請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/666完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 吳家麟 | |
| dc.contributor.author | Cheng-Yi Lin | en |
| dc.contributor.author | 林承億 | zh_TW |
| dc.date.accessioned | 2021-05-11T04:54:31Z | - |
| dc.date.available | 2020-09-30 | |
| dc.date.available | 2021-05-11T04:54:31Z | - |
| dc.date.copyright | 2019-08-19 | |
| dc.date.issued | 2019 | |
| dc.date.submitted | 2019-08-13 | |
| dc.identifier.citation | R. Matthews, “On the derivation of a“chaotic”encryption algorithm,” Cryptologia, vol. 13, pp. 29–42, 1989.
T. M. Hoang and H. X. Thanh, “Cryptanalysis and security improvement for a symmetric color image encryption algorithm,” Optik, vol. 155, pp. 366–383, 2018. L. Huang, S. Cai, M. Xiao, and X. Xiong, “A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion,” Entropy, vol. 20, no. 7, p. 535, 2018. V. I. Arnold and A. Avez, Ergodic Problems of Classical Mechanics. Benjamin, 1968. V. Alvarez, J. M. Amigó, D. Arroyo, and S. Li, Chaos-Based Cryptography. Springer, 2011. G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129–2151, 2006. H. Liu, Z. Zhu, H. Jiang, and B. Wang, “A novel image encryption algorithm based on improved 3d chaotic cat map,” in The 9th International Conference for Young Computer Scientists, p. 3016–3021, IEEE, 2008. Y. Wu, “NPCR and UACI randomness tests for image encryption,” Cyber Journals: Journal of Selected Areas in Telecommunications, pp. 31–38, April 2011. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/handle/123456789/666 | - |
| dc.description.abstract | 去年七月,Huang 等人提出了一個基於混沌映射且採用明文關聯置換與擴散之影像加密系統(CIES-UBPRPD)。在CIES-UBPRPD 中,置換與擴散都是與明文產生關連的操作。儘管Huang 等人宣稱CIESUBPRPD有著高度的明文敏感性,我們依然發現其設計上的缺陷使得它無法抵抗選擇明文攻擊。本篇論文分析了CIES-UBPRPD 中的安全缺陷,且提出一種選擇明文攻擊破解它。我們也提供了一種改進過後的加密演算法,克服了CIES-UBPRPD 原先的缺陷。 | zh_TW |
| dc.description.abstract | Recently, a simple chaotic map-based image encryption system using both plaintext related permutation and diffusion (CIES-UBPRPD) has been proposed by Huang et al. In CIES-UBPRPD, both the permutation operation and the diffusion operation are related to plain images. Despite the claim that CIES-UBPRPD has high plaintext sensitivity, we have found that it still vulnerable to chosen-plaintext attack. In this thesis, we analyze the security flaws of CIES-UBPRPD and propose a chosen-plaintext attack to break it. Furthermore, we present an improved encryption algorithm to remedy those flaws of CIES-UBPRPD. | en |
| dc.description.provenance | Made available in DSpace on 2021-05-11T04:54:31Z (GMT). No. of bitstreams: 1 ntu-108-R06944035-1.pdf: 25326928 bytes, checksum: cb693e7e2f1472b976fc42dadc30f89b (MD5) Previous issue date: 2019 | en |
| dc.description.tableofcontents | 口試委員會審定書i
摘要ii Abstract iii 1 Introduction 1 2 Description of the Original Algorithm 2 2.1 The Preparatory Work 2 2.1.1 Generalized Arnold’s Cat Map 2 2.1.2 Chebyshev Map 3 2.2 Image Encryption Algorithm 3 2.2.1 Permutation Stage 3 2.2.2 Diffusion Stage 4 2.3 Image Decryption Algorithm 5 3 Cryptanalysis 7 3.1 Security Flaws 7 3.1.1 Equivalent Keys Problem 7 3.1.2 Low Sensitivity to the Change of Plaintext 8 3.2 Chosen-Plaintext Attack 9 3.2.1 Extract k1 mod 256,k2 mod 256 and k3 mod 256 10 3.2.2 Extract Diffusion Matrix D 12 3.2.3 Recover the Original Plain Image 13 4 Improved Algorithm 15 4.1 The Weaknesses of CIES-UBPRPD 15 4.2 Secret Key Formulation 16 4.3 Image Encryption Algorithm 16 4.3.1 Permutation Stage 16 4.3.2 Diffusion Stage 17 4.4 Image Decryption Algorithm 18 5 Experimental Results 20 6 Security Analysis 22 6.1 Key Space Analysis 22 6.2 Histogram Analysis 22 6.3 Correlation Analysis 25 6.4 Key Sensitivity Analysis 26 6.5 Plaintext Sensitivity Analysis 26 7 Conclusion and Discussion 30 Bibliography 31 | |
| dc.language.iso | en | |
| dc.subject | 影像加密 | zh_TW |
| dc.subject | 渾沌映射 | zh_TW |
| dc.subject | 明文關連 | zh_TW |
| dc.subject | 密碼分析 | zh_TW |
| dc.subject | 選擇明文攻擊 | zh_TW |
| dc.subject | Chosen-Plaintext Attack | en |
| dc.subject | Image Encryption | en |
| dc.subject | Chaotic Map | en |
| dc.subject | Plaintext Related | en |
| dc.subject | Cryptanalysis | en |
| dc.title | 一個基於混沌映射且採用明文關聯置換與擴散之影像加密系統的分析與改進 | zh_TW |
| dc.title | Cryptanalysis and Improvement of a Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion | en |
| dc.date.schoolyear | 107-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 陳文進,歐陽明 | |
| dc.subject.keyword | 影像加密,渾沌映射,明文關連,密碼分析,選擇明文攻擊, | zh_TW |
| dc.subject.keyword | Image Encryption,Chaotic Map,Plaintext Related,Cryptanalysis,Chosen-Plaintext Attack, | en |
| dc.relation.page | 31 | |
| dc.identifier.doi | 10.6342/NTU201903136 | |
| dc.rights.note | 同意授權(全球公開) | |
| dc.date.accepted | 2019-08-13 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 資訊網路與多媒體研究所 | zh_TW |
| 顯示於系所單位: | 資訊網路與多媒體研究所 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-108-1.pdf | 24.73 MB | Adobe PDF | 檢視/開啟 |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
