This paper introduces a six-dimensional discrete chaotic systems (SDDCS) with some simple sine functions and a chaotic pseudorandom number generator (CPRNG) that is designed based on the SDDCS. A encryption scheme with both key avalanche effect and plaintext avalanche effect (SESKPAE) is proposed by using the random sequence generated by the CPRNG. The algorithm has three advantages: First, the initial values of the chaotic system are calculated by using the SHA-256 hash value of the plain image and the given values, there are different initial values for different plain images. Thus, our algorithm can resist against the chosen-plaintext and known-plaintext attacks effectively. Second, the new algorithm adopts ciphertext feedback mechanism to further strengthen the safety. Third, our new algorithm has an “avalanche effect”, in other words, the decrypted ciphertext will become a “white” image with a few “black spots” rather than a random chaotic image as a result of the wrong key. The experimental results and security analysis show that the algorithm has the advantages of large key space, no obvious statistical characteristics of ciphertext, sensitive to plaintext and keys, and able to resist chosen-plaintext attack and active attacks.
Image encryption Six dimensional discrete chaotic system Pseudo random number generator Avalanche effect SHA-256 Chosen-plaintext attack
This is a preview of subscription content, log in to check access.
This work was supported by National Natural Science Foundation of China (No. 61472451), the Open Project of Guangxi Colleges and Universities Key Laboratory of Complex System Optimization and Big Data Processing (No. 2016CSOBDP0103), the Shan Dong Province Nature Science Foundation (Grant. ZR2017MEM019) and the Science Research Fund of Liaocheng University (No. 318011606).
Chen XF, Huang XY, Li J (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Inf Forensics Secur 10(1):69–78CrossRefGoogle Scholar
Chen E, Min LQ, Chen GR (2017) Discrete chaotic systems with one-line equilibria and their application to image encryption. Int J Bifurcation Chaos 27:1750046-1-17MathSciNetMATHGoogle Scholar
Qi GY, Chen GR, van Wyk MA, van Wyk BJ, Zhang YH (2008) A four-wing chaotic attractor generated from a new 3D quadratic autonomous system. Chaos, Solitons Fractrals 38:705–721CrossRefMATHGoogle Scholar
Rukhin R, Soto J, Nechvatal J (2001) A statistical test suite for random and pseudorandom numbergenerator for cryptographic applications. NIST Special PublicationGoogle Scholar
Sun KH, Liu X, Zhu CX, Sprott J (2012) Hyperchaos and hyperchaos control of the sinusoidally forced simplified Lorenz system. Nonlinear Dyn 69:1383–1391MathSciNetCrossRefGoogle Scholar
Wang X, Teng Y, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92:1101–1108CrossRefGoogle Scholar
Wu Y, Hua Z, Zhou Y (2015) N-dimensional discrete cat map generation using Laplace expansions. IEEE Trans Cybern 46:2622–2633CrossRefGoogle Scholar
Wu X, Zhu B, Hu Y (2017) A novel colour image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Acces 5:6429–6436Google Scholar
Yang XP, Min LQ, Wang X (2015) A cubic map chaos criterion theorem with applications in generalized synchronization based pseudorandom number generator and image encryption. Chaos 25:053104MathSciNetCrossRefMATHGoogle Scholar
Yu S, Wang GJ, Zhou WL (2015) Modeling malicious activities in cyber space. IEEE Netw 29(6):83–87CrossRefGoogle Scholar
Yu CY, Li JZ, Li X, Ren XC, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77:4585–4608CrossRefGoogle Scholar
Zarei A (2015) Complex dynamics in a 5-D hyper-chaotic attractor with four-wing, one equilibrium and multiple chaotic attractors. Nonlinear Dyn 81:585–605MathSciNetCrossRefGoogle Scholar
Zhang XP, Mao YB, Zhao ZM (2014) An efficient chaotic image encryption based on alternate circular Sboxes. Nonlinear Dyn 78:359–369CrossRefGoogle Scholar
Zhang XP, Zhao ZM, Wang JY (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image 29:902–913CrossRefGoogle Scholar
Zhu CX (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37CrossRefGoogle Scholar
Zhu CX, Sun KH (2012) Cryptanalysis and improvement of a class of hyperchaos based image encryption algorithms. Acta Phys Sin 61(12):120503MATHGoogle Scholar
Zhu CX, Sun KH (2018) Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced chaotic tent maps. IEEE Access 6:18759–18770CrossRefGoogle Scholar