Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption

被引:197
作者
Preishuber, Mario [1 ]
Huetter, Thomas [1 ]
Katzenbeisser, Stefan [2 ]
Uhl, Andreas [1 ]
机构
[1] Salzburg Univ, Dept Comp Sci, A-5020 Salzburg, Austria
[2] Tech Univ Darmstadt, Dept Comp Sci, D-64289 Darmstadt, Germany
基金
奥地利科学基金会;
关键词
Chaos-based encryption; image and video encryption; security analysis; cryptanalysis; ALGORITHM; SYSTEM; CRYPTANALYSIS; BREAKING; DESIGN; MAP;
D O I
10.1109/TIFS.2018.2812080
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over the past years, an enormous variety of different chaos-based image and video encryption algorithms have been proposed and published. While any algorithm published undergoes some more or less strict experimental security analysis, many of those schemes are being broken in subsequent publications. In this paper, we show that two main motivations for preferring chaos-based image encryption over classical strong cryptographic encryption, namely computational effort and security benefits, are highly questionable. We demonstrate that several statistical tests, commonly used to assess the security of chaos-based encryption schemes, are insufficient metrics for security analysis. We do this experimentally by constructing obviously insecure encryption schemes and demonstrating that they perform well and/or pass several of these tests. In conclusion, these tests can only give a necessary, but by no means a sufficient condition for security. As a consequence of this paper, several security analyses in related work are questionable; further, methodologies for the security assessment for chaos-based encryption schemes need to be entirely reconsidered.
引用
收藏
页码:2137 / 2150
页数:14
相关论文
共 69 条
[1]   A hybrid chaotic system and cyclic elliptic curve for image encryption [J].
Abd El-Latif, Ahmed A. ;
Niu, Xiamu .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2013, 67 (02) :136-143
[2]  
Ahmad M., 2014, INTERCOMPONENT PIXEL
[3]  
Alghamdi Abdullah Sharaf, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P739, DOI 10.1109/CSE.2009.317
[4]   New approach to chaotic encryption [J].
Alvarez, E ;
Fernández, A ;
García, P ;
Jiménez, J ;
Marcano, A .
PHYSICS LETTERS A, 1999, 263 (4-6) :373-375
[5]   Cryptanalyzing a discrete-time chaos synchronization secure communication system [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :689-694
[6]  
Alvarez G, 2011, STUD COMPUT INTELL, V354, P257
[7]  
[Anonymous], 2005, RES MANAGEMENT
[8]  
Arnold V. I., 1967, Problemes Ergodiques de la Mecanique Classique
[9]   Efficient Image Chaotic Encryption Algorithm with No Propagation Error [J].
Awad, Abir ;
Awad, Dounia .
ETRI JOURNAL, 2010, 32 (05) :774-783
[10]  
Balatoni J., 1956, Publ. Math. Inst. Hung. Acad. Sci, V1, P9