Cryptanalyzing a novel image cipher based on mixed transformed logistic maps

被引:27
作者
Zhang, Yushu [1 ]
Xiao, Di [1 ]
Wen, Wenying [2 ]
Li, Ming [1 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[2] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang 330013, Peoples R China
关键词
Cryptanalysis; Image encryption; Chosen plaintext attack; Chaos; ONLY MULTIMEDIA CIPHERS; QUANTITATIVE CRYPTANALYSIS; PLAINTEXT ATTACKS; STANDARD MAP; ENCRYPTION;
D O I
10.1007/s11042-013-1684-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, a novel image cipher [Multimed Tools Appl (2012) 56: 315-330] was proposed based on mixed transformed logistic maps. The cipher includes three parts: initial permutation of all the pixels with six odd keys, nonlinear diffusion using the first chaotic keystream and xoring the second chaotic keystream with the resultant values, and Zig-Zag diffusion with the third chaotic keystream. It was claimed that the nonlinear diffusion using the first chaotic map, xoring with the second chaotic map and the Zig-Zag diffusion with the third chaotic map are done to improve the security against the known/ chosen plaintext attack. However, the cipher is insecure against chosen plaintext attack. In this paper, we analyze the security weakness of the cipher. As for different images, three chaotic keys keep unchanged so that three chaotic keystreams are also fixed. Our target is to reveal six odd integer keys and three chaotic keystreams equivalent to three chaotic keys. By applying chosen plaintext attack, we can reveal them through two different methods. Experimental results also verify our assertion.
引用
收藏
页码:1885 / 1896
页数:12
相关论文
共 14 条
[1]   A new image encryption scheme based on cyclic elliptic curve and chaotic system [J].
Abd El-Latif, Ahmed A. ;
Li, Li ;
Niu, Xiamu .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) :1559-1584
[2]   Cryptanalysis of a one round chaos-based Substitution Permutation Network [J].
Arroyo, David ;
Diaz, Jesus ;
Rodriguez, F. B. .
SIGNAL PROCESSING, 2013, 93 (05) :1358-1364
[3]   An image encryption algorithm based on hyper-chaos and DNA sequence [J].
Huang, Xiaoling ;
Ye, Guodong .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (01) :57-70
[4]   Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks [J].
Li, Chengqing ;
Lo, Kwok-Tung .
SIGNAL PROCESSING, 2011, 91 (04) :949-954
[5]   Image scrambling based on chaotic sequences and VeginSre cipher [J].
Li, Shanshan ;
Zhao, Yinghai ;
Qu, Bayi ;
Wang, Jiang'an .
MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (03) :573-588
[6]   A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks [J].
Li, Shujun ;
Li, Chengqing ;
Chen, Guanrong ;
Bourbakis, Nikolaos G. ;
Lo, Kwok-Tung .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2008, 23 (03) :212-223
[7]   A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process [J].
Norouzi, Benyamin ;
Mirzakuchaki, Sattar ;
Seyedzadeh, Seyed ;
Mosavi, Mohammad Reza .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 71 (03) :1469-1497
[8]   A novel image cipher based on mixed transformed logistic maps [J].
Sam, I. Shatheesh ;
Devaraj, P. ;
Bhuvaneswaran, Raghuvel S. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2012, 56 (02) :315-330
[9]   A fast image encryption scheme based on chaotic standard map [J].
Wong, Kwok-Wo ;
Kwok, Bernie Sin-Hung ;
Law, Wing-Shing .
PHYSICS LETTERS A, 2008, 372 (15) :2645-2652
[10]   Using the self-synchronizing method to improve security of the multi chaotic systems-based image encryption [J].
Xiao, Di ;
Shih, Frank Y. .
OPTICS COMMUNICATIONS, 2010, 283 (15) :3030-3036