Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos

被引:37
作者
Ahmad, Musheer [1 ]
Al Solami, Eesa [2 ]
Wang, Xing-Yuan [3 ,4 ]
Doja, M. N. [1 ]
Beg, M. M. Sufyan [5 ]
Alzaidi, Amer Awad [6 ]
机构
[1] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[2] Univ Jeddah, Dept Informat Technol, Jeddah 21589, Saudi Arabia
[3] Dalian Maritime Univ, Sch Informat Sci & Technol, Dalian 116026, Peoples R China
[4] Dalian Univ Technol, Fac Elect Informat & Elect Engn, Dalian 116024, Peoples R China
[5] Aligarh Muslim Univ, Dept Comp Engn, Aligarh 202002, Uttar Pradesh, India
[6] Univ Jeddah, Dept Informat Syst, Jeddah 21589, Saudi Arabia
来源
SYMMETRY-BASEL | 2018年 / 10卷 / 07期
关键词
image encryption; body area networks; cryptanalysis; SHA-512; hyperchaotic system; AUTHENTICATION SCHEME; SENSOR NETWORKS; SECURITY; EFFICIENT; MAP;
D O I
10.3390/sym10070266
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The issues of identity authentication and privacy protection of individuals in body area network (BAN) systems have raised much concern in past few years. To address the challenges of privacy protection in wireless BAN, an image encryption algorithm has been proposed recently by Wang et al. The encryption algorithm utilized two 1D chaotic maps to generate sub-chaotic matrices which are combined to perform encryption. The algorithm has good statistical encryption performance. However, a cautious inquiry finds that it has some underlying security defects. This paper evaluates the security of the Wang et al. encryption algorithm to show that it is totally breakable under proposed cryptanalysis and hence infeasible for privacy protection in BAN. It has been shown that the plain-image data can be recovered without any prior knowledge of secret key and plain-text. Furthermore, this paper also suggests an improved encryption scheme using secure hash algorithm SHA-512 for one-time keys and a 4D hyperchaotic system to subdue the security insufficiencies of the algorithm under study. The simulation results and analysis demonstrate that the improved image encryption scheme has excellent encryption quality, plain-image sensitivity, and resistance to possible cryptanalytic attacks.
引用
收藏
页数:18
相关论文
共 47 条
[1]   Transmission and storage of medical images with patient information [J].
Acharya, R ;
Bhat, PS ;
Kumar, S ;
Min, LC .
COMPUTERS IN BIOLOGY AND MEDICINE, 2003, 33 (04) :303-310
[2]   Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs [J].
Ahmad, I ;
Das, AS .
COMPUTERS & ELECTRICAL ENGINEERING, 2005, 31 (06) :345-360
[3]   An image encryption approach using particle swarm optimization and chaotic map [J].
Ahmad M. ;
Alam M.Z. ;
Umayya Z. ;
Khan S. ;
Ahmad F. .
International Journal of Information Technology, 2018, 10 (3) :247-255
[4]   Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network [J].
Ahmad, Musheer ;
Alam, Mohammad Zaiyan ;
Ansari, Subia ;
Lambic, Dragan ;
AlSharari, Hamed D. .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) :1323-1332
[5]   Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys [J].
Ahmad, Musheer ;
Ahmad, Tanvir .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2014, 12 (01) :113-128
[6]   A Framework to Protect Patient Digital Medical Imagery for Secure Telediagnosis [J].
Ahmad, Musheer ;
Ahmad, Tanvir .
INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 :1055-1066
[7]   Analysis of security problems in a medical image encryption system [J].
Alvarez, Gonzalo ;
Li, Shujun ;
Hernandez, Luis .
COMPUTERS IN BIOLOGY AND MEDICINE, 2007, 37 (03) :424-427
[8]  
[Anonymous], 2016, INDIAN J SCI TECHNOL, DOI DOI 10.17485/ijst/2016/v9i29/90026
[9]  
Bard GV, 2009, ALGEBRAIC CRYPTANALYSIS, P1, DOI 10.1007/978-0-387-88757-9_1
[10]  
BASHIR Z, 2017, SYMMETRY-BASEL, V9, DOI DOI 10.3390/SYM9120312