A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks

被引:218
作者
Li, Shujun [1 ]
Li, Chengqing [2 ]
Chen, Guanrong [2 ]
Bourbakis, Nikolaos G. [3 ]
Lo, Kwok-Tung [4 ]
机构
[1] Fernuniv, Lehrgebiet Informat Tech, D-58084 Hagen, Germany
[2] City Univ Hong Kong, Dept Elect Engn, Kowloon, Hong Kong, Peoples R China
[3] Wright State Univ, Informat Technol Res Inst, Coll Engn & Comp Sci, Dayton, OH 45435 USA
[4] Hong Kong Polytech Univ, Elect & Informat Engn Dept, Kowloon, Hong Kong, Peoples R China
关键词
permutation-only multimedia encryption; image; video; speech; cryptanalysis; known-plaintext attack; chosen-plaintext attack;
D O I
10.1016/j.image.2008.01.003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years secret permutations have been widely used for protecting different types of multimedia data, including speech files, digital images and videos. Based on a general model of permutation-only multimedia ciphers, this paper performs a quantitative cryptanalysis on the performance of these kind of ciphers against plaintext attacks. When the plaintext is of size M x N and with L different levels of values, the following quantitative cryptanalytic findings have been concluded under the assumption of a uniform distribution of each element in the plaintext: (1) all permutation-only multimedia ciphers are practically insecure against known/chosen-plaintext attacks in the sense that only O(log(L)(MN)) known/chosen plaintexts are sufficient to recover not less than (in an average sense) half elements of the plaintext; (2) the computational complexity of the known/chosen-plain text attack is only O(n center dot (MN)(2)), where n is the number of known/chosen plaintexts used. When the plaintext has a non-uniform distribution, the number of required plaintexts and the computational complexity is also discussed. Experiments are given to demonstrate the real performance of the known-plaintext attack for a typical permutation-only image cipher. (c) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:212 / 223
页数:12
相关论文
共 54 条
[51]   Efficient frequency domain selective scrambling of digital video [J].
Zeng, WJ ;
Lei, SM .
IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (01) :118-129
[52]   Decryption of pure-position permutation algorithms [J].
Zhao X.-Y. ;
Chen G. ;
Zhang D. ;
Wang X.-H. ;
Dong G.-C. .
Journal of Zhejiang University-SCIENCE A, 2004, 5 (7) :803-809
[53]   Ergodic matrix in image encryption [J].
Zhao, XY ;
Chen, G .
SECOND INTERNATION CONFERENCE ON IMAGE AND GRAPHICS, PTS 1 AND 2, 2002, 4875 :394-401
[54]   Fractal circuit layout for spatial decorrelation of images [J].
Zunino, R .
ELECTRONICS LETTERS, 1998, 34 (20) :1929-1930