Abstract
Fairly recently, a new audio encryption scheme has been proposed. The cryptosystem is based on a substitution-permutation algorithm using DNA encoding. The key-generation of this proposed scheme is based on a key chaining mode, that generates a new key block for every plain block using the chaotic logistic map. After several statistical tests, handled by the authors of the scheme, they claimed that their cryptosystem is robust. In this paper, we scrutinize the cryptosystem from a cryptanalytic perspective, and we handle several security attacks to evaluate the immunity of the system, and to assess its possible adoption in real-world applications. We demonstrate two successful conventional attacks on the scheme, which are: the chosen ciphertext and chosen-plaintext attacks. The cryptosystem’s shuffling process design is scrutinized as well, and a cycle attack is described using the drawn results. Lessons learned from this cryptanalytic paper, are then outlined in order to be considered in further designs and proposals.
Similar content being viewed by others
Change history
01 February 2021
A Correction to this paper has been published: https://doi.org/10.1007/s11042-021-10592-x
Notes
Some notations from the original paper are modified without affecting its main meaning.
The two terms “plaintext” and “plain blocks” are used alternatively in this paper, the same for “keys” with “key blocks”, and for “ciphertext” with “cipher blocks”
Octave freeware under GNU GPL license at https://gnu.org/software/octave/
The audio sample used for this illustration is available freely on: https://archive.codeplex.com/?p=audiotestfiles
References
Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Sci (80). https://doi.org/10.1126/science.7973651
Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16:2129–2151. https://doi.org/10.1142/S0218127406015970
Arroyo D, Alvarez G, Fernandez V (2008) On the inadequacy of the logistic map for cryptographic applications. arXiv Prepr arXiv08054355
Barua R, Misra J (2003) Binary arithmetic for DNA computers. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics). https://doi.org/10.1007/3-540-36440-4_11
Bensikaddour EH, Bentoutou Y, Taleb N (2020) Embedded implementation of multispectral satellite image encryption using a chaos-based block cipher. J King Saud Univ - Comput Inf Sci 32:50–56. https://doi.org/10.1016/j.jksuci.2018.05.002
Bhargava B, Shi C, Wang SY (2004) MPEG video encryption algorithms. Multimed Tools Appl 24:57–79. https://doi.org/10.1023/B:MTAP.0000033983.62130.00
Broemeling LD (2011) An account of early statistical inference in Arab cryptology. Am Stat 65:255–257. https://doi.org/10.1198/tas.2011.10191
Chen S, Zhong XX, Wu ZZ (2008) Chaos block cipher for wireless sensor network. Sci China, Ser F Inf Sci 51:1055–1063. https://doi.org/10.1007/s11432-008-0102-5
Du M, Wang K, Chen Y et al (2018) Big data privacy preserving in multi-access edge computing for heterogeneous internet of things. IEEE Commun Mag 56:62–67. https://doi.org/10.1109/MCOM.2018.1701148
El Hanouti I, El Fadili H, Zenkouar K (2020) Breaking an image encryption scheme based on Arnold map and Lucas series. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09815-4
El-Latif AAA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70:1559–1584. https://doi.org/10.1007/s11042-012-1173-2
Gencoglu MT (2019) Embedded image coding using Laplace transform for Turkish letters. Multimed Tools Appl 78:17521–17534. https://doi.org/10.1007/s11042-018-7096-9
Genot AJ, Bath J, Turberfield AJ (2011) Reversible logic circuits made of DNA. J Am Chem Soc 133:20080–20083. https://doi.org/10.1021/ja208497p
Ghadi M, Laouamer L, Moulahi T (2016) Securing data exchange in wireless multimedia sensor networks: perspectives and challenges. Multimed Tools Appl 75:3425–3451. https://doi.org/10.1007/s11042-014-2443-y
Gupta V, Parthasarathy S, Zaki M (1999) Arithmetic and logic operations with DNA
Habib IW, Saadawi TN (2002) Multimedia traffic characteristics in broadband networks. IEEE Commun Mag 30:48–54. https://doi.org/10.1109/35.144777
