Cryptanalysis and security enhancement for a chaos-based color image encryption algorithm

被引:12
作者
Huang, Rong [1 ,2 ]
Liao, Xiaojuan [3 ]
Dong, Aihua [1 ,2 ]
Sun, Shaoyuan [1 ,2 ]
机构
[1] Donghua Univ, Coll Informat Sci & Technol, Shanghai, Peoples R China
[2] Donghua Univ, Engn Res Ctr Digitized Text & Apparel Technol, Minist Educ, Shanghai, Peoples R China
[3] Chengdu Univ Technol, Sch Cyber Secur, Chengdu, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptanalysis; Chosen-plaintext attack; Image encryption; Chaotic cryptography; Hash function; COMBINATION; IMPROVEMENT;
D O I
10.1007/s11042-020-09163-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, a color image encryption scheme based on the Sine-Sine chaotic system has been proposed by Wanget al. (Signal Processing 144:444-452,2018). In their scheme, a private parameterEis defined based on global plain information in hope of resisting the chosen-plaintext attack. However, we find that the private parameter is dependent purely on average intensity of a plain image, thereby leaving an open door for cryptanalysis. In this paper, we propose a collision-based inference algorithm to effectively break Wang's image cipher. Then, in order to enhance the security, we develop a hash-based cryptosystem under the permutation-and-diffusion architecture. We conduct experiments and perform extensive comparative studies.The qualitative and quantitative results demonstrate the effectiveness of the collision-based inference algorithm, and the superiority of the proposed image cipher especially in terms of plaintext sensitivity.
引用
收藏
页码:27483 / 27509
页数:27
相关论文
共 26 条
[1]   An efficient image encryption scheme using lookup table-based confusion and diffusion [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Zhang, Li-bo ;
Zhang, Yushu .
NONLINEAR DYNAMICS, 2015, 81 (03) :1151-1166
[2]   Reusing the permutation matrix dynamically for efficient image cryptographic algorithm [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Yu, Hai ;
Zhang, Yushu .
SIGNAL PROCESSING, 2015, 111 :294-307
[3]   Cryptanalysis and improvement of the image cryptosystem reusing permutation matrix dynamically [J].
Diab, Hossam ;
El-semary, Aly M. .
SIGNAL PROCESSING, 2018, 148 :172-192
[4]   Circular inter-intra pixels bit-level permutation and chaos-based image encryption [J].
Diaconu, Adrian-Viorel .
INFORMATION SCIENCES, 2016, 355 :314-327
[5]   Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter [J].
Fan, Haiju ;
Li, Ming ;
Liu, Dong ;
Zhang, En .
SIGNAL PROCESSING, 2018, 143 :28-41
[6]  
Fan HJ, 2017, MATH PROBL ENG, P11
[7]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[8]   A Literature Review on Image Encryption Techniques [J].
Geetha, S. ;
Punithavathi, P. ;
Infanteena, A. Magnus ;
Sindhu, Siva S. Sivatha .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (03) :42-83
[9]   Color image encryption using chaotic nonlinear adaptive filter [J].
Hsiao, Hung-I ;
Lee, Junghsi .
SIGNAL PROCESSING, 2015, 117 :281-309
[10]   Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion [J].
Hu, Guiqiang ;
Xiao, Di ;
Wang, Yong ;
Li, Xinyan .
NONLINEAR DYNAMICS, 2017, 88 (02) :1305-1316