| Literature DB >> 22319371 |
Xianfeng Guo1, Jiashu Zhang, Muhammad Khurram Khan, Khaled Alghathbar.
Abstract
Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network.Entities:
Keywords: camera sensor network; chaotic; cryptography; key stream attack
Mesh:
Year: 2011 PMID: 22319371 PMCID: PMC3274046 DOI: 10.3390/s110201607
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.Block diagram of Wang et al. scheme.
Decryption of C1 using μ = 4, x0 = 0.1777.
| 1 | EAFA4D22D326D40C | 35 | 10 | 5E0AEF19A566A729 |
| 2 | 2960D4C5E768138D | 36 | 03 | D6E5053AF966B07E |
| 3 | C716165410ACD847 | 12 | 1D | EF5FCAE1DB5FA883 |
| 4 | 3C991CA5F1E8FCC6 | 20 | 2E | 4246A2AAADA975E2 |
Decryption of C2 using μ = 4, x0 = 0.1777.
| 1 | F11ED8CA5F72155E | 35 | 10 | 5E0AEF19A566A729 |
| 2 | 8A99683495FDBAAB | 36 | 03 | D6E5053AF966B07E |
| 3 | CC1E07D524E0E7A1 | 12 | 1D | EF5FCAE1DB5FA883 |
| 4 | D9D58D603B600C1E | 20 | 2E | 4246A2AAADA975E2 |
The chosen C and C of C.
| Chosen
| Chosen
| |||
|---|---|---|---|---|
| 1 | 218A916626E5DA55 | 28 | 00000000000000DC | 0000000000001C00 |
| 2 | BA53340E52524733 | 45 | 00000000000000ED | 0000000000002D00 |
| 3 | 2C2CE7EEB40BA7EC | 63 | 00000000000000FF | 0000000000003F00 |
| 4 | B19F2A8A8BBAB8BD | 62 | 00000000000000FE | 0000000000003E00 |
Decrypt the chosen C and C of Table 3 using μ = 4, x0 = 0.1777.
| 1 | A7F55E0AEF19A566 | BB295E0AEF19A566 | 1CDC000000000000 | 16 | 5E0AEF19A566A729 |
| 2 | ABA16BD9AC1F83AC | ABB79D59AC1F83AC | 0016F68000000000 | 25 | B3583F075957423A |
| 3 | 2B876D414E8FBD7F | 2B8762BE8E8FBD7F | 00000FFFC0000000 | 34 | 3A3EF5FCAE1DB5FA |
| 4 | 6A2A9568E24C2424 | 6A252AE8E24C2424 | 000FBF8000000000 | 26 | A389309091A8AAAB |
Figure 2.(a) Plaintext. (b) The ciphertext. (c) The result of attack.
Figure 3.System architecture of the camera sensor network.
Entropy test result.
| Test file | Lena | Text file | Video file |
|---|---|---|---|
| Ciphertext entropy | 7.9923 | 7.9981 | 7.9919 |
The correlation coefficients of the adjacent pixels.
| Horizontal | 0.98448 | 0.0031261 |
| Vertical | 0.94878 | 0.0057563 |
| Diagonal | 0.96787 | 0.0130690 |
Figure 4.Correlation of the adjacent pixels (1–3)are plaintext and (4–6) are ciphertext.
The correlation coefficients of the ciphertexts.
| Ciphertext A | Ciphertext B | 0.00296 |
| Ciphertext A | Ciphertext C | 0.00137 |
| Ciphertext A | Ciphertext D | 0.00429 |
| Ciphertext B | Ciphertext C | 0.00153 |
| Ciphertext B | Ciphertext D | 0.00194 |
| Ciphertext C | Ciphertext D | 0.00296 |
Figure 5.Bit-wise XOR of two ciphertexts.