Cryptanalysis of image encryption scheme based on a new 1D chaotic system

被引:66
作者
Dhall, Sakshi [1 ,2 ]
Pal, Saibal K. [3 ]
Sharma, Kapil [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Sci & Engn, New Delhi 110042, India
[2] Jamia Millia Islamia, Dept Math, New Delhi 110025, India
[3] DRDO HQ, Dte IT & CS, New Delhi 110011, India
关键词
Cryptanalysis; Image encryption; Chaos; Permutation-substitution architecture; ONLY MULTIMEDIA CIPHERS; QUANTITATIVE CRYPTANALYSIS; SCRAMBLING ENCRYPTION; SECURITY ANALYSIS; ALGORITHM; PERMUTATION; EFFICIENT; BIT;
D O I
10.1016/j.sigpro.2017.12.021
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper demonstrates cryptanalysis of an image encryption scheme based on a new 1D chaotic system proposed by Zhou et al. (2014). It is claimed to possess high strength because of better chaotic properties of employed chaotic system, and use of random pixel insertion. On the contrary, several issues are identified in this image encryption scheme including improper definition of key-stream generator used in substitution step, static permutation leading to predictable diffusion and no contribution to confusion, fixed and small number of rounds, practical infeasibility of random-pixel insertion step with one-time use of utilized random values. For practical usability, one-time use condition is required to be dropped. In this case, it is analyzed that M x N cipher image can be represented as a set of linear equations (of original pixel values) derivable using O(M.N) chosen plain text images. Original image is then completely recoverable using differential cryptanalysis with single differential image represented as a set of M.N linear equations solvable with O((M.N)(3)) complexity. Experimental results demonstrate that the original image is completely recovered without any information regarding key or equivalent key-stream making author's claim of large key-space insignificant. Improvements have been proposed, with security analysis, to enhance strength of existing scheme. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:22 / 32
页数:11
相关论文
共 35 条
[21]   The novel bilateral - Diffusion image encryption algorithm with dynamical compound chaos [J].
Tong, Xiao-jun .
JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (04) :850-858
[22]   Cryptanalysis of a color image encryption algorithm based on chaos [J].
Tu, Guangyou ;
Liao, Xiaofeng ;
Xiang, Tao .
OPTIK, 2013, 124 (22) :5411-5415
[23]   Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps [J].
Wang, Bin ;
Xie, Yingjie ;
Zhou, Changjun ;
Zhou, Shihua ;
Zheng, Xuedong .
OPTIK, 2016, 127 (07) :3541-3545
[24]   Cryptanalysis of an image cryptosystem based on logistic map [J].
Wang, Bin ;
Wei, Xiaopeng ;
Zhang, Qiang .
OPTIK, 2013, 124 (14) :1773-1776
[25]   A color image encryption with heterogeneous bit-permutation and correlated chaos [J].
Wang, Xingyuan ;
Zhang, Hui-li .
OPTICS COMMUNICATIONS, 2015, 342 :51-60
[26]   A novel colour image encryption algorithm based on chaos [J].
Wang, Xingyuan ;
Teng, Lin ;
Qin, Xue .
SIGNAL PROCESSING, 2012, 92 (04) :1101-1108
[27]   A new image encryption algorithm based on chaos [J].
Wang, Xingyuan ;
Zhao, Jianfeng ;
Liu, Hongjun .
OPTICS COMMUNICATIONS, 2012, 285 (05) :562-566
[28]   On the cryptanalysis of Fridrich's chaotic image encryption scheme [J].
Xie, Eric Yong ;
Li, Chengqing ;
Yu, Simin ;
Lu, Jinhu .
SIGNAL PROCESSING, 2017, 132 :150-154
[29]   Image scrambling encryption algorithm of pixel bit based on chaos map [J].
Ye, Guodong .
PATTERN RECOGNITION LETTERS, 2010, 31 (05) :347-354
[30]   Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation [J].
Yen, JC ;
Guo, JI .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2000, 147 (02) :167-175