International Journal of Emerging Electric Power Systems,
Год журнала:
2023,
Номер
unknown
Опубликована: Дек. 29, 2023
Abstract
Today,
creating
a
smart
grid
that
is
resistant
to
cyberattacks
subject
of
utmost
significance.
One
the
components
most
susceptible
cyber-attack
phasor
measuring
unit
(PMU).
The
reason
PMU
employs
IEEE
C37.118.2
communication
standards,
which
specify
structure
and
sequencing
data
packets
but
offer
no
security
measures.
Users
must
implement
techniques
ensure
protection
data.
Additionally,
communicates
via
public
wide-area
network,
raising
risk
security.
In
addition,
crucial
component
grid,
enabling
different
choices
for
reliable
functioning
be
made
using
its
This
research
suggests
chaos-based
encryption
solution
close
knowledge
gap
reduce
confidentiality
assault
on
For
this,
brand-new
boost
converter
logarithmic
map
(BCLM),
one-dimensional
(1D)
chaotic
map,
has
been
presented.
demonstrates
how
suggested
better
qualities
than
conventional
maps.
pseudorandom
generator
BCLM
system.
are
encrypted
random
sequence
produced
by
not
computationally
demanding,
making
it
simple
in
device
with
limited
resources.
Applied Sciences,
Год журнала:
2025,
Номер
15(2), С. 913 - 913
Опубликована: Янв. 17, 2025
This
paper
skillfully
incorporates
the
memristor
model
into
a
chaotic
system,
creating
two-dimensional
(2D)
hyperchaotic
map.
The
system’s
exceptional
performance
is
verified
through
methods
such
as
phase
diagrams,
bifurcation
and
Lyapunov
exponential
spectrum.
Additionally,
universal
framework
corresponding
to
system
proposed.
To
enhance
encryption
security,
pixel
values
of
image
are
preprocessed,
hash
function
used
generate
value,
which
then
incorporated
secret
keys
generation
process.
Existing
algorithms
typically
encrypt
three
channels
color
separately
or
perform
only
at
level,
resulting
in
certain
limitations
effectiveness.
address
this,
this
proposes
novel
algorithm
based
on
2D
maps
that
extends
from
single-channel
multi-channel
(SEME-TDHM).
SEME-TDHM
combines
random
scrambling,
followed
by
local
cross-diffusion
across
different
planes.
By
integrating
both
pixel-level
bit-level
diffusion,
randomness
information
distribution
significantly
increased.
Finally,
diffusion
matrix
decomposed
restored
encrypted
image.
Simulation
results
comparative
analyses
demonstrate
outperforms
existing
terms
maintains
stable
entropy
around
7.999,
with
average
NPCR
UACI
close
ideal
benchmarks
99.6169%
33.4623%,
respectively,
further
affirming
its
outstanding
histogram
shows
uniform
distribution,
correlation
coefficient
nearly
zero.
These
findings
indicate
successfully
encrypts
images,
providing
strong
security
practical
utility.
Entropy,
Год журнала:
2023,
Номер
25(11), С. 1478 - 1478
Опубликована: Окт. 25, 2023
Protecting
digital
data,
especially
images,
from
unauthorized
access
and
malicious
activities
is
crucial
in
today's
era.
This
paper
introduces
a
novel
approach
to
enhance
image
encryption
by
combining
the
strengths
of
RSA
algorithm,
homomorphic
encryption,
chaotic
maps,
specifically
sine
logistic
map,
alongside
self-similar
properties
fractal
Sierpinski
triangle.
The
proposed
fractal-based
hybrid
cryptosystem
leverages
Paillier
for
maintaining
security
privacy,
while
maps
introduce
randomness,
periodicity,
robustness.
Simultaneously,
triangle
generates
intricate
shapes
at
different
scales,
resulting
substantially
expanded
key
space
heightened
sensitivity
through
randomly
selected
initial
points.
secret
keys
derived
are
employed
encryption.
scheme
offers
simplicity,
efficiency,
robust
security,
effectively
safeguarding
against
statistical,
differential,
brute-force
attacks.
Through
comprehensive
experimental
evaluations,
we
demonstrate
superior
performance
compared
existing
methods
terms
both
efficiency.
makes
significant
contribution
field
paving
way
further
exploration
optimization
future.
Physica Scripta,
Год журнала:
2024,
Номер
99(2), С. 025253 - 025253
Опубликована: Янв. 10, 2024
Abstract
With
the
advancement
of
computational
capacity,
key
space
will
become
one
crucial
factors
influencing
security
digital
cryptographic
systems.
Despite
chaotic-based
systems
possessing
large
spaces,
post-Moore’s
era
rapid
growth
in
capacity
continues
to
pose
challenges
To
address
this
issue,
a
novel
image
encryption
scheme
based
on
non-autonomous
chaotic
system
is
presented
paper.
In
particular,
brain
inspired
neuron
called
continuous-coupled
neural
network
(CCNN)
utilized
design
scheme.
achieve
efficient
scheme,
firstly,
CCNN
model
simplified
uncoupled-linking
model.
The
dynamic
behavior
under
various
driving
signals
studied.
analysis
showed
that
exhibit
sine
waves,
triangular
sawtooth,
superimposed
etc.
Secondly,
decorrelation
operation
method
enhance
pseudo-randomness
sequence.
On
basis,
thirdly,
proposed.
It
uses
bit-level
pixel
scrambling,
row
column
scrambling
and
diffusion
modify
value
position
image.
Security
shows
proposed
able
resist
differential
attack,
statistics
known-plaintext
attack
brute
force
attack.
Moreover,
can
be
extended
by
combination
drive
signals.
This
unique
feature
makes
infinite,
leading
kind
chaos-based
competitive
candidate
era.
Electronics,
Год журнала:
2025,
Номер
14(10), С. 2092 - 2092
Опубликована: Май 21, 2025
In
the
digital
information
age,
although
images
are
widely
used,
security
issues
associated
with
them
have
become
increasingly
severe.
Consequently,
ensuring
secure
image
transmission
has
a
critical
challenge
in
contemporary
research.
Chaotic
systems
characterized
by
non-periodic
behavior,
strong
dependence
on
initial
conditions,
and
other
favorable
characteristics,
been
employed
scrambling
diffusion
processes
of
encryption.
Compared
to
classical
chaotic
maps,
quantum
Logistic
map
exhibits
better
randomness
stronger
sensitivity
values,
effectively
overcoming
attractor
problem
inherent
thereby
significantly
enhancing
robustness
encryption
methodologies.
This
article
focuses
innovative
integration
map,
hyper-chaotic
Lorenz
DNA
dynamic
encoding
technology,
design
implement
highly
efficient
scheme.
First,
high-quality
random
number
sequences
produced
utilizing
which
is
then
perform
operation
image.
Next,
integrating
yielded
from
rules,
we
process,
increasing
strength
Experimental
simulation
results
multiple
analyses
demonstrated
that
our
methodology
achieved
excellent
performance,
resisting
variety
attack
strategies,
it
holds
significant
potential
for
research
protecting
through