scispace - formally typeset
Search or ask a question
Author

Qun Ding

Bio: Qun Ding is an academic researcher from Heilongjiang University. The author has contributed to research in topics: Chaotic & Attractor. The author has an hindex of 5, co-authored 8 publications receiving 91 citations.
Topics: Chaotic, Attractor, Encryption, Cryptography, Cipher

Papers
More filters
Journal ArticleDOI
27 Apr 2018-Entropy
TL;DR: The hidden dynamics of a new two-dimensional map inspired by Arnold’s cat map is investigated, and the existence of fixed points and their stabilities are studied in detail.
Abstract: The investigations of hidden attractors are mainly in continuous-time dynamic systems, and there are a few investigations of hidden attractors in discrete-time dynamic systems. The classical chaotic attractors of the Logistic map, Tent map, Henon map, Arnold's cat map, and other widely-known chaotic attractors are those excited from unstable fixed points. In this paper, the hidden dynamics of a new two-dimensional map inspired by Arnold's cat map is investigated, and the existence of fixed points and their stabilities are studied in detail.

36 citations

Journal ArticleDOI
02 Jul 2019-Symmetry
TL;DR: A chaotic system and two Nonlinear Feadback Shift Registers (NFSRs) are used to generate a new stream cipher that has good cryptographic characteristics and can be used for efficient encryption in resource-constrained devices or environments.
Abstract: A chaotic system and two Nonlinear Feadback Shift Registers (NFSRs) are used to generate a new stream cipher in this paper. This design can be used for efficient encryption in resource-constrained devices or environments. The chaotic system is quantified and integrated with two NFSRs based on the technology of Field Programmable Gate Array (FPGA). Many analyses are made from the angle of entropy in order to verify the cryptographic characteristics of the stream cipher, and National Institute of Standards and Technology (NIST) statistical test is completed to analyze the cipher. The test results show that the stream cipher here has good cryptographic characteristics.

34 citations

Journal ArticleDOI
06 Jun 2018-Entropy
TL;DR: A four-dimensional hyperchaotic system with four positive Lyapunov exponents serve as the chaotic sequence generator of the self-synchronous stream cipher in order to enhance the security and complexity of the image encryption system.
Abstract: In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data. Two-dimensional discrete wavelet transform and Arnold mapping are used to scramble the pixel value of the original image. A four-dimensional hyperchaotic system with four positive Lyapunov exponents serve as the chaotic sequence generator of the self-synchronous stream cipher in order to enhance the security and complexity of the image encryption system. Finally, the simulation experiment results show that this image encryption scheme is both reliable and secure.

18 citations

Journal ArticleDOI
11 Sep 2018-Entropy
TL;DR: The results indicate that the dynamic variety ofencrypted rounds can achieve different levels of encryption for different information, which can achieve the purpose of enhancing the anti-attack ability and reducing the number of encrypted rounds.
Abstract: According to the keyword abstract extraction function in the Natural Language Processing and Information Retrieval Sharing Platform (NLPIR), the design method of a dynamic rounds chaotic block cipher is presented in this paper, which takes into account both the security and efficiency The cipher combines chaotic theory with the Feistel structure block cipher, and uses the randomness of chaotic sequence and the nonlinearity of chaotic S-box to dynamically generate encrypted rounds, realizing more numbers of dynamic rounds encryption for the important information marked by NLPIR, while less numbers of dynamic rounds encryption for the non-important information that is not marked Through linear and differential cryptographic analysis, ciphertext information entropy, "0-1" balance and National Institute of Science and Technology (NIST) tests and the comparison with other traditional and lightweight block ciphers, the results indicate that the dynamic variety of encrypted rounds can achieve different levels of encryption for different information, which can achieve the purpose of enhancing the anti-attack ability and reducing the number of encrypted rounds Therefore, the dynamic rounds chaotic block cipher can guarantee the security of information transmission and realize the lightweight of the cryptographic algorithm

