Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation

被引:0
作者
Xin Ge
Bin Lu
Fenlin Liu
Xiangyang Luo
机构
[1] China National Digital Switching System Engineering Technology Research Center,
来源
Nonlinear Dynamics | 2017年 / 90卷
关键词
Image encryption; Chaotic system; Cryptanalysis; Chosen-ciphertext attack;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, a feedback image encryption algorithm with compound chaotic stream cipher based on perturbation was proposed. This paper analyzes security of the algorithm and reports that there exist some security defects, i.e., encryption of a pixel is independent on the position scrambling and the encryption round is controlled by the users. Based on them, a chosen-ciphertext attack is proposed to obtain the equivalent version of the secret key of the algorithm with n·⌈log256MN+2⌉\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n\cdot \lceil \log _{256} MN +2 \rceil $$\end{document} chosen cipher-images, where M×N\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$M\times N$$\end{document} is the size of the corresponding plain-images and n is the round number of encryption.
引用
收藏
页码:1141 / 1150
页数:9
相关论文
共 89 条
[1]  
Arroyo D(2017)Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features Int. J. Bifurc. Chaos 27 1750,004-158
[2]  
Hernandez F(2015)Breaking an image encryption scheme based on a spatiotemporal chaotic system Signal Process. Image Commun. 39 151-761
[3]  
Orue AB(2004)A symmetric image encryption scheme based on 3D chaotic cat maps Chaos Solitons Fractals 21 749-1807
[4]  
Bechikh R(2017)Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map Nonlinear Dyn. 87 1797-740
[5]  
Hermassi H(2016)Arm-embedded implementation of a video chaotic secure communication via wan remote transmission with desirable security and frame rate Nonlinear Dyn. 86 725-1213
[6]  
El-Latif AAA(2014)Cryptanalysis and improvement of a chaotic map-based key agreement protocol using chebyshev sequence membership testing Nonlinear Dyn. 76 1203-1284
[7]  
Rhouma R(1998)Symmetric ciphers based on two-dimensional chaotic maps Int. J. Bifurc. Chaos 8 1259-400
[8]  
Belghith S(2008)A new image encryption algorithm based on hyper-chaos Phys. Lett. A 372 394-1367
[9]  
Chen G(2010)Improvement of rhouma’s attacks on gao algorithm Phys. Lett. A 374 1362-629
[10]  
Mao Y(2016)An image encryption algorithm based on information hiding Int. J. Bifurc. Chaos 26 1650,192-94