Cryptanalysis of an Asymmetric Image Cryptosystem Based on Synchronized Unified Chaotic System and CNN

被引:1
作者
Ahmad, Musheer [1 ]
Ahmad, Faiyaz [1 ]
Javed, Syed Ashar [1 ]
机构
[1] Jamia Millia Islamia, Fac Engn & Technol, Dept Comp Engn, New Delhi 110025, India
来源
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION | 2017年 / 458卷
关键词
Image encryption; Cryptanalysis; Security; Unified chaotic system; Synchronization;
D O I
10.1007/978-981-10-2035-3_57
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cheng et al. proposed an asymmetric image encryption scheme which is based on adaptively synchronised chaotic cellular neural network and unified chaotic systems in [Communication in Nonlinear Science and Numerical Simulation 18(10) 2825-2837 2013]. The cryptosystem was asymmetric in nature and the synchronization error converged quickly to zero. Numerical simulations for performance evaluation included synchronization effectiveness, cryptosystem robustness and statistical analyses like key space, key sensitivity and NPCR/UACI analyses, all with effective results. But, this paper demonstrates the cryptanalysis of Cheng et al. cryptosystem by exploiting inherent deficiencies of encryption algorithm like low robustness and poor plain-image sensitivity. It is done by mounting the proposed cryptographic CPA or KPA attack which leads to successful retrieval of original plaintext image. The simulated cryptanalysis shows that Cheng et al. cryptosystem is not suitable for practical utility in image security applications.
引用
收藏
页码:559 / 567
页数:9
相关论文
共 10 条
[1]   Cryptanalysis of Image Encryption Algorithm Based on Fractional-Order Lorenz-Like Chaotic System [J].
Ahmad, Musheer ;
Khan, Imran Raza ;
Alam, Shahzad .
EMERGING ICT FOR BRIDGING THE FUTURE, VOL 2, 2015, 338 :381-388
[2]   Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher [J].
Ahmad, Musheer ;
Ahmad, Faiyaz .
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1, 2015, 327 :481-488
[3]  
Ahmad M, 2011, COMM COM INF SC, V168, P81
[4]  
Bard GV, 2009, ALGEBRAIC CRYPTANALYSIS, P1, DOI 10.1007/978-0-387-88757-9_1
[5]   An asymmetric image cryptosystem based on the adaptive synchronization of an uncertain unified chaotic system and a cellular neural network [J].
Cheng, Chao-Jung ;
Cheng, Chi-Bin .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (10) :2825-2837
[6]   Cryptanalysis of a chaos-based image encryption algorithm [J].
Cokal, Cahit ;
Solak, Ercan .
PHYSICS LETTERS A, 2009, 373 (15) :1357-1360
[7]   Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks [J].
Li, Chengqing ;
Lo, Kwok-Tung .
SIGNAL PROCESSING, 2011, 91 (04) :949-954
[8]   Cryptanalysis of a new substitution-diffusion based image cipher [J].
Rhouma, Rhouma ;
Solak, Ercan ;
Belghith, Safya .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (07) :1887-1892
[9]  
Schneier B., 1996, Applied Cryptography: Protocols, Algorithms, and Source Code in C
[10]  
Sharma PK, 2014, COMM COM INF SC, V467, P173