Multimedia Tools and Applications

, Volume 76, Issue 2, pp 1817–1826 | Cite as

Breaking a novel image encryption scheme based on an improper fractional order chaotic system

Article

Abstract

In this paper, we analyze the security of a recent image encryption algorithm based on an improper fractional-order chaotic system suggested by Zhao et al. The fatal flaw in the cryptosystem is that the keystream generated depends on neither the plain-image nor the cipher-image. Another main issue with this algorithm is using the same key (the last key in the keystream) in all encryption equations. Based on these points, it is easy to recover the plain-image and the keystream by applying chosen plaintext attack in only one plain-image. Both mathematical analysis and experimental results confirm the feasibility of this attack. As a result, the cryptosystem under study is not suitable for cryptography.

Keywords

Image encryption algorithm Cryptanalysis Keystream Chosen plaintext attack 

References

  1. 1.
    Jolfaei A, Wu XW, Muthukkumarasamy V (2014) Comments on the security of diffusion–substitution based gray image encryption scheme. Digit Signal Proc 32:34–36CrossRefGoogle Scholar
  2. 2.
    Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125:1671–1675CrossRefGoogle Scholar
  3. 3.
    Liu Y, Wang J, Fan J, Gong L (2015) Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences. Multimed Tools Appl. doi:10.1007/s11042-015-2479-7 Google Scholar
  4. 4.
    Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons & Fractals 42:1745–1754CrossRefMATHGoogle Scholar
  5. 5.
    Norouzi B, Mirzakuchaki S (2014) A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn 78:995–1015CrossRefGoogle Scholar
  6. 6.
    Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71:1469–1497CrossRefGoogle Scholar
  7. 7.
    Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014) A novel image encryption based on hash function with only two-round diffusion process. Multimedia Systems 20(1):45–64CrossRefGoogle Scholar
  8. 8.
    Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74:781–811CrossRefGoogle Scholar
  9. 9.
    Pareek NK, Patidar V, Sud KK (2013) Diffusion–substitution based gray image encryption scheme. Digit Signal Proc 23:894–901MathSciNetCrossRefGoogle Scholar
  10. 10.
    Parvin Z, Seyedarabi H, Shamsi M (2014) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl. doi:10.1007/s11042-014-2115-y Google Scholar
  11. 11.
    Patidar V, Pareek NK, Sud KK (2009) A new substitution diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simulat 14:3056–3075CrossRefGoogle Scholar
  12. 12.
    Rhouma R, Belghith S (2008) Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Phys Lett A 372:5790–5794CrossRefMATHGoogle Scholar
  13. 13.
    Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution–diffusion based image cipher. Commun Nonlinear Sci Numer Simulat 15:1887–1892MathSciNetCrossRefMATHGoogle Scholar
  14. 14.
    Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56:315–330CrossRefGoogle Scholar
  15. 15.
    Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81:511–529MathSciNetCrossRefGoogle Scholar
  16. 16.
    Wen W (2015) Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack. Multimed Tools Appl. doi:10.1007/s11042-015-2464-1 Google Scholar
  17. 17.
    Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77:687–698CrossRefGoogle Scholar
  18. 18.
    Zhang Y, Xiao D, Wen W, Li M (2014) Cryptanalyzing a novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 73:1885–1896CrossRefGoogle Scholar
  19. 19.
    Zhao J, Wang S, Chang Y, Li X (2015) A novel image encryption scheme based on an improper fractional-order chaotic system. Nonlinear Dyn. doi:10.1007/s11071-015-1911-x MathSciNetGoogle Scholar
  20. 20.
    Zhu C, Liao C, Deng X (2013) Breaking and improving an image encryption scheme based on total shuffling scheme. Nonlinear Dyn 71:25–34MathSciNetCrossRefGoogle Scholar
  21. 21.
    Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171–1186CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.Electronic Research Center, School of Electrical EngineeringIran University of Science and TechnologyTehranIran

Personalised recommendations