15 citations

Journal ArticleDOI
10 Mar 2020-Entropy
TL;DR: The histogram, correlation coefficient, entropy test, and security analysis show that the hyperchaotic system has good random characteristics and can be applied to the gray image encryption.
Abstract: In this paper, a new 4D hyperchaotic system is generated. The dynamic properties of attractor phase space, local stability, poincare section, periodic attractor, quasi-periodic attractor, chaotic attractor, bifurcation diagram, and Lyapunov index are analyzed. The hyperchaotic system is normalized and binary serialized, and the binary hyperchaotic stream generated by the system is statistically tested and entropy analyzed. Finally, the hyperchaotic binary stream is applied to the gray image encryption. The histogram, correlation coefficient, entropy test, and security analysis show that the hyperchaotic system has good random characteristics and can be applied to the gray image encryption.

12 citations


Cited by
More filters
01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Journal ArticleDOI
03 Jul 2019-Entropy
TL;DR: This work proposes an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks.
Abstract: Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.

93 citations

Journal ArticleDOI
07 Feb 2019-Entropy
TL;DR: This paper presents a non-equilibrium four-dimensional chaotic system with hidden attractors and investigates its dynamical behavior using a bifurcation diagram, as well as three well-known entropy measures, such as approximate entropy, sample entropy, and Fuzzy entropy.
Abstract: Today, four-dimensional chaotic systems are attracting considerable attention because of their special characteristics. This paper presents a non-equilibrium four-dimensional chaotic system with hidden attractors and investigates its dynamical behavior using a bifurcation diagram, as well as three well-known entropy measures, such as approximate entropy, sample entropy, and Fuzzy entropy. In order to stabilize the proposed chaotic system, an adaptive radial-basis function neural network (RBF-NN)-based control method is proposed to represent the model of the uncertain nonlinear dynamics of the system. The Lyapunov direct method-based stability analysis of the proposed approach guarantees that all of the closed-loop signals are semi-globally uniformly ultimately bounded. Also, adaptive learning laws are proposed to tune the weight coefficients of the RBF-NN. The proposed adaptive control approach requires neither the prior information about the uncertain dynamics nor the parameters value of the considered system. Results of simulation validate the performance of the proposed control method.

82 citations

Journal ArticleDOI
TL;DR: A nonequilibrium system with chaos is introduced in this work and S-boxes are constructed which are applied to propose a novel image encryption algorithm.
Abstract: Chaotic systems without equilibrium are of interest because they are the systems with hidden attractors. A nonequilibrium system with chaos is introduced in this work. Chaotic behavior of the system is verified by phase portraits, Lyapunov exponents, and entropy. We have implemented a real electronic circuit of the system and reported experimental results. By using this new chaotic system, we have constructed S-boxes which are applied to propose a novel image encryption algorithm. In the designed encryption algorithm, three S-boxes with strong cryptographic properties are used for the sub-byte operation. Particularly, the S-box for the sub-byte process is selected randomly. In addition, performance analyses of S-boxes and security analyses of the encryption processes have been presented.

82 citations

Journal ArticleDOI
13 Aug 2019-Entropy
TL;DR: A new compound chaotic system, Sine-Tent map, is proposed to widen the chaotic range and improve the chaotic performance of 1D discrete chaotic maps, which means that the new scheme has better application potential in real-time image encryption.
Abstract: In order to improve the security and efficiency of image encryption systems comprehensively, a novel chaotic S-box based image encryption scheme is proposed. Firstly, a new compound chaotic system, Sine-Tent map, is proposed to widen the chaotic range and improve the chaotic performance of 1D discrete chaotic maps. As a result, the new compound chaotic system is more suitable for cryptosystem. Secondly, an efficient and simple method for generating S-boxes is proposed, which can greatly improve the efficiency of S-box production. Thirdly, a novel double S-box based image encryption algorithm is proposed. By introducing equivalent key sequences {r, t} related with image ciphertext, the proposed cryptosystem can resist the four classical types of attacks, which is an advantage over other S-box based encryption schemes. Furthermore, it enhanced the resistance of the system to differential analysis attack by two rounds of forward and backward confusion-diffusion operation with double S-boxes. The simulation results and security analysis verify the effectiveness of the proposed scheme. The new scheme has obvious efficiency advantages, which means that it has better application potential in real-time image encryption.

79 citations