Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion
Autor: | Safwan El Assad, Olivier Deforges, Mousa Farajallah |
---|---|
Přispěvatelé: | Palestine Polytechnic University (PPU), Institut d'Électronique et des Technologies du numéRique (IETR), Université de Nantes (UN)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), 4KREPROSYS - 4K ultraHD TV wireless REmote PROduction SYStems, This work is supported by the European Celtic-Plus project, Nantes Université (NU)-Université de Rennes 1 (UR1), Université de Nantes (UN)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS) |
Rok vydání: | 2018 |
Předmět: |
[SPI.OTHER]Engineering Sciences [physics]/Other
Computer Networks and Communications Computer science 02 engineering and technology Encryption 01 natural sciences Image (mathematics) law.invention Cryptanalysis law Computer Science::Multimedia 0103 physical sciences 0202 electrical engineering electronic engineering information engineering Media Technology Cryptosystem Chosen-plaintext attack Brute force attack 010301 acoustics Randomness Computer Science::Cryptography and Security Chaos-based cryptosystem business.industry 020207 software engineering Plaintext [SPI.TRON]Engineering Sciences [physics]/Electronics Key space Hardware and Architecture Key (cryptography) Chosen plain-text attack Diffusion effect business Algorithm Software |
Zdroj: | Multimedia Tools and Applications Multimedia Tools and Applications, Springer Verlag, 2018, 77 (21), pp.28225-28248. ⟨10.1007/s11042-018-6015-4⟩ Multimedia Tools and Applications, 2018, 77 (21), pp.28225-28248. ⟨10.1007/s11042-018-6015-4⟩ |
ISSN: | 1573-7721 1380-7501 |
DOI: | 10.1007/s11042-018-6015-4 |
Popis: | International audience; In the recent literature, many research studies have proven that Known and Chosen plaintext attacks are very efficient tools that are widely used to cryptanalyze partially or completely some chaos-based and non-chaos cryptosystems. In this paper, we addressed some weaknesses in the first Zhang et al., cryptosystem “An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion”. First, we analyzed the encryption process of Zhang et al., and we found that the non-linear diffusion process can be removed because its argument is present in the ciphered image. Then, based on this observation we derived a partial cryptanalysis equation that removes the effect of the diffusion function and accordingly permits to recover the permuted version of the ciphered image. As a result of the previous operation, the brute-force attack became more suitable. In addition, we mounted a chosen plaintext attack based on a proposed chosen plain image. Consequently, the encryption key space is reduced or recovered for one round, also, the average values of NPCR and UCAI randomness parameters become small compared to the optimal values, and moreover, they are very low for specific pixel position attacks. |
Databáze: | OpenAIRE |
Externí odkaz: |