Cryptanalysis of image encryption scheme based on a new 1D chaotic system
•Zhou et al. Encryption Scheme is practically infeasible for use in native form.•Practically feasible solution found weak against attack.•Successfully cryptanalyzed practically feasible solution.•Several design weaknesses identified.•Proposed improvements to overcome design weaknesses in original sc...
Saved in:
Published in | Signal processing Vol. 146; pp. 22 - 32 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.05.2018
|
Subjects | |
Online Access | Get full text |
ISSN | 0165-1684 1872-7557 |
DOI | 10.1016/j.sigpro.2017.12.021 |
Cover
Summary: | •Zhou et al. Encryption Scheme is practically infeasible for use in native form.•Practically feasible solution found weak against attack.•Successfully cryptanalyzed practically feasible solution.•Several design weaknesses identified.•Proposed improvements to overcome design weaknesses in original scheme.
This paper demonstrates cryptanalysis of an image encryption scheme based on a new 1D chaotic system proposed by Zhou et al. (2014). It is claimed to possess high strength because of better chaotic properties of employed chaotic system, and use of random pixel insertion. On the contrary, several issues are identified in this image encryption scheme including improper definition of key-stream generator used in substitution step, static permutation leading to predictable diffusion and no contribution to confusion, fixed and small number of rounds, practical infeasibility of random-pixel insertion step with one-time use of utilized random values.For practical usability, one-time use condition is required to be dropped. In this case, it is analyzed that M × N cipher image can be represented as a set of linear equations (of original pixel values) derivable using O(M.N) chosen plain text images. Original image is then completely recoverable using differential cryptanalysis with single differential image represented as a set of M.N linear equations solvable with O((M.N)3) complexity. Experimental results demonstrate that the original image is completely recovered without any information regarding key or equivalent key-stream making author's claim of large key-space insignificant. Improvements have been proposed, with security analysis, to enhance strength of existing scheme. |
---|---|
ISSN: | 0165-1684 1872-7557 |
DOI: | 10.1016/j.sigpro.2017.12.021 |