4.7 Article

Cryptanalysis of Image Ciphers With Permutation-Substitution Network and Chaos

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCSVT.2020.3021908

关键词

Ciphers; Encryption; Chaos; Kernel; Streaming media; Chosen-ciphertext attack; permutation substitution; bit-wise XOR; image encryption

资金

  1. National Natural Science Foundation of China [61802055, 61771121]
  2. Science and Technology Development Fund, Macau SAR [189/2017/A3]
  3. University of Macau [MYRG201800136-FST]

向作者/读者索取更多资源

The introduction of chaos in image encryption has attracted global attention in recent years, but some chaotic image ciphers are at risk of cryptanalysis. This article evaluates the security of a family of image ciphers and reveals that weaknesses cannot be remedied by common enhancements, and presents a chosen-ciphertext attack to break 12 ciphers.
In recent decades, the introduction of chaos to image encryption has drawn worldwide attention. The permutation-substitution architecture has been widely applied, and chaotic systems are generally employed to produce the required encryption elements. Although many security assessment tests have been conducted, some chaotic image ciphers are being cryptanalyzed. In this article, we evaluate the security of a family of image ciphers whose encryption kernel consists of a bit-level or pixel-level permutation and a bit-wise exclusive OR substitution. After investigating the intrinsic linearity inside the outfitted structures and encryption techniques, we find that each ciphertext-plaintext pair can be represented as a combination of a set of ciphertext-plaintext bases. A chosen-ciphertext attack is proposed to construct the ciphertext-plaintext bases rather than the traditional solution to retrieve equivalent encryption elements. We further reveal that such weakness cannot be remedied by common enhancements such as more chaotic dynamics, complex permutation methods, and random pixel insertion during encryption. In addition, applications of the proposed attack to break 12 ciphers are theoretically presented and experimentally verified.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据