Hraoui S, Gmira F, Jarar AO, Satori K, Saaidi A (2013) Benchmarking AES and chaos based logistic map for image encryption. In: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA. https://doi.org/10.1109/AICCSA.2013.6616441
Iqbal S, Malik M, Iqbal S, Muhammad O, Sher H (2008) Study of nonlinear dynamics using logistic map. In: LUMS 2nd international conference on mathematics and its applications in information technology (LICM08)
Janakiraman S, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Lightweight chaotic image encryption algorithm for real-time embedded system: implementation and analysis on 32-bit microcontroller. Microprocess Microsyst 56:1–12. https://doi.org/10.1016/j.micpro.2017.10.013
Kerckhoffs A (1883) Auguste Kerckhoffs “La cryptographie militaire.” Des Sci Mil
Larew K, Kahn D (1968) The Codebreakers: the story of secret writing. Am Hist Rev 74:537. https://doi.org/10.2307/1853680
Li S, Li C, Chen G, Lo KT (2008) Cryptanalysis of the RCES/RSES image encryption scheme. J Syst Softw 81:1130–1143. https://doi.org/10.1016/j.jss.2007.07.037
Li H, Wang K, Liu X, Sun Y, Guo S (2017) A selective privacy-preserving approach for multimedia data. IEEE Multimed 24:14–25. https://doi.org/10.1109/MMUL.2017.4031322
Li C, Xie T, Liu Q, Cheng G (2014) Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn 78:1545–1551. https://doi.org/10.1007/s11071-014-1533-8
Lin Z, Liu J, Lian J, Ma Y, Zhang X (2019) A novel fast image encryption algorithm for embedded systems. Multimed Tools Appl 78:20511–20531. https://doi.org/10.1007/s11042-018-6824-5
Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020) A novel hybrid secure image encryption based on Julia set of fractals and 3D lorenz chaotic map. Entropy. https://doi.org/10.3390/e22030274
Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SKH, Gope P (2018) Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Appl 77:18295–18325. https://doi.org/10.1007/s11042-017-5376-4
Naskar PK, Paul S, Nandy D, Chaudhuri A (2019) DNA encoding and channel shuffling for secured encryption of audio data. Multimed Tools Appl 78:25019–25042. https://doi.org/10.1007/s11042-019-7696-z
Özkaynak F (2018) Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn 92:305–313. https://doi.org/10.1007/s11071-018-4056-x
Reif JH (1998) Paradigms for biomolecular computation. In: Unconventional models of computation. Springer, New york, pp. 72–93
Shakir HR (2019) An image encryption method based on selective AES coding of wavelet transform and chaotic pixel shuffling. Multimed Tools Appl 78:26073–26087. https://doi.org/10.1007/s11042-019-07766-z
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Smekal D, Hajny J, Martinasek Z (2018) Comparative analysis of different implementations of encryption algorithms on FPGA network cards. IFAC-PapersOnLine 51:312–317. https://doi.org/10.1016/j.ifacol.2018.07.172
Ur RA, Liao X (2019) A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2. Multimed Tools Appl 78:2105–2133. https://doi.org/10.1007/s11042-018-6346-1
Yan H, Feng L, LaBean TH, Reif JH (2003) Parallel molecular computations of pairwise exclusive-or (XOR) using DNA “string tile” self-assembly. J Am Chem Soc 125:14246–14247. https://doi.org/10.1021/ja036676m
Yap WS, Phan RCW, Yau WC, Heng SH (2015) Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 80:1483–1491. https://doi.org/10.1007/s11071-015-1956-x
Zeraoulia E, Sprott JC (2011) Robust Chaos and its applications. World Scientific
Zhang Y, Wang Z, Wang Z, Liu X, Yuan X (2017) A DNA-based encryption method based on two biological axioms of DNA Chip and Polymerase chain reaction (PCR) amplification techniques. Chem - A Eur J 23:13387–13403. https://doi.org/10.1002/chem.201701411
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original online version of this article was revised: An expression in the line before Eq. 11 contains a mistake.
Rights and permissions
About this article
Cite this article
El Hanouti, I., El Fadili, H. Security analysis of an audio data encryption scheme based on key chaining and DNA encoding. Multimed Tools Appl 80, 12077–12099 (2021). https://doi.org/10.1007/s11042-020-10153-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10153-8