Abstract
In recent years, hyper-chaos systems have been widely used in image cipher design. So far, a number of hyper-chaos-based image ciphers have been cryptanalyzed, but many others have not been effectively attacked like an image cipher with a classic bi-modular architecture of permutation and diffusion. This study cryptanalyzes this cipher. It is demonstrated that the cipher can be broken by differential attack with multiple pairs of special plain/cipher images.
Similar content being viewed by others
References
Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008)
Huang, X.: Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 67(4), 2411–2417 (2012)
Kadir, A., Hamdulla, A., Guo, W.Q.: Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125(5), 1671–1675 (2014)
Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed. Tools Appl. 71(3), 1469–1497 (2014)
Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)
Zhang, Q., Guo, L., Wei, X.: A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 124(18), 3596–3600 (2013)
Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973–5978 (2008)
Jeng, F.G., Huang, W.L., Chen, T.H.: Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes. Signal Process. Image Commun. 34, 45–51 (2015)
Wang, X., Luan, D., Bao, X.: Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digit. Signal Process. 25, 244–247 (2014)
Wen, W.: Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack. Multimed. Tools Appl. 75, 3553–3560 (2016)
Zhang, Y., Xiao, D., Wen, W., Li, M.: Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Nonlinear Dyn. 76(3), 1645–1650 (2014)
Özkaynak, F., Özer, A.B., Yavuz, S.: Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(24), 4946–4948 (2012)
Xie, T., Liu, Y., Tang, J.: Breaking a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 125(24), 7166–7169 (2014)
Zhang, Y., Wen, W., Su, M., Li, M.: Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 125(4), 1562–1564 (2014)
Zhang, Y., Xiao, D., Wen, W., Wong, K.: On the security of symmetric ciphers based on DNA coding. Inf. Sci. 289, 254–261 (2014)
Özkaynak, F., Yavuz, S.: Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dyn. 78(2), 1311–1320 (2014)
Boriga, R., Dăscălescu, A.C., Priescu, I.: A new hyperchaotic map and its application in an image encryption scheme. Signal Process. Image Commun. 29(8), 887–901 (2014)
Li, S., Li, C., Chen, G., Bourbakis, N.G., Lo, K.T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. Image Commun. 23(3), 212–223 (2008)
Li, C., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91(4), 949–954 (2011)
Acknowledgments
The work was supported by the National Natural Science Foundation of China (Grant Nos. 61502399, 61462032, 61602158, 61672038, U1536204) and Research Foundation of the Education Department of Jiangxi Province (Grant No. GJJ150462).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wen, W., Zhang, Y., Su, M. et al. Differential attack on a hyper-chaos-based image cryptosystem with a classic bi-modular architecture. Nonlinear Dyn 87, 383–390 (2017). https://doi.org/10.1007/s11071-016-3049-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-016-3049-x