Affiliation:
1. College of Automation, Guangdong University of Technology, Guangzhou 510006, China
Abstract
This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row–column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data.
Funder
National Natural Science Foundation of China
Natural Science Foundation of Guangdong Province
Subject
General Physics and Astronomy
Reference40 articles.
1. Some progresses of chaotic cipher and its applications in multimedia secure communications;Yu;J. Electron. Inf. Technol.,2016
2. An image encryption scheme based on chaotic tent map;Li;Nonlinear Dyn.,2017
3. 4D mixed chaotic system and its application to RGB image encryption using substitution-diffusion;Shah;J. Inf. Secur. Appl.,2021
4. Constructing Higher-Dimensional Digital Chaotic Systems via Loop-State Contraction Algorithm;Wang;IEEE Trans. Circuits Syst. Regul. Pap.,2021
5. Symmetric ciphers based on two-dimensional chaotic maps;Fridrich;Int. J. Bifurc. Chaos,1998
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献