Authors:
(1) Sheng Liu, School of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, Hunan, China;
(2) Chengqing Li (Corresponding author), School of Computer Science, Xiangtan University, Xiangtan 411105, Hunan, China;
(3) Qiao Hu, School of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, Hunan, China.
Table of Links
2. Description of two analyzed image encryption algorithms
5. Conclusion, Acknowledgements, and References
5. Conclusion
This paper analyzed security performance of an image encryption algorithm based on a first-order time-delay system IEATD and the enhanced version IEACD. Although another research group proposed a chosen-plaintext attack on IEATD, we presented an enhanced attack using the correlation between adjacent vectors of one plain-image and the corresponding cipher-image. Although IEACD is designed by the attacking group with intention to fix the security defects of IEATD, there still exist some security pitfalls, such as invalid secret keys, insensibility of keystream generation mechanics, and improper configuration of keystream. Based on these, we designed an efficient chosen-plaintext attack and verified it with extensive experiments. The serious insecurity of the two algorithms cannot be improved by simple modifications. They can work as typical counterexamples to remind us to recast scenario-oriented image encryption algorithms following the guidelines and lessons summarized in [9, 7, 3].
Acknowledgement
This work was supported by the National Natural Science Foundation of China (no. 61772447), Scientific Research Fund of Hunan Provincial Education Department (no. 20C1759), and Science and Technology Program of Changsha (no. kq2004021).
References
[1] A. L. Abu Dalhoum, B. A. Mahafzah, A. A. Awwad, I. Aldamari, A. Ortega, and M. Alfonseca, “Digital image scrambling using 2D cellular automata,” IEEE Multimedia, vol. 19, no. 4, pp. 28–36, 2012.
[2] G. Ye and X. Huang, “An image encryption algorithm based on autoblocking and electrocardiography,” IEEE Multimedia, vol. 23, no. 2, pp. 64–71, 2016.
[3] C. Li, Y. Zhang, and E. Y. Xie, “When an attacker meets a cipherimage in 2018: a year in review,” Journal of Information Security and Applications, vol. 48, p. art. no. 102361, 2019.
[4] O. Mannai, R. Bechikh, H. Hermassi, R. Rhouma, and S. Belghith, “A new image encryption scheme based on a simple first-order timedelay system with appropriate nonlinearity,” Nonlinear Dynamics, vol. 82, pp. 107–117, 2015.
[5] A. Jolfaei, X.-W. Wu, and V. Muthukkumarasamy, “On the security of permutation-only image encryption schemes,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 235–246, 2016.
[6] C. Li, D. Lin, J. Lu, and F. Hao, “Cryptanalyzing an image en- ¨ cryption algorithm based on autoblocking and electrocardiography,” IEEE Multimedia, vol. 25, no. 4, pp. 46–56, 2018.
[7] M. Preishuber, T. Huetter, S. Katzenbeisser, and A. Uhl, “Depreciating motivation and empirical security analysis of chaos-based image and video encryption,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 9, pp. 2137–2150, 2018.
[8] J. Chen, L. Chen, and Y. Zhou, “Cryptanalysis of image ciphers with permutation-substitution network and chaos,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 6, pp. 2494– 2508, 2021.
[9] C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949.
[10] X. Chai, X. Fu, Z. Gan, Y. Lu, and Y. Chen, “A color image cryptosystem based on dynamic dna encryption and chaos,” Signal Processing, vol. 155, pp. 44–62, 2019.
[11] Z. Hua, Z. Zhu, Y. Chen, and Y. Li, “Color image encryption using orthogonal latin squares and a new 2D chaotic system,” Nonlinear Dynamics, vol. 104, p. 4505–4522, 2021.
[12] K. Ikeda, H. Daido, and O. Akimoto, “Optical turbulence: chaotic behavior of transmitted light from a ring cavity,” Physical Review Letters, vol. 45, no. 9, p. 709, 1980.
[13] M. Li, H. Fan, Y. Xiang, Y. Li, and Y. Zhang, “Cryptanalysis and improvement of a chaotic image encryption by first-order time-delay system,” IEEE Multimedia, vol. 25, no. 3, pp. 92–101, 2018.
[14] C. Fan and Q. Ding, “Analysing the dynamics of digital chaotic maps via a new period search algorithm,” Nonlinear Dynamics, vol. 97, no. 1, pp. 831–841, 2019.
[15] C. Li, B. Feng, S. Li, J. Kurths, and G. Chen, “Dynamic analysis of digital chaotic maps via state-mapping networks,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 66, no. 6, pp. 2322–2335, 2019.
[16] C. Li, K. Tan, B. Feng, and J. Lu, “The graph structure of the gen- ¨ eralized discrete arnold cat map,” IEEE Transactions on Computers, 2021.
[17] C. Li and K.-T. Lo, “Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks,” Signal Processing, vol. 91, no. 4, pp. 949–954, 2011. [18] C. Li, D. Lin, and J. Lu, “Cryptanalyzing an image-scrambling encryption algorithm of pixel bits,” IEEE Multimedia, vol. 24, no. 3, pp. 64–71, 2017.
This paper is available on arxiv under CC by 4.0 Deed (Attribution 4.0 International) license.