Font Size: a A A

Information Security Enhancement Methods Based On Delayed Lnduced Hyper-chaos

Posted on:2021-09-10Degree:DoctorType:Dissertation
Country:ChinaCandidate:C F ZhaoFull Text:PDF
GTID:1488306512468344Subject:Detection Technology and Automation
Abstract/Summary:PDF Full Text Request
With the rapid development of industrial internet,information security will be the core challenge,especially in industrial internet platforms,data and smart devices connected to the Internet.Chaos has become a hot topic in the information security applications because of the unique complexity,unpredictable pseudo-random behavior,sensitivity to initial values and parameters of the system.Most importantly,chaos is consistent with the requirements of cryptographic design.Therefore,chaos has been applied in the field of industrial internet security and attracted more attention.This paper mainly focuses on the principles and algorithms for chaos to enhance the confidentiality,the integrity and secure transmission of industrial Internet data information.As a special kind of chaotic system,the delayed induced hyper-chaos has been paid increasingly attention due to its theoretical infinite dimension,multiple positive Lyapunov exponents,high complexity and easy implementation.In this paper,information security enhancement methods with higher security and better adaptability are proposed using the delayed induced hyper-chaos.The detail works are as follows:1)To solve the protection and verification problem of information integrity,a Hash function algorithm based on the combination of delayed induced hyper-chaotic system and key-stream function iteration is proposed.The compensating codes generated by Logistic map is used for the rest information bits not enough for the last partition of the plain-text,which improves the collision resistance performance;The efficiency of the algorithm is improved by the method of three consecutive plain-text blocks combining with a group;The initial value sensitivity of delayed induced hyper-chaos and key stream function iteration are used to ensure the high sensitivity of Hash function.The superiority performance of the proposed Hash function algorithm is proved by theoretical analysis,numerical simulation,and comparison with some algorithms.2)For the information encryption security problem,two kinds of image encryption algorithms based on chaos are analyzed,which are found existing security weakness.Using the chosen plaintext attack,the equivalent keys of the chaotic image encryption algorithms without diffusion operation can be obtained and the algorithm is successfully cracked.Numerical simulation confirms that the above chaotic image algorithms have different security defects.The improved algorithms are proposed to enhance the security of the algorithms.Finally,using the delayed induced hyper-chaos,a novel image encryption algorithm is proposed,which induces hyper-chaotic sequence preprocessing,image expansion algorithm,confusion and diffusion in row and column operations.Theoretical analysis and numerical simulation indicate that the delayed induced hyper-chaos is very suitable for designing image encryption algorithm.The proposed algorithm has some advantages,including strong key sensitivity and theoretically infinite key space,high computation speed,better confusion and diffusion ability.Comparing with some algorithms,the proposed algorithm has strong resistance to cryptanalytic attacks,statistics attacks and robustness attacks.3)To improve the physical layer information security of Orthogonal Frequency Division Multiplexing(OFDM)technology in industrial internet wireless communication and reduce Peak to Average Power Ratio(PAPR)of OFDM technology,using the delayed induced hyper-chaos,an approach for physical layer security enhancement and PAPR reduction in OFDM is developed based on symbol chaotic rearrangement,chaotic constellation mapping and iterative peak clipping filtering technology.Theoretical analysis and numerical simulation show that the approach improves information security and reduces PAPR,and it has stronger key sensitivity and larger key space,lower Bit Error Rate(BER)and lower PAPR.
Keywords/Search Tags:Industrial Internet, Delayed induced hyper-chaos, Information security enhancement, Chaotic Hash function, Image encryption algorithm, Physical layer security, PAPR reduction
PDF Full Text Request
Related items