Skip to main content
Log in

Security analysis of an audio data encryption scheme based on key chaining and DNA encoding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

A Correction to this article was published on 01 February 2021

This article has been updated

Abstract

Fairly recently, a new audio encryption scheme has been proposed. The cryptosystem is based on a substitution-permutation algorithm using DNA encoding. The key-generation of this proposed scheme is based on a key chaining mode, that generates a new key block for every plain block using the chaotic logistic map. After several statistical tests, handled by the authors of the scheme, they claimed that their cryptosystem is robust. In this paper, we scrutinize the cryptosystem from a cryptanalytic perspective, and we handle several security attacks to evaluate the immunity of the system, and to assess its possible adoption in real-world applications. We demonstrate two successful conventional attacks on the scheme, which are: the chosen ciphertext and chosen-plaintext attacks. The cryptosystem’s shuffling process design is scrutinized as well, and a cycle attack is described using the drawn results. Lessons learned from this cryptanalytic paper, are then outlined in order to be considered in further designs and proposals.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Change history

Notes

  1. Some notations from the original paper are modified without affecting its main meaning.

  2. The two terms “plaintext” and “plain blocks” are used alternatively in this paper, the same for “keys” with “key blocks”, and for “ciphertext” with “cipher blocks”

  3. Octave freeware under GNU GPL license at https://gnu.org/software/octave/

  4. The audio sample used for this illustration is available freely on: https://archive.codeplex.com/?p=audiotestfiles

References

  1. Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Sci (80). https://doi.org/10.1126/science.7973651

  2. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16:2129–2151. https://doi.org/10.1142/S0218127406015970

    Article  MathSciNet  MATH  Google Scholar 

  3. Arroyo D, Alvarez G, Fernandez V (2008) On the inadequacy of the logistic map for cryptographic applications. arXiv Prepr arXiv08054355

  4. Barua R, Misra J (2003) Binary arithmetic for DNA computers. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics). https://doi.org/10.1007/3-540-36440-4_11

  5. Bensikaddour EH, Bentoutou Y, Taleb N (2020) Embedded implementation of multispectral satellite image encryption using a chaos-based block cipher. J King Saud Univ - Comput Inf Sci 32:50–56. https://doi.org/10.1016/j.jksuci.2018.05.002

    Article  Google Scholar 

  6. Bhargava B, Shi C, Wang SY (2004) MPEG video encryption algorithms. Multimed Tools Appl 24:57–79. https://doi.org/10.1023/B:MTAP.0000033983.62130.00

    Article  Google Scholar 

  7. Broemeling LD (2011) An account of early statistical inference in Arab cryptology. Am Stat 65:255–257. https://doi.org/10.1198/tas.2011.10191

    Article  MathSciNet  Google Scholar 

  8. Chen S, Zhong XX, Wu ZZ (2008) Chaos block cipher for wireless sensor network. Sci China, Ser F Inf Sci 51:1055–1063. https://doi.org/10.1007/s11432-008-0102-5

    Article  MathSciNet  MATH  Google Scholar 

  9. Du M, Wang K, Chen Y et al (2018) Big data privacy preserving in multi-access edge computing for heterogeneous internet of things. IEEE Commun Mag 56:62–67. https://doi.org/10.1109/MCOM.2018.1701148

    Article  Google Scholar 

  10. El Hanouti I, El Fadili H, Zenkouar K (2020) Breaking an image encryption scheme based on Arnold map and Lucas series. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09815-4

  11. El-Latif AAA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70:1559–1584. https://doi.org/10.1007/s11042-012-1173-2

    Article  Google Scholar 

  12. Gencoglu MT (2019) Embedded image coding using Laplace transform for Turkish letters. Multimed Tools Appl 78:17521–17534. https://doi.org/10.1007/s11042-018-7096-9

    Article  Google Scholar 

  13. Genot AJ, Bath J, Turberfield AJ (2011) Reversible logic circuits made of DNA. J Am Chem Soc 133:20080–20083. https://doi.org/10.1021/ja208497p

    Article  Google Scholar 

  14. Ghadi M, Laouamer L, Moulahi T (2016) Securing data exchange in wireless multimedia sensor networks: perspectives and challenges. Multimed Tools Appl 75:3425–3451. https://doi.org/10.1007/s11042-014-2443-y

    Article  Google Scholar 

  15. Gupta V, Parthasarathy S, Zaki M (1999) Arithmetic and logic operations with DNA

  16. Habib IW, Saadawi TN (2002) Multimedia traffic characteristics in broadband networks. IEEE Commun Mag 30:48–54. https://doi.org/10.1109/35.144777

    Article  Google Scholar 

  17. Hraoui S, Gmira F, Jarar AO, Satori K, Saaidi A (2013) Benchmarking AES and chaos based logistic map for image encryption. In: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA. https://doi.org/10.1109/AICCSA.2013.6616441

