Font Size: a A A

Security Analysis Of Chaos-based Internet Of Things Encryption Algorithm

Posted on:2021-01-02Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhouFull Text:PDF
GTID:2370330614953866Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of Internet technology and the invention of intelligent devices,digital image transmission is becoming easier.With the promotion of social networking platforms,online image sharing has become a trend,and the security of image transmission and storage has also become the focus of people's attention.This thesis introduces the articles on image encryption and decryption published from 2017 to 2019,analyzes the characteristics and security problems of different algorithms,and provides some suggestions for image encryption design and cryptanalysis.Then,analysis a surveillance framework based on probabilistic image encryption algorithm(SFPIE),and proposes an effective known-plaintext attack method,pinpoints out the shortcomings of SFPIE in security performance.Due to the dynamic degradation of chaotic mapping in finite precision digital domain,analysis some dynamic properties of 2D-LASM(2-D logistic-adjusted-sine map)used in SFPIE.Analysis the effects of operation precision,control parameters and quantization methods on 2D-LASM mapping results and state-mapping network in fixed-point and floating-point operation domains.The experimental results show that the change of quantization method does not affect the overall structure of the 2D-LASM state mapping network,the change of operation precision and control parameters has a great impact on the 2D-LASM state mapping network,and the structure of the state mapping network becomes more and more complex with the increase of operation precision.The research on the state mapping network of 2D-LASM is helpful to evaluate and improve the randomness of the sequence generated based on the 2d-lasm mapping,and to improve the security performance of the encryption algorithm based on the 2D-LASM mapping.
Keywords/Search Tags:cryptanalysis, image encryption, chosen-plaintext attack, chaotic map, state-mapping network
PDF Full Text Request
Related items