Font Size: a A A

The Realization And Algorithm Of Information Hiding Technology With Elliptic Curve Cryptosystem

Posted on:2019-01-20Degree:DoctorType:Dissertation
Country:ChinaCandidate:Z Y LiuFull Text:PDF
GTID:1368330548485782Subject:Computational Mathematics
Abstract/Summary:PDF Full Text Request
Four new fractional two dimensional triangle function combination discrete chaotic maps(2D-TFCDM)is proposed by utilizing the discrete fractional calculus.We exploit the 4 maps into new image encryption algorithms and apply them into image encryption.Based on elliptic curve cryptosystem(ECC),we add new ECC into the proposed encryption algorithm and study new ECC.Finally,we analyse the 4 algorithms and compare them with other algorithms.The main contents of this paper are divided into the following three parts:1.We study the chaotic phenomenon of 4 fractional chaotic maps based on fractional order difference.We find 4 chaotic maps and convert them into fractional maps by use of the delta difference operator.After that,we observe the bifurcation behaviors and draw the bifur-cation diagrams,the largest Lyapunov exponent plot and the phase portraits of the proposed map,respectively.2.We introduce the ECC,solving of the Elliptic curve Discrete Logarithm Problem(ECDLP),safe elliptic curve,fast calculation of kP on elliptic,find new ECC based on finite prime field and apply them into the proposed image encryption algorithms.3.For the 4 proposed maps,we exploit them into image encryption algorithms,show the encryption process and encrypt some images,Then,the image encryption algorithm is analysed in four main aspects,such as key space,statistic analysis,sensitivity analysis and the resistance to known-plaintext and chosen-plaintext attacks.
Keywords/Search Tags:Chaos, bifurcation, fractional chaotic map, elliptic curve cryptosystem, image encryption
PDF Full Text Request
Related items