location:Home > 2020 Vol.3 Apr. No.2 > Intelligent parallel data encryption algorithm for network communication of CT mechanical scanning information publishing termin

2020 Vol.3 Apr. No.2

  • Title: Intelligent parallel data encryption algorithm for network communication of CT mechanical scanning information publishing termin
  • Name: Du Hui
  • Company: School of Mechanical and Electronic Engineering,Zaozhuang Univer
  • Abstract:

    The traditional algorithm does not take account of the authentication problem of terminal and server. It has poor security, heavy computation of encryption or decryption, and low efficiency. To address these problems, a new intelligent encryption algorithm for network communication parallel data of information release terminal is proposed in this paper. After users’ registration, the registered ID, user password, and two random numbers are entered. The first authentication data is obtained by calculating and then transferred through a secure channel to the server for the first authentication. After the success of the identity authentication in the information release terminal and the server, the user of the information release terminal obtains the release authority. Self-inverse key matrix is generated with MapReduce parallel mechanism. Source release information data file is divided into blocks in the communication process, and each block is encrypted with key matrix. After dividing the plaintext matrix and the key matrix, the plaintext is encrypted according to the Hill encryption principle. After obtaining the ciphertext and key matrix, the plaintext is decrypted according to the principle of Hill decryption principle. Experimental results show that the proposed algorithm has high security and efficiency.

  • Keyword: Information release terminal; network communication; parallel; data encryption
  • DOI: 10.12250/jpciams2020020217
  • Citation form: Du Hui.Intelligent parallel data encryption algorithm for network communication of CT mechanical scanning information publishing termin[J]. Computer Informatization and Mechanical System, 2020, vol. 3, pp. 7-17.
Reference:

[1] W.S.Yap, C.W. Phan, W.C. Yau, et al, Cryptanalysis of a new image alternate encryption algorithm based on chaotic map, Nonlinear Dynamics 80(12) (2015),1483-1491.
[2] X. Lai, International data encryption algorithm, Hepatology 60(12) (2016),2125–2126.
[3] L. Liu, S. Hao, J. Lin,et al, Image block encryption algorithm based on chaotic maps, Iet Signal Processing 12(13) (2018), 22-30.
[4] L. Guo, Big Data Encryption to Protect Privacy Data Environment Improvement and Simulation of the Algorithm, Computer Simulation 33 (12) (2016), 338-341.
[5] X .Liu,W. Mei and H. Du, Simultaneous image compression, fusion and encryption algorithm based on compressive sensing and chaos, Optics Communications 366(12) (2016), 22-32.
[6] X.Yang, Z. Shen, X. Hu, et al, Chaotic encryption algorithm against chosen-plaintext attacks in optical ofdm transmission, IEEE Photonics Technology Letters 28(2) (2016), 2499-2502.
[7] C. Li, D. Lin and J. Lü, Cryptanalyzing an image-scrambling encryption algorithm of pixel bits, IEEE Multimedia 24(23) (2017), 64-71.
[8] A. ÜnalÇavuşoğlu, S. Kaçar, I. Pehlivan, et al, Secure image encryption algorithm design using a novel chaos based s-box, Chaos Solitons&Fractals 95(12) (2017), 92-101.
[9] M. Dzwonkowski, M. Papaj and R. Rykaczewski, A new quaternion-based encryption method for dicom images, IEEE Transactions on Image Processing 24(13) (2015), 4614-4622.
[10] R. Cabaniss, V. Kumar and S. Madria, Multi-party encryption (mpe): secure communications in delay tolerant networks, Wireless Networks 21(6) (2016),1243-1258.
[11] Y. Shi, W. Wei and Z. He, A lightweight white-box symmetric encryption algorithm against node capture for wsns, Sensors 15(14) (2015), 11928-11952.
[12] J. Li, Research on the application of data encryption technology in network security transmission, Revista De La Facultad De Ingenieria 32(15) (2017), 595-604.
[13] Z. Kartit, M.E. Marraki, Applying encryption algorithm to enhance data security in cloud storage, Engineering Letters 23(21) (2015), 277-282.
[14] P. Saravanan, K.K. Thyagarajan, A novel block-based selective embedding type video data hiding using encryption algorithms, Lecture Notes in Electrical Engineering 326(34) (2015), 1087 -1097.
[15] G. Zhou, D. Zhang, Y. Liu, et al, A novel image encryption algorithm based on chaos and line map, Neurocomputing 169(23) (2015), 150-157.

Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16