An efficient chosen-plaintext attack and improvement on an image encryption algorithm based on cyclicshift and multiple chaotic map

被引:0
|
作者
Shuqin Zhu
Congxu Zhu
Xiujuan Li
机构
[1] Liaocheng University,School of Computer Science and Technology
[2] Central South University,School of Computer Science and Engineering
来源
关键词
Safety analysis; Chosen plaintext attack; Index matrix; Cyclic shift;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes a more efficient attack method on an image encryption algorithm with permutation-cyclic shift-pixel diffusion structure. After in-depth analysis, it was found that the security of the original algorithm completely depends on the equivalent key streams: index matrix indexB, cyclic shift sequence D and diffusion sequences Z and M. But the generation of these equivalent keys has nothing to do with the plaintext image or the corresponding ciphertext image, so the equivalent keys can be decoded by the chosen-plaintext attack, in which only 2 + ceil(log256m) special plaintext images and their corresponding cipher images are required. (m represent the height of the target ciphertext image). When cracking the chaotic sequences Z and M, only one plaintext image with all pixel values of 0 is used. When cracking the cyclic shift sequence D, only one plaintext image with all pixel values of 15 is used. Finally, ceil(log256m) plaintext image is used to crack the index matrix for scrambling. Theoretical analysis and simulation experiments verify the feasibility of chosen-plaintext attack strategy. At the same time, the original algorithm is improved on the basis of being loyal to the original algorithm as much as possible.
引用
收藏
页码:22835 / 22852
页数:17
相关论文
共 50 条
  • [21] Chosen-Plaintext Attack on Energy-Efficient Hardware Implementation of GIFT-COFB
    Zhong, Yadi
    Guin, Ujjwal
    2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, : 73 - 76
  • [22] A novel data dependent multimedia encryption algorithm secure against chosen-plaintext attacks
    Koh, Min-Sung
    Rodriguez-Marek, Esteban
    Talarico, Claudio
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 1527 - 1530
  • [23] Chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher
    Li, CQ
    Li, SJ
    Zhang, D
    Chen, GR
    ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 2, PROCEEDINGS, 2005, 3497 : 630 - 636
  • [24] ATTACK TO AN IMAGE ENCRYPTION BASED ON CHAOTIC LOGISTIC MAP
    Wang Xing-Yuan
    Chen Feng
    Wang Tian
    Xu Dahai
    Ma Yutian
    INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2013, 27 (31):
  • [25] An efficient chaotic image encryption algorithm based on a generalized Arnold map
    Ye, Guodong
    Wong, Kwok-Wo
    NONLINEAR DYNAMICS, 2012, 69 (04) : 2079 - 2087
  • [26] An efficient chaotic image encryption algorithm based on a generalized Arnold map
    Guodong Ye
    Kwok-Wo Wong
    Nonlinear Dynamics, 2012, 69 : 2079 - 2087
  • [27] Chaotic Image Encryption Algorithm by Correlating Keys with Plaintext
    Zhu Congxu
    Sun Kehui
    CHINA COMMUNICATIONS, 2012, 9 (01) : 73 - 79
  • [28] Chosen Plaintext Attacking on a Hyper-chaos Image Encryption Algorithm
    Yin Yan-Qing
    Long Zhuo-Min
    2013 IEEE 4TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2014, : 144 - 147
  • [29] Chosen plaintext attack on JPEG image encryption with adaptive key and run consistency
    He, Hongjie
    Yuan, Yuan
    Ye, Yuyun
    Tai, Heng-Ming
    Chen, Fan
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2023, 90
  • [30] An Efficient Image Encryption Algorithm Based on Three-dimensional Chaotic Map
    Ye, Guodong
    Huang, Xiaoling
    Pan, Chen
    ICAIP 2018: 2018 THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN IMAGE PROCESSING, 2018, : 78 - 82