期刊
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
卷 31, 期 6, 页码 2494-2508出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCSVT.2020.3021908
关键词
Ciphers; Encryption; Chaos; Kernel; Streaming media; Chosen-ciphertext attack; permutation substitution; bit-wise XOR; image encryption
资金
- National Natural Science Foundation of China [61802055, 61771121]
- Science and Technology Development Fund, Macau SAR [189/2017/A3]
- University of Macau [MYRG201800136-FST]
The introduction of chaos in image encryption has attracted global attention in recent years, but some chaotic image ciphers are at risk of cryptanalysis. This article evaluates the security of a family of image ciphers and reveals that weaknesses cannot be remedied by common enhancements, and presents a chosen-ciphertext attack to break 12 ciphers.
In recent decades, the introduction of chaos to image encryption has drawn worldwide attention. The permutation-substitution architecture has been widely applied, and chaotic systems are generally employed to produce the required encryption elements. Although many security assessment tests have been conducted, some chaotic image ciphers are being cryptanalyzed. In this article, we evaluate the security of a family of image ciphers whose encryption kernel consists of a bit-level or pixel-level permutation and a bit-wise exclusive OR substitution. After investigating the intrinsic linearity inside the outfitted structures and encryption techniques, we find that each ciphertext-plaintext pair can be represented as a combination of a set of ciphertext-plaintext bases. A chosen-ciphertext attack is proposed to construct the ciphertext-plaintext bases rather than the traditional solution to retrieve equivalent encryption elements. We further reveal that such weakness cannot be remedied by common enhancements such as more chaotic dynamics, complex permutation methods, and random pixel insertion during encryption. In addition, applications of the proposed attack to break 12 ciphers are theoretically presented and experimentally verified.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据