4.6 Article

An efficient chosen-plaintext attack and improvement on an image encryption algorithm based on cyclicshift and multiple chaotic map

Journal

MULTIMEDIA TOOLS AND APPLICATIONS
Volume 82, Issue 15, Pages 22835-22852

Publisher

SPRINGER
DOI: 10.1007/s11042-023-14630-8

Keywords

Safety analysis; Chosen plaintext attack; Index matrix; Cyclic shift

Ask authors/readers for more resources

This paper proposes a more efficient attack method on an image encryption algorithm with permutation-cyclic shift-pixel diffusion structure. The security of the original algorithm relies solely on the equivalent key streams, which can be decoded using chosen-plaintext attack. The proposed attack strategy is verified through theoretical analysis and simulation experiments. An improved algorithm is also presented to enhance the encryption effect and resist chosen-plaintext attacks.
This paper proposes a more efficient attack method on an image encryption algorithm with permutation-cyclic shift-pixel diffusion structure. After in-depth analysis, it was found that the security of the original algorithm completely depends on the equivalent key streams: index matrix indexB, cyclic shift sequence D and diffusion sequences Z and M. But the generation of these equivalent keys has nothing to do with the plaintext image or the corresponding ciphertext image, so the equivalent keys can be decoded by the chosen-plaintext attack, in which only 2 + ceil(log(256)m) special plaintext images and their corresponding cipher images are required. (m represent the height of the target ciphertext image). When cracking the chaotic sequences Z and M, only one plaintext image with all pixel values of 0 is used. When cracking the cyclic shift sequence D, only one plaintext image with all pixel values of 15 is used. Finally, ceil(log(256)m) plaintext image is used to crack the index matrix for scrambling. Theoretical analysis and simulation experiments verify the feasibility of chosen-plaintext attack strategy. At the same time, the original algorithm is improved on the basis of being loyal to the original algorithm as much as possible.In the improved algorithm, the key stream is related to the ciphertext image itself, so it can resist the chosen-plaintext attack and the encryption effect of the improved algorithm is better than that of the original encryption algorithm in the aspects of information entropy, ciphertext correlation and ciphertext sensitivity.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available