高级检索

    李建瑞, 汪鹏君, 张跃军, 李刚. 基于SHA-3算法的图像密钥生成方法[J]. 华东理工大学学报(自然科学版), 2015, (5): 693-697.
    引用本文: 李建瑞, 汪鹏君, 张跃军, 李刚. 基于SHA-3算法的图像密钥生成方法[J]. 华东理工大学学报(自然科学版), 2015, (5): 693-697.
    LI Jian-rui, WANG Peng-jun, ZHANG Yue-jun, LI Gang. Image Key Generation Method Based on SHA-3 Algorithm[J]. Journal of East China University of Science and Technology, 2015, (5): 693-697.
    Citation: LI Jian-rui, WANG Peng-jun, ZHANG Yue-jun, LI Gang. Image Key Generation Method Based on SHA-3 Algorithm[J]. Journal of East China University of Science and Technology, 2015, (5): 693-697.

    基于SHA-3算法的图像密钥生成方法

    Image Key Generation Method Based on SHA-3 Algorithm

    • 摘要: 通过对新发布的Hash标准SHA-3算法和常规密码算法的研究,提出了一种新颖的密钥生成方案,该方案采用SHA-3算法与图像相结合的方法。首先,将图像处理成SHA-3算法能够吸收的数据形式,使其经过SHA-3算法的三维矩阵空间变换后生成密钥;其次,利用像素直方分布图将生成的密钥以图像形式显示,证明生成的密钥满足密码算法中对初始密钥以及密钥流的安全性要求;最后,利用VS2013以及Quartus II软件对所提方案加以实现,验证所生成的密钥随机性最小可达到97.7%,密钥空间最小可达到2224

       

      Abstract: By analyzing the new standard SHA-3 and the traditional cryptographic algorithm, this paper proposes a novel key generation scheme, which combines SHA-3 algorithm with image. Firstly, image data are processed into the form of SHA-3 which can be absorbeal, and they are further conversed via three-dimensional matrix space of SHA-3 algorithm to generate secret key. Secondly, the secret key is displayed in the form of histogram distribution of the pixel in order to demonstrate that the generated key satisfies the security requirements of cryptographic algorithm in the initial key or key stream. Finally, the proposed scheme is realized by VS2013 and Quartus II tools. The experimental results show that the randomness of the generated key can reach 97.7% and the space can reach 2224 at least.

       

    /

    返回文章
    返回