Skip to main content
Log in

Differential attack on a hyper-chaos-based image cryptosystem with a classic bi-modular architecture

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

In recent years, hyper-chaos systems have been widely used in image cipher design. So far, a number of hyper-chaos-based image ciphers have been cryptanalyzed, but many others have not been effectively attacked like an image cipher with a classic bi-modular architecture of permutation and diffusion. This study cryptanalyzes this cipher. It is demonstrated that the cipher can be broken by differential attack with multiple pairs of special plain/cipher images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  2. Huang, X.: Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 67(4), 2411–2417 (2012)

    Article  MathSciNet  Google Scholar 

  3. Kadir, A., Hamdulla, A., Guo, W.Q.: Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125(5), 1671–1675 (2014)

    Article  Google Scholar 

  4. Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed. Tools Appl. 71(3), 1469–1497 (2014)

    Article  Google Scholar 

  5. Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)

  6. Zhang, Q., Guo, L., Wei, X.: A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 124(18), 3596–3600 (2013)

    Article  Google Scholar 

  7. Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973–5978 (2008)

    Article  MATH  Google Scholar 

  8. Jeng, F.G., Huang, W.L., Chen, T.H.: Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes. Signal Process. Image Commun. 34, 45–51 (2015)

    Article  Google Scholar 

  9. Wang, X., Luan, D., Bao, X.: Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digit. Signal Process. 25, 244–247 (2014)

    Article  Google Scholar 

  10. Wen, W.: Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack. Multimed. Tools Appl. 75, 3553–3560 (2016)

    Article  Google Scholar 

  11. Zhang, Y., Xiao, D., Wen, W., Li, M.: Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Nonlinear Dyn. 76(3), 1645–1650 (2014)

    Article  Google Scholar 

  12. Özkaynak, F., Özer, A.B., Yavuz, S.: Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(24), 4946–4948 (2012)

    Article  Google Scholar 

  13. Xie, T., Liu, Y., Tang, J.: Breaking a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 125(24), 7166–7169 (2014)

    Article  Google Scholar 

  14. Zhang, Y., Wen, W., Su, M., Li, M.: Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 125(4), 1562–1564 (2014)

    Article  Google Scholar 

  15. Zhang, Y., Xiao, D., Wen, W., Wong, K.: On the security of symmetric ciphers based on DNA coding. Inf. Sci. 289, 254–261 (2014)

    Article  Google Scholar 

  16. Özkaynak, F., Yavuz, S.: Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dyn. 78(2), 1311–1320 (2014)

  17. Boriga, R., Dăscălescu, A.C., Priescu, I.: A new hyperchaotic map and its application in an image encryption scheme. Signal Process. Image Commun. 29(8), 887–901 (2014)

    Article  Google Scholar 

  18. Li, S., Li, C., Chen, G., Bourbakis, N.G., Lo, K.T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. Image Commun. 23(3), 212–223 (2008)

    Article  Google Scholar 

  19. Li, C., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91(4), 949–954 (2011)

    Article  MATH  Google Scholar 

Download references

Acknowledgments

The work was supported by the National Natural Science Foundation of China (Grant Nos. 61502399, 61462032, 61602158, 61672038, U1536204) and Research Foundation of the Education Department of Jiangxi Province (Grant No. GJJ150462).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yushu Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wen, W., Zhang, Y., Su, M. et al. Differential attack on a hyper-chaos-based image cryptosystem with a classic bi-modular architecture. Nonlinear Dyn 87, 383–390 (2017). https://doi.org/10.1007/s11071-016-3049-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-016-3049-x

Keywords

Navigation