2019
DOI: 10.3390/e21030268
|View full text |Cite
|
Sign up to set email alerts
|

Implementing a Chaotic Cryptosystem by Performing Parallel Computing on Embedded Systems with Multiprocessors

Abstract: Profiling and parallel computing techniques in a cluster of six embedded systems with multiprocessors are introduced herein to implement a chaotic cryptosystem for digital color images. The proposed encryption method is based on stream encryption using a pseudo-random number generator with high-precision arithmetic and data processing in parallel with collective communication. The profiling and parallel computing techniques allow discovery of the optimal number of processors that are necessary to improve the e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 94 publications
(223 reference statements)
0
19
0
Order By: Relevance
“…Logistic chaotic system is a classical chaotic system, thus it has been widely used in data security and secure communication due to its complex dynamic behavior [3,24]. The mathematical expression of logistic equation is:…”
Section: Logistic Chaotic Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…Logistic chaotic system is a classical chaotic system, thus it has been widely used in data security and secure communication due to its complex dynamic behavior [3,24]. The mathematical expression of logistic equation is:…”
Section: Logistic Chaotic Systemmentioning
confidence: 99%
“…The extraction method in Table 3 represents the number in the 15-digit numerical sequence. (5,6,7,8) 10.4220 10.4218 10.4223 10.4222 (9,10,11,12) 10.4220 10.4224 10.4218 10.4220 (1,5,9,13) 10.4221 10.4220 10.4219 10.4223 (2,6,10,14) 10.4222 10.4221 10.4221 10.4221 (3,7,11,15) 10.4223 10.4214 10.4222 10.4219 Table 3 shows the proposed method has little effect on the randomness. In this paper, the last three extraction methods in Table 3 are selected to extract the initial value, system initial value and iteration times of the next chaotic system.…”
Section: Extraction Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Very recently, Flores-Vergara et al have implemented a chaotic cryptosystem on embedded systems with multiprocessors. The NIST statistical test and the security analysis have confirmed the proposed cryptosystem is very secure and robust for image encryption [ 14 ]. Wang et al used a spatiotemporal chaotic system to generate a pseudorandom sequence, and then used the sequence to conduct permutation and diffusion simultaneously [ 15 ].…”
Section: Introductionmentioning
confidence: 99%
“…On this issue, one can take advantage of embedded systems, which are very useful for solving real-world problems for different fields of application. For example, the System on a Chip (SoC) Raspberry Pi has been used to solve different problems of practical applications, such as the accounting of underwater fish [42] as special case in a fish farm, or to perform complex tasks such as parallel computing [43].…”
Section: Introductionmentioning
confidence: 99%