Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map

被引:6
作者
Shi, Guanwen [1 ]
Yu, Simin [1 ]
Wang, Qianxue [1 ]
机构
[1] Guangdong Univ Technol, Coll Automat, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
chaotic image encryption; cryptanalysis; 2D infinite collapse map; equivalent key; CRYPTANALYSIS; CHAOS; PERMUTATION; CIPHERS;
D O I
10.3390/e24081023
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) infinite collapse map. The encryption algorithm adopts a permutation-diffusion structure and can perform two or more rounds to achieve a higher level of security. By cryptanalysis, it is found that the original diffusion process can be split into a permutation-diffusion structure, which comes after the original permutation, so these two permutations can be merged into one. Then, some theorems about round-down operation are summarized, and the encryption and decryption equations in the diffusion process are deduced and simplified accordingly. Since the chaotic sequences used in encryption algorithm are independent of the plaintext and ciphertext, there are equivalent keys. The original encryption algorithm with single-round, two-round, and multi-round of permutation-diffusion processes is cracked, and the data complexity of the cryptanalysis attacks is analyzed. Numerical simulation is carried out by MATLAB, and the experimental results and theoretical analysis show the effectiveness of the cryptanalysis attacks. Finally, some suggestions for improvement are given to overcome the shortcomings of the original encryption algorithm.
引用
收藏
页数:25
相关论文
共 45 条
[1]   A substitution box generator, its analysis, and applications in image encryption [J].
Azam, Naveed Ahmed ;
Hayat, Umar ;
Ayub, Maria .
SIGNAL PROCESSING, 2021, 187
[2]   A fast and secure public-key image encryption scheme based on Mordell elliptic curves [J].
Azam, Naveed Ahmed ;
Ullah, Ikram ;
Hayat, Umar .
OPTICS AND LASERS IN ENGINEERING, 2021, 137
[3]   A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation [J].
Ben Farah, M. A. ;
Guesmi, R. ;
Kachouri, A. ;
Samet, M. .
OPTICS AND LASER TECHNOLOGY, 2020, 121
[4]  
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
[5]   Designing a 2D infinite collapse map for image encryption [J].
Cao, Weijia ;
Mao, Yujun ;
Zhou, Yicong .
SIGNAL PROCESSING, 2020, 171
[6]   Cryptanalysis of Image Ciphers With Permutation-Substitution Network and Chaos [J].
Chen, Junxin ;
Chen, Lei ;
Zhou, Yicong .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (06) :2494-2508
[7]   Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes [J].
Chen, Junxin ;
Chen, Lei ;
Zhou, Yicong .
IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 23 :2372-2385
[8]   Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map [J].
Chen, Lei ;
Ma, Bing ;
Zhao, Xiaohong ;
Wang, Shihong .
NONLINEAR DYNAMICS, 2017, 87 (03) :1797-1807
[9]   Differential cryptanalysis of a medical image cryptosystem with multiple rounds [J].
Chen, Lei ;
Wang, Shihong .
COMPUTERS IN BIOLOGY AND MEDICINE, 2015, 65 :69-75
[10]   Circular inter-intra pixels bit-level permutation and chaos-based image encryption [J].
Diaconu, Adrian-Viorel .
INFORMATION SCIENCES, 2016, 355 :314-327