Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos

被引:37
作者
Wen, Heping [1 ,2 ,3 ]
Lin, Yiting [1 ,2 ]
Yang, Lincheng [1 ]
Chen, Ruiting [1 ]
机构
[1] Univ Elect Sci & Technol China, Zhongshan Inst, Zhongshan 528402, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Informat & Commun Engn, Chengdu 611731, Peoples R China
[3] Sun Yat Sen Univ, Guangdong Prov Key Lab Informat Secur Technol, Guangzhou 510006, Peoples R China
关键词
Image encryption; Cryptanalysis; Chosen-plaintext attack; Chosen-ciphertext attack;
D O I
10.1016/j.eswa.2024.123748
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 2019, a chaotic image encryption scheme based on a variant of the Hill cipher (VHC-CIES) was proposed by the Moroccan scholars. VHC-CIES introduces a Hill cipher variant and three improved one-dimensional chaotic maps to enhance the security. In this paper, we conduct a comprehensive cryptanalysis, and find that VHC-CIES can resist neither chosen-plaintext attack nor chosen-ciphertext attack due to its inherent flaws. When it comes to chosen-plaintext attack, firstly, we select a plaintext with the pixel values are all 0 and its corresponding ciphertext, and then use algebraic analysis to obtain the equivalent key stream for cracking VHC-CIES. Secondly, we select a plaintext which the pixel values are invariably 1 and obtain its corresponding ciphertext to obtain some Hill cipher variant parameters of VHC-CIES. Finally, we use the resulting steps of the first two to recover the original plain image from a given target cipher image. Similarly, a chosen-ciphertext attack method can also break VHC-CIES. Theoretical analysis and experimental results show that both chosenplaintext attack and chosen-ciphertext attack can effectively crack VHC-CIES with data complexity of only O (2). For color images of size 256 x 256 x 3, when our simulation encryption time is 0.3150 s, the time for complete breaking by chosen-plaintext attack and chosen-ciphertext attack is about 0.6020 s and 0.9643 s, respectively. To improve its security, some suggestions for further improvement are also given. The cryptanalysis work in this paper may provide some reference for the security enhancement of chaos -based image cryptosystem design.
引用
收藏
页数:11
相关论文
共 61 条
[1]   A New Image Encryption Algorithm Based on DNA State Machine for UAV Data Encryption [J].
Alawida, Moatsum ;
Teh, Je Sen ;
Alshoura, Wafa' Hamdan .
DRONES, 2023, 7 (01)
[2]   A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations [J].
Alawida, Moatsum ;
Teh, Je Sen ;
Mehmood, Abid ;
Shoufan, Abdulhadi ;
Alshoura, Wafa' Hamdan .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) :8136-8151
[3]   Regime transition and multi-scroll hyperchaos in a discrete neuron model [J].
Bao, Bocheng ;
Wang, Zhuowu ;
Hua, Zhongyun ;
Chen, Mo ;
Bao, Han .
NONLINEAR DYNAMICS, 2023, 111 (14) :13499-13512
[4]   Straightforward Guess and Determine Analysis Based on Genetic Algorithm [J].
Cao Chunping ;
Cen Zhe ;
Feng Xiutao ;
Wang Zhangyi ;
Zhu Yamin .
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2022, 35 (05) :1988-2003
[5]   Exploiting Semi-Tensor Product Compressed Sensing and Hybrid Cloud for Secure Medical Image Transmission [J].
Chai, Xiuli ;
Fu, Jiangyu ;
Gan, Zhihua ;
Lu, Yang ;
Zhang, Yushu ;
Han, Daojun .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (08) :7380-7392
[6]   TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key [J].
Chai, Xiuli ;
Wang, Yinjing ;
Chen, Xiuhui ;
Gan, Zhihua ;
Zhang, Yushu .
IEEE SIGNAL PROCESSING LETTERS, 2022, 29 :972-976
[7]   Security measurement of a medical communication scheme based on chaos and DNA coding [J].
Chen, Lei ;
Li, Chengqing ;
Li, Chao .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 83
[8]   A chaotic color image encryption scheme based on improved Arnold scrambling and dynamic DNA encoding [J].
Chen, Xiaoyang ;
Mou, Jun ;
Cao, Yinghong ;
Yan, Huizhen ;
Jahanshahi, Hadi .
MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (28) :43797-43818
[9]   A new class of discrete modular memristors and application in chaotic systems [J].
Ding, Yi ;
Liu, Wenhao ;
Wang, Huihai ;
Sun, Kehui .
EUROPEAN PHYSICAL JOURNAL PLUS, 2023, 138 (07)
[10]   2D eπ-map for image encryption [J].
Erkan, Ugur ;
Toktas, Abdurrahim ;
Toktas, Feyza ;
Alenezi, Fayadh .
INFORMATION SCIENCES, 2022, 589 :770-789