Security analysis of image cryptosystems only or partially based on a chaotic permutation

被引:30
作者
Hermassi, Houcemeddine [1 ]
Rhouma, Rhouma [1 ]
Belghith, Safya [1 ]
机构
[1] Ecole Natl Ingenieurs Tunis, Syscom Lab, Tunis, Tunisia
关键词
Cryptanalysis; Chaos; Image; Cryptosystem; Permutation; ONLY MULTIMEDIA CIPHERS; QUANTITATIVE CRYPTANALYSIS; SCRAMBLING ENCRYPTION; PIXEL BIT; STANDARD; ALGORITHM;
D O I
10.1016/j.jss.2012.04.031
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The paper proposes breaks for the permutation methods adopted in the chaos-based image cryptosystems. By a careful examination on the most chaotic image cryptosystems we can find that the permutation process constitute the main step or, in some cases, the only step to create the confusion. It can be applied on the pixels or on the pixel bits. A recently proposed image encryption scheme based on shuffling the pixel bits inspired from other works is treated as a case study. By applying a chosen plaintext attack, we demonstrate that a hacker can determine the permutation vectors (matrixes) used to permute the pixels bits or the pixels themselves and exploit them to reveal the plain image. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:2133 / 2144
页数:12
相关论文
共 28 条
  • [1] Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption
    Alvarez, G.
    Li, Shujun
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2009, 14 (11) : 3743 - 3749
  • [2] A chaotic block cipher algorithm for image cryptosystems
    Amin, Mohamed
    Faragallah, Osama S.
    Abd El-Latif, Ahmed A.
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (11) : 3484 - 3497
  • [3] [Anonymous], Nist special publication 800-38a. online
  • [4] Modified Baptista type chaotic cryptosystem via matrix secret key
    Ariffin, M. R. K.
    Noorani, M. S. M.
    [J]. PHYSICS LETTERS A, 2008, 372 (33) : 5427 - 5430
  • [5] Cryptanalysis of a family of self-synchronizing chaotic stream ciphers
    Arroyo, David
    Alvarez, Gonzalo
    Amigo, Jose Maria
    Li, Shujun
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (02) : 805 - 813
  • [6] A hash-based image encryption algorithm
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    McKevitt, Paul
    [J]. OPTICS COMMUNICATIONS, 2010, 283 (06) : 879 - 893
  • [7] A new chaotic algorithm for image encryption
    Gao, HJ
    Zhang, YS
    Liang, SY
    Li, DQ
    [J]. CHAOS SOLITONS & FRACTALS, 2006, 29 (02) : 393 - 399
  • [8] Chaos-based cryptosystem on DSP
    Guglielmi, Veronique
    Pinel, Pierre
    Fournier-Prunaret, Daniele
    Taha, Abdel-Kaddous
    [J]. CHAOS SOLITONS & FRACTALS, 2009, 42 (04) : 2135 - 2144
  • [9] Self-synchronizing chaotic stream ciphers
    Kurian, Ajeesh P.
    Puthusserypady, Sadasivan
    [J]. SIGNAL PROCESSING, 2008, 88 (10) : 2442 - 2452
  • [10] Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
    Li, Chengqing
    Lo, Kwok-Tung
    [J]. SIGNAL PROCESSING, 2011, 91 (04) : 949 - 954