Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes

被引:47
作者
Chen, Junxin [1 ,2 ,3 ]
Chen, Lei [4 ,5 ]
Zhou, Yicong [3 ]
机构
[1] Northeastern Univ, Coll Med & Biol Informat Engn, Shenyang 110004, Peoples R China
[2] Minist Educ, Key Lab Intelligent Comp Med Image, Shenyang 110004, Peoples R China
[3] Univ Macau, Dept Comp & Informat Sci, Macau 999078, Peoples R China
[4] Nsfocus Informat Technol Co Ltd, Beijing 100089, Peoples R China
[5] Tsinghua Univ, Res Inst Informat Technol RIIT, Beijing 100084, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Encryption; Nonlinear dynamical systems; Standards; Technological innovation; Matrices; Cryptanalysis; substitution and permutation; modular addition; chosen-ciphertext attack; ONLY MULTIMEDIA CIPHERS; QUANTITATIVE CRYPTANALYSIS; CHAOTIC SYSTEM; ALGORITHM; SECURITY; MAP;
D O I
10.1109/TMM.2020.3011315
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent decades, there has been considerable popularity in employing nonlinear dynamics and permutation-substitution structures for image encryption. Three procedures generally exist in such image encryption schemes: the key schedule module for producing encryption elements, permutation for image scrambling and substitution for pixel modification. This paper cryptanalyzes a family of image encryption schemes that adopt pixel-level permutation and modular addition-based substitution. The security analysis first reveals a common defect in the studied image encryption schemes. Specifically, the mapping from the differentials of the ciphertexts to those of the plaintexts is found to be linear and independent of the key schedules, permutation techniques and encryption rounds. On this theory basis, a universal chosen-ciphertext attack is further proposed. Experimental results demonstrate that the proposed attack can recover the plaintexts of the studied image encryption schemes without a security key or any encryption elements. Related cryptographic discussions are also given.
引用
收藏
页码:2372 / 2385
页数:14
相关论文
共 47 条
[1]   Robust Encryption of Quantum Medical Images [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Talha, Muhammad .
IEEE ACCESS, 2018, 6 :1073-1081
[2]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[3]  
[Anonymous], [No title captured]
[4]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[5]   Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map [J].
Chen, Lei ;
Ma, Bing ;
Zhao, Xiaohong ;
Wang, Shihong .
NONLINEAR DYNAMICS, 2017, 87 (03) :1797-1807
[6]   Differential cryptanalysis of a medical image cryptosystem with multiple rounds [J].
Chen, Lei ;
Wang, Shihong .
COMPUTERS IN BIOLOGY AND MEDICINE, 2015, 65 :69-75
[7]   Impulsive Synchronization of Reaction-Diffusion Neural Networks With Mixed Delays and Its Application to Image Encryption [J].
Chen, Wu-Hua ;
Luo, Shixian ;
Zheng, Wei Xing .
IEEE Transactions on Neural Networks and Learning Systems, 2016, 27 (12) :2696-2710
[9]   A New Quaternion-Based Encryption Method for DICOM Images [J].
Dzwonkowski, Mariusz ;
Papaj, Michal ;
Rykaczewski, Roman .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (11) :4614-4622
[10]   Image encryption using a synchronous permutation-diffusion technique [J].
Enayatifar, Rasul ;
Abdullah, Abdul Hanan ;
Isnin, Ismail Fauzi ;
Altameem, Ayman ;
Lee, Malrey .
OPTICS AND LASERS IN ENGINEERING, 2017, 90 :146-154