Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Más filtros










Base de datos
Intervalo de año de publicación
1.
Entropy (Basel) ; 25(3)2023 Feb 21.
Artículo en Inglés | MEDLINE | ID: mdl-36981284

RESUMEN

This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row-column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data.

2.
Entropy (Basel) ; 25(3)2023 Mar 09.
Artículo en Inglés | MEDLINE | ID: mdl-36981364

RESUMEN

Due to the equivalent keys revealed by a chosen-plaintext attack or a chosen-ciphertext attack, most of the existing chaotic image encryption schemes are demonstrated to be insecure. In order to improve security performance, some scholars have recently proposed the plaintext-related chaotic image encryption scheme. Although the equivalent effect of a one-time pad is achieved, an additional secure channel is required to transmit the hash values or other parameters related to the plaintext before the ciphertext can be decrypted at the receiving end. Its main drawback is that an absolutely secure channel is needed to transmit the information related to the plaintext, which is not feasible in practical applications. To further solve this problem, this paper proposes a chaotic image encryption scheme based on global dynamic selection of a multi-parallel structure. First, a chaotic sequence is employed to dynamically select DNA encoding rules. Secondly, the permutation with a multi-parallel structure is performed on the DNA-encoded matrix, and the DNA decoding rules are dynamically selected according to another chaotic sequence. Finally, the diffusion rules obtained by the ciphertext feedback mechanism are introduced to determine the dynamic diffusion. Compared with the existing local dynamic encryption schemes, the main advantage of this scheme is that it can realize global dynamic selection, so as to ensure that there is no equivalent key, and it can resist the chosen-ciphertext attack or chosen-plaintext attack and does not need an additional secure channel to transmit parameters related to plaintext, which is practical. A theoretical analysis and numerical experiments demonstrate the feasibility of the method.

3.
J Pineal Res ; 74(3): e12855, 2023 Apr.
Artículo en Inglés | MEDLINE | ID: mdl-36692032

RESUMEN

Autophagy deficiency in macrophages exacerbates inflammation in atherosclerosis (AS), and recently, galectin-3 (Gal-3) has been implicated as a critical promoter of inflammation in AS. Further, melatonin (Mel) exerts an autophagy-promoting effect in many chronic inflammatory diseases. In this study, we aimed to investigate whether Mel inhibits AS progression by downregulating Gal-3 to enhance autophagy and inhibit inflammation. Thus, we performed in vivo and in vitro experiments using high-fat diet (HFD)-fed ApoE-/-  mice and THP-1 macrophages, respectively. Smart-seq of AS plaque macrophages revealed that the differentially expressed genes (DEGs) downregulated by Mel were enriched in immune-related processes, and changes in inflammation status were confirmed based on lower levels of proinflammatory factors in Mel-treated HFD-fed ApoE-/-  mice and THP-1 macrophages. Further, via transcriptome-based multiscale network pharmacology platform (TMNP), the upstream target genes of the smart-seq DEGs were identified, and Gal-3 showed a high score. Gal-3 was downregulated both in vivo and in vitro by Mel treatment. Besides, the enrichment of the target genes predicted via the TMNP method indicated that autophagy considerably affected the DEGs. Mel treatment as well as Gal-3 knockdown downregulated most inflammatory response-related proteins could attribute to enhancing autophagy. Mechanistically, Mel treatment inhibited Gal-3 leading to lowering the activity of the nuclear transcription factor-kappa B (NF-κB) pathway, and promoting the nuclear localization of transcription factor EB (TFEB). However, increased secretion of Gal-3 activated the phosphatidylinositol 3-kinase (PI3K)/protein kinase B (AKT) pathway and impaired autophagy via binding to CD98. Thus, Mel promoted autophagy and restrained inflammation by downregulating Gal-3, implying that it holds promise as a treatment for AS.


Asunto(s)
Aterosclerosis , Melatonina , Animales , Ratones , Galectina 3/genética , Galectina 3/metabolismo , Galectina 3/farmacología , Melatonina/farmacología , Regulación hacia Abajo , Transducción de Señal , Fosfatidilinositol 3-Quinasas/metabolismo , Aterosclerosis/tratamiento farmacológico , Aterosclerosis/genética , Inflamación/metabolismo , FN-kappa B/metabolismo , Autofagia , Apolipoproteínas E/genética , Apolipoproteínas E/metabolismo
4.
Entropy (Basel) ; 24(8)2022 Jul 25.
Artículo en Inglés | MEDLINE | ID: mdl-35893003

RESUMEN

This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) infinite collapse map. The encryption algorithm adopts a permutation-diffusion structure and can perform two or more rounds to achieve a higher level of security. By cryptanalysis, it is found that the original diffusion process can be split into a permutation-diffusion structure, which comes after the original permutation, so these two permutations can be merged into one. Then, some theorems about round-down operation are summarized, and the encryption and decryption equations in the diffusion process are deduced and simplified accordingly. Since the chaotic sequences used in encryption algorithm are independent of the plaintext and ciphertext, there are equivalent keys. The original encryption algorithm with single-round, two-round, and multi-round of permutation-diffusion processes is cracked, and the data complexity of the cryptanalysis attacks is analyzed. Numerical simulation is carried out by MATLAB, and the experimental results and theoretical analysis show the effectiveness of the cryptanalysis attacks. Finally, some suggestions for improvement are given to overcome the shortcomings of the original encryption algorithm.

5.
Entropy (Basel) ; 23(11)2021 Oct 29.
Artículo en Inglés | MEDLINE | ID: mdl-34828129

RESUMEN

In actual application scenarios of the real-time video confidential communication, encrypted videos must meet three performance indicators: security, real-time, and format compatibility. To satisfy these requirements, an improved bitstream-oriented encryption (BOE) method based chaotic encryption for H.264/AVC video is proposed. Meanwhile, an ARM-embedded remote real-time video confidential communication system is built for experimental verification in this paper. Firstly, a 4-D self-synchronous chaotic stream cipher algorithm with cosine anti-controllers (4-D SCSCA-CAC) is designed to enhance the security. The algorithm solves the security loopholes of existing self-synchronous chaotic stream cipher algorithms applied to the actual video confidential communication, which can effectively resist the combinational effect of the chosen-ciphertext attack and the divide-and-conquer attack. Secondly, syntax elements of the H.264 bitstream are analyzed in real-time. Motion vector difference (MVD) coefficients and direct-current (DC) components in Residual syntax element are extracted through the Exponential-Golomb decoding operation and entropy decoding operation based on the context-based adaptive variable length coding (CAVLC) mode, respectively. Thirdly, the DC components and MVD coefficients are encrypted by the 4-D SCSCA-CAC, and the encrypted syntax elements are re-encoded to replace the syntax elements of the original H.264 bitstream, keeping the format compatibility. Besides, hardware codecs and multi-core multi-threading technology are employed to improve the real-time performance of the hardware system. Finally, experimental results show that the proposed scheme, with the advantage of high efficiency and flexibility, can fulfill the requirement of security, real-time, and format compatibility simultaneously.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA
...