Abstract
Recently Panduranga et al. suggested an image encryption algorithm based on permutation-substitution architecture using chaotic map and Latin square. According to the proposal, the pixels of plain-image are firstly scrambled according to permutation vector, extracted from chaotic sequence, in permutation phase. In substitution phase, the permuted image is substituted by XOR operation with key image generated from a keyed Latin square. The algorithm has the ability to adapt and encrypt any plain-image with unequal width and height. Moreover, it also exhibits the features of high entropy, low pixels correlation, large key space, high key sensitivity, etc. However, a careful analysis of Panduranga et al. algorithm unveils few security flaws which make it susceptible to cryptographic attack. In this paper, we analyze its security and proposed a chosen plaintext-attack to break the algorithm completely. It is shown that the plain-image can be successfully recovered without knowing the secret key. The simulation of proposed attack demonstrates that Panduranga et al. algorithm is not at all secure for practical encryption of sensitive digital images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schneier, B.: Applied Cryptography: Protocols Algorithms and Source Code in C. Wiley, New York (1996)
Bard, G.V.: Algebraic Cryptanalysis. Springer, Berlin (2009)
Cryptanalysis (last access on June 02, 2014), http://en.wikipedia.org/wiki/Cryptanalysis
Military Cryptanalysis Part I- National Security Agency (last access on June 02, 2014), http://www.nsa.gov/public_info/_files/military_cryptanalysis/mil_crypt_I.pdf
Hermassi, H., Rhouma, R., Belghith, S.: Security analysis of image cryptosystems only or partially based on a chaotic permutation. Journal of Systems and Software 85(9), 2133–2144 (2012)
Çokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A 373(15), 1357–1360 (2009)
Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Communication in Nonlinear Science and Numerical Simulation 15(7), 1887–1892 (2010)
Li, C., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing 91(4), 949–954 (2011)
Rhouma, R., Belghith, S.: Cryptanalysis of a spatiotemporal chaotic cryptosystem. Chaos, Solitons & Fractals 41(4), 1718–1722 (2009)
Wang, X., Luan, D., Bao, X.: Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digital Signal Processing 25, 244–247 (2014)
Ahmad, M.: Cryptanalysis of chaos based secure satellite imagery cryptosystem. In: Aluru, S., Bandyopadhyay, S., Catalyurek, U.V., Dubhashi, D.P., Jones, P.H., Parashar, M., Schmidt, B. (eds.) IC3 2011. CCIS, vol. 168, pp. 81–91. Springer, Heidelberg (2011)
Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A 372(38), 5973–5978 (2008)
Özkaynak, F., Özer, A.B., Yavuz, S.: Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences. Optics Communications 285(2), 4946–4948 (2012)
Solak, E., Rhouma, R., Belghith, S.: Cryptanalysis of a multi-chaotic systems based image cryptosystem. Optics Communications 283(2), 232–236 (2010)
Panduranga, H.T., Kumar, N., Kiran, S.K.: Image encryption based on permutation-substitution using chaotic map and Latin square image cipher. The European Physical Journal-Special Topics 223(8), 1663–1677 (2014)
Wu, Y., Zhou, Y., Noonan, J.P., Agaian, S.: Design of image cipher using latin squares. Information Sciences 264, 317–339 (2014)
Kerckhoffs’s principle (last access on May 12, 2014), http://crypto-it.net/eng/theory/kerckhoffs.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Ahmad, M., Ahmad, F. (2015). Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 327. Springer, Cham. https://doi.org/10.1007/978-3-319-11933-5_53
Download citation
DOI: https://doi.org/10.1007/978-3-319-11933-5_53
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11932-8
Online ISBN: 978-3-319-11933-5
eBook Packages: EngineeringEngineering (R0)