  18. Iqbal S, Malik M, Iqbal S, Muhammad O, Sher H (2008) Study of nonlinear dynamics using logistic map. In: LUMS 2nd international conference on mathematics and its applications in information technology (LICM08)

  19. Janakiraman S, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Lightweight chaotic image encryption algorithm for real-time embedded system: implementation and analysis on 32-bit microcontroller. Microprocess Microsyst 56:1–12. https://doi.org/10.1016/j.micpro.2017.10.013

    Article  Google Scholar 

  20. Kerckhoffs A (1883) Auguste Kerckhoffs “La cryptographie militaire.” Des Sci Mil

  21. Larew K, Kahn D (1968) The Codebreakers: the story of secret writing. Am Hist Rev 74:537. https://doi.org/10.2307/1853680

    Article  Google Scholar 

  22. Li S, Li C, Chen G, Lo KT (2008) Cryptanalysis of the RCES/RSES image encryption scheme. J Syst Softw 81:1130–1143. https://doi.org/10.1016/j.jss.2007.07.037

    Article  Google Scholar 

  23. Li H, Wang K, Liu X, Sun Y, Guo S (2017) A selective privacy-preserving approach for multimedia data. IEEE Multimed 24:14–25. https://doi.org/10.1109/MMUL.2017.4031322

    Article  Google Scholar 

  24. Li C, Xie T, Liu Q, Cheng G (2014) Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn 78:1545–1551. https://doi.org/10.1007/s11071-014-1533-8

    Article  Google Scholar 

  25. Lin Z, Liu J, Lian J, Ma Y, Zhang X (2019) A novel fast image encryption algorithm for embedded systems. Multimed Tools Appl 78:20511–20531. https://doi.org/10.1007/s11042-018-6824-5

    Article  Google Scholar 

  26. Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020) A novel hybrid secure image encryption based on Julia set of fractals and 3D lorenz chaotic map. Entropy. https://doi.org/10.3390/e22030274

  27. Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SKH, Gope P (2018) Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Appl 77:18295–18325. https://doi.org/10.1007/s11042-017-5376-4

    Article  Google Scholar 

  28. Naskar PK, Paul S, Nandy D, Chaudhuri A (2019) DNA encoding and channel shuffling for secured encryption of audio data. Multimed Tools Appl 78:25019–25042. https://doi.org/10.1007/s11042-019-7696-z

    Article  Google Scholar 

  29. Özkaynak F (2018) Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn 92:305–313. https://doi.org/10.1007/s11071-018-4056-x

    Article  Google Scholar 

  30. Reif JH (1998) Paradigms for biomolecular computation. In: Unconventional models of computation. Springer, New york, pp. 72–93

  31. Shakir HR (2019) An image encryption method based on selective AES coding of wavelet transform and chaotic pixel shuffling. Multimed Tools Appl 78:26073–26087. https://doi.org/10.1007/s11042-019-07766-z

    Article  Google Scholar 

  32. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

    Article  MathSciNet  MATH  Google Scholar 

  33. Smekal D, Hajny J, Martinasek Z (2018) Comparative analysis of different implementations of encryption algorithms on FPGA network cards. IFAC-PapersOnLine 51:312–317. https://doi.org/10.1016/j.ifacol.2018.07.172

    Article  Google Scholar 

  34. Ur RA, Liao X (2019) A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2. Multimed Tools Appl 78:2105–2133. https://doi.org/10.1007/s11042-018-6346-1

    Article  Google Scholar 

  35. Yan H, Feng L, LaBean TH, Reif JH (2003) Parallel molecular computations of pairwise exclusive-or (XOR) using DNA “string tile” self-assembly. J Am Chem Soc 125:14246–14247. https://doi.org/10.1021/ja036676m

    Article  Google Scholar 

  36. Yap WS, Phan RCW, Yau WC, Heng SH (2015) Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 80:1483–1491. https://doi.org/10.1007/s11071-015-1956-x

    Article  MathSciNet  MATH  Google Scholar 

  37. Zeraoulia E, Sprott JC (2011) Robust Chaos and its applications. World Scientific

  38. Zhang Y, Wang Z, Wang Z, Liu X, Yuan X (2017) A DNA-based encryption method based on two biological axioms of DNA Chip and Polymerase chain reaction (PCR) amplification techniques. Chem - A Eur J 23:13387–13403. https://doi.org/10.1002/chem.201701411

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imad El Hanouti.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original online version of this article was revised: An expression in the line before Eq. 11 contains a mistake.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

El Hanouti, I., El Fadili, H. Security analysis of an audio data encryption scheme based on key chaining and DNA encoding. Multimed Tools Appl 80, 12077–12099 (2021). https://doi.org/10.1007/s11042-020-10153-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10153-8

Keywords

Navigation