计算物理 ›› 2021, Vol. 38 ›› Issue (2): 231-243.DOI: 10.19596/j.cnki.1001-246x.8209

• 研究论文 • 上一篇    下一篇

一种基于保守混沌的密钥分发协议及图像加密算法

康志君1, 仓诗建2, 李月1   

  1. 1. 天津科技大学电子信息与自动化学院, 天津 300222;
    2. 天津科技大学产品设计系, 天津 300457
  • 收稿日期:2020-03-06 修回日期:2020-06-19 发布日期:2021-09-29
  • 通讯作者: 仓诗建(1979-),男,副教授,研究方向为非线性动力学与混沌系统,E-mail:csj98231@tust.edu.cn
  • 作者简介:康志君(1994-),男,硕士,研究方向为图像加密与处理,E-mail:kzj1253@mail.tust.edu.cn
  • 基金资助:
    国家自然基金项目(61873186)资助

A Conservative-chaos-based Key Distribution Protocol and Image Encryption Algorithm

KANG Zhijun1, CANG Shijian2, LI Yue1   

  1. 1. School of Electronic Information and Automation, Tianjin University of Science and Technology, Tianjin 300222, China;
    2. Department of Product Design, Tianjin University of Science and Technology, Tianjin 300457, China
  • Received:2020-03-06 Revised:2020-06-19 Published:2021-09-29

摘要: 耗散混沌系统可以通过时滞嵌入法重构混沌吸引子,因而耗散混沌在基于混沌的信息加密技术中存在一定隐患。针对这一问题提出一种基于保守混沌的密钥分发协议及图像加密算法,该算法将图像数据通过Hash算法转换为保守混沌系统的初始值,形成一次一密的加密结构。然后利用保守混沌信号结合密钥分发协议生成二进制密钥流,该过程由发送方和接受方双方共同完成。使用得到的二进制密钥流对图像数据置乱和扩散,得到加密图像数据。仿真结果表明:该算法安全可靠,能够有效地隐藏原图像信息,并能抵御一些常见的攻击。此外,该加密算法所使用的保守混沌不存在吸引子难以被破解,算法的安全性进一步加强。

关键词: 保守混沌, 密钥分发协议, 图像加密, Hash算法

Abstract: Since a chaotic attractor can be reconstructed with time-delay embedding method in dissipative chaotic systems, there are potential problems in chaos-based information encryption. Concerning this issue, we report a conservative-chaos-based key distribution protocol and image encryption algorithm. The encryption algorithm converts image data into initial value of a conservative chaotic system with Hash algorithm and forms an encryption mechanism of one-time pads. Then, a binary keystream is generated by combining conservative chaos with key distribution protocol, which is completed by both sender and receiver. The obtained binary keystream shuffles and diffuses the image data to obtain an encrypted image. It shows that the proposed algorithm is safe and reliable. It hides effectively a plain image, and resists common decryption algorithms. Besides, conservative chaos has no attractor thus the encryption algorithm is hard to crack.

Key words: conservative chaos, image encryption, key distribution protocol, Hash algorithm

中图分类号: