Design and FPGA realization of a pseudo random sequence generator based on a switched chaos

Author(s):  
Aixue Qi ◽  
Chunyan Han ◽  
Guangyi Wang
Entropy ◽  
2019 ◽  
Vol 21 (7) ◽  
pp. 678 ◽  
Author(s):  
Yixuan Song ◽  
Fang Yuan ◽  
Yuxia Li

In this paper, a new voltage-controlled memristor is presented. The mathematical expression of this memristor has an absolute value term, so it is called an absolute voltage-controlled memristor. The proposed memristor is locally active, which is proved by its DC V–I (Voltage–Current) plot. A simple three-order Wien-bridge chaotic circuit without inductor is constructed on the basis of the presented memristor. The dynamical behaviors of the simple chaotic system are analyzed in this paper. The main properties of this system are coexisting attractors and multistability. Furthermore, an analog circuit of this chaotic system is realized by the Multisim software. The multistability of the proposed system can enlarge the key space in encryption, which makes the encryption effect better. Therefore, the proposed chaotic system can be used as a pseudo-random sequence generator to provide key sequences for digital encryption systems. Thus, the chaotic system is discretized and implemented by Digital Signal Processing (DSP) technology. The National Institute of Standards and Technology (NIST) test and Approximate Entropy analysis of the proposed chaotic system are conducted in this paper.


2019 ◽  
Vol 4 ◽  
pp. 100023 ◽  
Author(s):  
Yi Zhao ◽  
Changyuan Gao ◽  
Jie Liu ◽  
Shaozeng Dong

Author(s):  
Bo Liu ◽  
Jiandong Liu ◽  
Shuhong Wang ◽  
Ming Zhong ◽  
Bo Li ◽  
...  

A selective encryption algorithm is proposed to improve the efficiency of high efficiency video coding (HEVC) video encryption and ensure the security of HEVC videos. The algorithm adopts the integer dynamic coupling tent mapping optimization model as the pseudo-random sequence generator, and multi-core parallelization is used as the sequence generation mechanism. The binstrings during the process of context adaptive binary arithmetic coding are selected for encryption, which conforms to the features of invariable binstream and compatible format in terms of video encryption. Performance tests for six types of standard videos with different resolutions were performed. The results indicated that the encryption algorithm has a large key space and benefits from a high encryption effect.


2013 ◽  
Vol 756-759 ◽  
pp. 2024-2029
Author(s):  
Yu Chi Zhao ◽  
Jing Liu

This paper, based on the characteristics of the chaotic dynamics system, by analyzing the characteristics of many chaotic dynamics model in image encryption and screening studies such as comparison (computer simulation experiment), combined with some specific practices of modern encryption system, regards the chaotic signal as the carrier hiding image information, for the purpose of image encryption. It regards chaotic system as a pseudo-random sequence generator, uses the way of compounding multiple chaos, combined with image replacement technology, designs image encryption algorithm of practical value and completes the development of the experimental system of image encryption


Confusion and diffusion are the frequently used embryonics in multimedia (image) encryption systems. Multimedia data protection against cryptanalysis can be effectually fortified by these techniques. Due to inherent properties of images such as high inter-pixel redundancy and bulk data capacity, encryption is performed in two stages: Confusion and Diffusion. In this article, a combined Pseudo Hadamard transformation in the confusion stage and Gingerbreadman chaotic substitution in the diffusion stage are used in the encryption phase of the algorithm. The strong correlation between contiguous elements in the host image is effectually reduced using Pseudo Hadamard transformation and entropy in the cipher image is enhanced using Gingerbreadman chaotic substitution. Secrete key length used in the algorithm is 128 bits, these are the initial conditions for Gingerbreadman chaotic generator. The elements of S-box in the substitution stage are considered from this random sequence generator. Experimental exploration including information entropy, correlation analysis, sensitivity analysis, key space analysis and computational complexity have been performed on set of standard images. Results obtained are better compared to many existing systems.


2017 ◽  
Vol 66 (3) ◽  
pp. 030502
Author(s):  
Wu Jie-Ning ◽  
Wang Li-Dan ◽  
Duan Shu-Kai

2013 ◽  
Vol 32 (6) ◽  
pp. 1623-1626
Author(s):  
Yang TAN ◽  
De-quan TANG ◽  
Zhao-yi TANG

Sign in / Sign up

Export Citation Format

Share Document