “Problems with a probabilistic encryption scheme based on chaotic systems,” International Journal of Bifurcation and Chaos, Vol. 13, No. 10, pp. 3063-3077, 2003.
[29] S. Li, G. Chen, and X. Mou, “On the dynamical degradation of digital piecewise linear chaotic maps,” International Journal of Bifurcation and Chaos, Vol. 15, No. 10, pp. 3119-3151, Oct. 2005.
[30] S. Li, X. Mou, Y. Cai, Z. Ji, and J. Zhang, “On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision,” Computer Physics Communications, Vol. 153, No. 1, pp. 52-58, Jun. 2003.
[31] S. Li, C. Li, K. T. Lo, and G. Chen, “Cryptanalyzing and encryption scheme based on Blind Source Separation,” IEEE Transaction on Circuits and Systems, Vol. 55, No. 4, pp. 1055-1063, May 2008.
[32] S. G. Lian, J. S. Sun, J. W. Wang, and Z. Q. Wang, “A chaotic stream cipher and the usage in video protection,” Chaos, Solutions & Fractals, Vol. 34, No. 3, pp. 851-859, Nov. 2007.
[33] Q. H. Lin and F. L. Yin, “Blind source separation applied to image cryptosystems with dual encryption,” Electronics Letters, Vol. 38, No. 19, pp. 1092-1094, 2002.
[34] Q. H. Lin and F. L. Yin, “Image cryptosystems based on blind source separation,” IEEE International Conference on Neutral Networks and Signal Processing, Vol. 2, pp. 1366-1369, 2003.
[35] Q. H. Lin, F. L. Yin, T. M. Mei, and H. L. Liang, “A speech encryption algorithm based on blind source separation,” International Conference on Communications, Circuits and Systems, Vol. 2, pp. 1013-1017, 2004.
[36] Q. H. Lin, F. L. Yin, and Y. R. Zheng, “Secure image communication using blind source separation,” IEEE 6th CAS Circuits and Systems Symposium on Emerging Technologies: Mobile and Wireless Communication, Vol. 1, pp. 261-264, 2004.
[37] Q. H. Lin, F. L. Yin, and H. L. Liang, “Blind source separation-based encryption of images and speeches,” Advances in Neural Networks – ISNN 2005, Vol. 3497, pp. 544-549, 2005.
[38] Q. H. Lin, F. L. Yin, T. M. Mei, and H. L. Liang, “A blind source separation based method for speech encryption,” IEEE Transaction on Circuits and Systems, Vol. 53, No. 6, pp. 1320-1328, Jun. 2006.
[39] Y. Mao, G. Chen, S. Lian, “A novel fast image encryption scheme based on 3D chaotic baker maps,” International Journal of Bifurcation and Chaos, Vol. 14, No. 10, pp. 3613-3624, 2004.
[40] National Institute of Standards and Technology, “Security requirements for cryptographic modules,” FIPS PUB 140-2, May 2001.
[41] S. K. Park and K. W. Miller, “Random number generators: good ones are hard to find,” Communications of the ACM, Vol. 31, No. 10, pp. 1192-1201, Oct. 1988.
[42] J. Peng, S. Jin, Y. Liu, Z. Yang, M. You, and Y. Pei, “A novel scheme for image encryption based on piecewise linear chaotic map,” 2008 IEEE Conference on Cybernetics and Intelligent Systems, pp. 1012-1016, Sep. 2008.
[43] A. Rukhin, J. Soto, J. Nechvatal, J. Smid, M. Barker, E. Leigh, S. Levenson, M. Vangel, M. Banks, A. Heckert, J. Dray, and S. Vo, “A statistical test suit for random and pseudorandom number generators for cryptographic applications,” NIST Special Publication 800-22, 2001.
[44] T. Sang, R. Wang, and Y. Yan, “Perturbance-based algorithm to expand cycle length of chaotic key stream,” Electronics Letters, Vol. 34, No. 9, pp. 873-874, Apr. 1998.
[45] J. Soto, “Statistical testing of random number generators,” http://www.csrc.nist.gov/groups/ST/toolkit/rng/documents/nissc-paper.pdf, 1999.
[46] D. R. Stinson, “Cryptography: theory and practice,” CRC Press, Boca Raton, Florida, 3rd edition, 2006.
[47] T. Stojanovski and L. Kocarev, “Chaos-based random number generators-Part I: analysis,” IEEE Transaction on Circuits and Systems, Vol. 48, No. 3, pp. 281-288, Mar. 2001.
[48] T. Stojanovski, J. Pihl, and L. Kocarev, “Chaos-based random number generators-Part II: practical realization,” IEEE Transaction on Circuits and Systems, Vol. 48, No. 3, pp. 382-385, Mar. 2001.
[49] K.W. Tang, W. K. S. Tang, and K. F. Man, “A chaos-based pseudo-random number generator and its application in voice communications,” International Journal of Bifurcation and Chaos, Vol. 17, No. 3, pp. 923-933, Mar. 2007.
[50] X. Y. Wang and X. J. Wang, “Design of chaotic pseudo-random bit generator and its applications in stream-cipher cryptography,” International Journal of Modern Physics C, Vol. 19, No. 5, pp. 813-820, 2008.
[51] D. D. Wheeler, “Problems with chaotic cryptosystems,” Cryptologia, Vol. 13, No. 3, pp. 243-250, Jul. 1989.
[52] M. E. Yalcin, J. A. K. Suykens, and J. Vandewalle, “True random bit generation from a double-scroll attractor,” IEEE Transaction on Circuits and Systems, Vol. 51, No. 7, pp. 1395-1404, Jul. 2004.