Abstract
Recently, an image encryption scheme based on a 2D hyperchaotic map is proposed. It adopts the permutation–diffusion architecture and consists of three steps, which are permutation, forward diffusion, and backward diffusion. In this paper, we break this cipher with both the chosen-plaintext attack (CPA) and the chosen-ciphertext attack (CCA). According to our analysis, we found the two complex diffusion processes could be simplified into two simple diffusions and a modular addition operation. Based on this, the equivalent key can be obtained with CPA and CCA. Detailed theoretical derivations and the results of experiments confirmed the feasibility of our attack methods. When the image size was 256×256, the running time of the attacks was less than 2 hours on a laptop with a 2.59 GHz Intel Core i7 and 16 GB DDR3 memory. Other sizes of images were also tested, and some rules were found. In addition, the probability of other attacks has also been discussed, and some suggestions for improvements are given. The source codes are publicly available and can be found online.
Funder
Key Technologies Research and Development Program of Liaoning Province in China
Fundamental Research Funds for the Central Universities
National Natural Science Foundation of China
Subject
General Physics and Astronomy
Reference42 articles.
1. Symmetric ciphers based on two-dimensional chaotic maps;Fridrich;Int. J. Bifurc. Chaos,1998
2. On the security of permutation-only image encryption schemes;Jolfaei;IEEE Trans. Inf. Forensics Secur.,2015
3. Wang, W., Yu, X., Fang, B., Zhao, D.Y., Chen, Y., Wei, W., and Chen, J. Cross-modality LGE-CMR Segmentation using Image-to-Image Translation based Data Augmentation. IEEE/ACM Trans. Comput. Biol. Bioinform., 2022.
4. Encrypting Multiple Images With an Enhanced Chaotic Map;Laiphrakpam;IEEE Access,2022
5. Alawida, M., Teh, J.S., Mehmood, A., and Shoufan, A. A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations. J. King Saud-Univ.-Comput. Inf. Sci., 2022.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献