Cryptanalysis of image encryption scheme based on a new 1D chaotic system

被引:66
作者
Dhall, Sakshi [1 ,2 ]
Pal, Saibal K. [3 ]
Sharma, Kapil [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Sci & Engn, New Delhi 110042, India
[2] Jamia Millia Islamia, Dept Math, New Delhi 110025, India
[3] DRDO HQ, Dte IT & CS, New Delhi 110011, India
关键词
Cryptanalysis; Image encryption; Chaos; Permutation-substitution architecture; ONLY MULTIMEDIA CIPHERS; QUANTITATIVE CRYPTANALYSIS; SCRAMBLING ENCRYPTION; SECURITY ANALYSIS; ALGORITHM; PERMUTATION; EFFICIENT; BIT;
D O I
10.1016/j.sigpro.2017.12.021
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper demonstrates cryptanalysis of an image encryption scheme based on a new 1D chaotic system proposed by Zhou et al. (2014). It is claimed to possess high strength because of better chaotic properties of employed chaotic system, and use of random pixel insertion. On the contrary, several issues are identified in this image encryption scheme including improper definition of key-stream generator used in substitution step, static permutation leading to predictable diffusion and no contribution to confusion, fixed and small number of rounds, practical infeasibility of random-pixel insertion step with one-time use of utilized random values. For practical usability, one-time use condition is required to be dropped. In this case, it is analyzed that M x N cipher image can be represented as a set of linear equations (of original pixel values) derivable using O(M.N) chosen plain text images. Original image is then completely recoverable using differential cryptanalysis with single differential image represented as a set of M.N linear equations solvable with O((M.N)(3)) complexity. Experimental results demonstrate that the original image is completely recovered without any information regarding key or equivalent key-stream making author's claim of large key-space insignificant. Improvements have been proposed, with security analysis, to enhance strength of existing scheme. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:22 / 32
页数:11
相关论文
共 35 条
[1]  
[Anonymous], 2005, ENCY MULTIMEDIA
[2]  
[Anonymous], 1997, Handbook of Applied Cryptography
[3]   Differential cryptanalysis of a medical image cryptosystem with multiple rounds [J].
Chen, Lei ;
Wang, Shihong .
COMPUTERS IN BIOLOGY AND MEDICINE, 2015, 65 :69-75
[4]  
Devaney R., 2018, An Introduction to Chaotic Dynamical Systems
[5]   An efficient and secure medical image protection scheme based on chaotic maps [J].
Fu, Chong ;
Meng, Wei-hong ;
Zhan, Yong-feng ;
Zhu, Zhi-liang ;
Lau, Francis C. M. ;
Tse, Chi K. ;
Ma, Hong-feng .
COMPUTERS IN BIOLOGY AND MEDICINE, 2013, 43 (08) :1000-1010
[6]  
Gonzalez R. C., 1993, DIGITAL IMAGE PROCES
[7]   A fast image encryption method by using chaotic 3D cat maps [J].
Gu, Guosheng ;
Ling, Jie .
OPTIK, 2014, 125 (17) :4700-4705
[8]   Security analysis of image cryptosystems only or partially based on a chaotic permutation [J].
Hermassi, Houcemeddine ;
Rhouma, Rhouma ;
Belghith, Safya .
JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (09) :2133-2144
[9]  
Jolfaei A., 2016, IEEE T INF FORENSICS, V11
[10]  
Kumagai S., 2016, INT C OPT NETW DES M, P1, DOI 10.1109/MicroCom.2016.7522557