Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion

Autor: Safwan El Assad, Olivier Deforges, Mousa Farajallah
Přispěvatelé: Palestine Polytechnic University (PPU), Institut d'Électronique et des Technologies du numéRique (IETR), Université de Nantes (UN)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), 4KREPROSYS - 4K ultraHD TV wireless REmote PROduction SYStems, This work is supported by the European Celtic-Plus project, Nantes Université (NU)-Université de Rennes 1 (UR1), Université de Nantes (UN)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)
Rok vydání: 2018
Předmět:
Zdroj: Multimedia Tools and Applications
Multimedia Tools and Applications, Springer Verlag, 2018, 77 (21), pp.28225-28248. ⟨10.1007/s11042-018-6015-4⟩
Multimedia Tools and Applications, 2018, 77 (21), pp.28225-28248. ⟨10.1007/s11042-018-6015-4⟩
ISSN: 1573-7721
1380-7501
DOI: 10.1007/s11042-018-6015-4
Popis: International audience; In the recent literature, many research studies have proven that Known and Chosen plaintext attacks are very efficient tools that are widely used to cryptanalyze partially or completely some chaos-based and non-chaos cryptosystems. In this paper, we addressed some weaknesses in the first Zhang et al., cryptosystem “An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion”. First, we analyzed the encryption process of Zhang et al., and we found that the non-linear diffusion process can be removed because its argument is present in the ciphered image. Then, based on this observation we derived a partial cryptanalysis equation that removes the effect of the diffusion function and accordingly permits to recover the permuted version of the ciphered image. As a result of the previous operation, the brute-force attack became more suitable. In addition, we mounted a chosen plaintext attack based on a proposed chosen plain image. Consequently, the encryption key space is reduced or recovered for one round, also, the average values of NPCR and UCAI randomness parameters become small compared to the optimal values, and moreover, they are very low for specific pixel position attacks.
Databáze: OpenAIRE