4.6 Article

Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion

Journal

MULTIMEDIA TOOLS AND APPLICATIONS
Volume 77, Issue 21, Pages 28225-28248

Publisher

SPRINGER
DOI: 10.1007/s11042-018-6015-4

Keywords

Cryptanalysis; Chosen plain-text attack; Chaos-based cryptosystem; Diffusion effect; Brute force attack; Key space

Funding

  1. European Celtic-Plus project 4KREPROSYS - 4K ultraHD TV wireless REmote PROduction SYStems

Ask authors/readers for more resources

In the recent literature, many research studies have proven that Known and Chosen plaintext attacks are very efficient tools that are widely used to cryptanalyze partially or completely some chaos-based and non-chaos cryptosystems. In this paper, we addressed some weaknesses in the first Zhang et al., cryptosystem An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. First, we analyzed the encryption process of Zhang et al., and we found that the non-linear diffusion process can be removed because its argument is present in the ciphered image. Then, based on this observation we derived a partial cryptanalysis equation that removes the effect of the diffusion function and accordingly permits to recover the permuted version of the ciphered image. As a result of the previous operation, the brute-force attack became more suitable. In addition, we mounted a chosen plaintext attack based on a proposed chosen plain image. Consequently, the encryption key space is reduced or recovered for one round, also, the average values of NPCR and UCAI randomness parameters become small compared to the optimal values, and moreover, they are very low for specific pixel position attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available