Qianxue Wang
University of Franche-Comté
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Qianxue Wang.
web information systems modeling | 2010
Christophe Guyeux; Qianxue Wang; Jacques M. Bahi
In this paper, a new chaotic pseudo-random number generator (PRNG) is proposed. It combines the well-known ISAAC and XORshift generators with chaotic iterations. This PRNG possesses important properties of topological chaos and can successfully pass NIST and TestU01 batteries of tests. This makes our generator suitable for information security applications like cryptography. As an illustrative example, an application in the field of watermarking is presented.
arXiv: Cryptography and Security | 2009
Qianxue Wang; Christophe Guyeux; Jacques M. Bahi
Security of information transmitted through the Internet, against passive or active attacks is an international concern. The use of a chaos-based pseudo-random bit sequence to make it unrecognizable by an intruder, is a field of research in full expansion. This mask of useful information by modulation or encryption is a fundamental part of the TLS Internet exchange protocol. In this paper, a new method using discrete chaotic iterations to generate pseudo-random numbers is presented. This pseudo-random number generator has successfully passed the NIST statistical test suite (NIST SP800-22). Security analysis shows its good characteristics. The application for secure image transmission through the Internet is proposed at the end of the paper.
arXiv: Cryptography and Security | 2010
Jacques M. Bahi; Xiaole Fang; Christophe Guyeux; Qianxue Wang
Due to the rapid development of the Internet in recent years, the need to find new tools to reinforce trust and security through the Internet has became a major concern. The discovery of new pseudo-random number generators with a strong level of security is thus becoming a hot topic, because numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we have described a generator based on chaotic iterations, which behaves chaotically as defined by Devaney. In this paper, the proposal is to improve the speed and the security of this generator, to make its use more relevant in the Internet security context. To do so, a comparative study between various generators is carried out and statistical results are given. Finally, an application in the information hiding framework is presented, to give an illustrative example of the use of such a generator in the Internet security field.
international conference on computer application and system modeling | 2010
Christophe Guyeux; Qianxue Wang; Jacques M. Bahi
In this paper, a new pseudo-random number generator (PRNG) based on chaotic iterations is proposed. This method also combines the digits of two XORshifts PRNGs. The statistical properties of this new generator are improved: the generated sequences can pass all the DieHARD statistical test suite. In addition, this generator behaves chaotically, as defined by Devaney. This makes our generator suitable for cryptographic applications. An illustration in the field of data hiding is presented and the robustness of the obtained data hiding algorithm against attacks is evaluated.
Journal of Network and Computer Applications | 2014
Jacques M. Bahi; Xiaole Fang; Christophe Guyeux; Qianxue Wang
The design and engineering of original cryptographic solutions is a major concern to provide secure information systems. In a previous study, we have described a generator based on chaotic iterations, which uses the well-known XORshift generator. By doing so, we have improved the statistical performances of XORshift and make it behave chaotically, as defined by Devaney. The speed and security of this former generator have been improved in a second study, to make its usage more relevant in the Internet security context. In this paper, these contributions are summarized and a new version of the generator is introduced. It is based on a new Lookup Table implying a large improvement of speed. A comparison and a security analysis between the XORshift and these three versions of our generator are proposed, and various new statistical results are given. Finally, an application in the information hiding framework is presented, to give an illustrative example of the use of such a generator in the Internet security field.
International Journal of Bifurcation and Chaos | 2016
Abdessalem Abidi; Qianxue Wang; Belgacem Bouallegue; Mohsen Machhout; Christophe Guyeux
The cipher block chaining (CBC) mode of operation was invented by IBM (International Business Machine) in 1976. It presents a very popular way of encrypting that is used in various applications. In this paper, we have mathematically proven that, under some conditions, the CBC mode of operation can admit a chaotic behavior according to Devaney. Some cases will be properly studied in order to provide evidence for this idea.
arXiv: Cryptography and Security | 2011
Jacques M. Bahi; Xiaole Fang; Christophe Guyeux; Qianxue Wang
arXiv: Cryptography and Security | 2011
Jacques M. Bahi; Jean-François Couchot; Christophe Guyeux; Qianxue Wang
arXiv: Chaotic Dynamics | 2016
Xiaole Fang; Christophe Guyeux; Qianxue Wang; Jacques M. Bahi
Archive | 2018
Qianxue Wang; Simin Yu; Christophe Guyeux