Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 327))

Abstract

Recently Panduranga et al. suggested an image encryption algorithm based on permutation-substitution architecture using chaotic map and Latin square. According to the proposal, the pixels of plain-image are firstly scrambled according to permutation vector, extracted from chaotic sequence, in permutation phase. In substitution phase, the permuted image is substituted by XOR operation with key image generated from a keyed Latin square. The algorithm has the ability to adapt and encrypt any plain-image with unequal width and height. Moreover, it also exhibits the features of high entropy, low pixels correlation, large key space, high key sensitivity, etc. However, a careful analysis of Panduranga et al. algorithm unveils few security flaws which make it susceptible to cryptographic attack. In this paper, we analyze its security and proposed a chosen plaintext-attack to break the algorithm completely. It is shown that the plain-image can be successfully recovered without knowing the secret key. The simulation of proposed attack demonstrates that Panduranga et al. algorithm is not at all secure for practical encryption of sensitive digital images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B.: Applied Cryptography: Protocols Algorithms and Source Code in C. Wiley, New York (1996)

    MATH  Google Scholar 

  2. Bard, G.V.: Algebraic Cryptanalysis. Springer, Berlin (2009)

    Book  MATH  Google Scholar 

  3. Cryptanalysis (last access on June 02, 2014), http://en.wikipedia.org/wiki/Cryptanalysis

  4. Military Cryptanalysis Part I- National Security Agency (last access on June 02, 2014), http://www.nsa.gov/public_info/_files/military_cryptanalysis/mil_crypt_I.pdf

  5. Hermassi, H., Rhouma, R., Belghith, S.: Security analysis of image cryptosystems only or partially based on a chaotic permutation. Journal of Systems and Software 85(9), 2133–2144 (2012)

    Article  Google Scholar 

  6. Çokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A 373(15), 1357–1360 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  7. Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Communication in Nonlinear Science and Numerical Simulation 15(7), 1887–1892 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  8. Li, C., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing 91(4), 949–954 (2011)

    Article  MATH  Google Scholar 

  9. Rhouma, R., Belghith, S.: Cryptanalysis of a spatiotemporal chaotic cryptosystem. Chaos, Solitons & Fractals 41(4), 1718–1722 (2009)

    Article  MATH  Google Scholar 

  10. Wang, X., Luan, D., Bao, X.: Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digital Signal Processing 25, 244–247 (2014)

    Article  Google Scholar 

  11. Ahmad, M.: Cryptanalysis of chaos based secure satellite imagery cryptosystem. In: Aluru, S., Bandyopadhyay, S., Catalyurek, U.V., Dubhashi, D.P., Jones, P.H., Parashar, M., Schmidt, B. (eds.) IC3 2011. CCIS, vol. 168, pp. 81–91. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  12. Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A 372(38), 5973–5978 (2008)

    Article  MATH  Google Scholar 

  13. Özkaynak, F., Özer, A.B., Yavuz, S.: Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences. Optics Communications 285(2), 4946–4948 (2012)

    Article  Google Scholar 

  14. Solak, E., Rhouma, R., Belghith, S.: Cryptanalysis of a multi-chaotic systems based image cryptosystem. Optics Communications 283(2), 232–236 (2010)

    Article  Google Scholar 

  15. Panduranga, H.T., Kumar, N., Kiran, S.K.: Image encryption based on permutation-substitution using chaotic map and Latin square image cipher. The European Physical Journal-Special Topics 223(8), 1663–1677 (2014)

    Article  Google Scholar 

  16. Wu, Y., Zhou, Y., Noonan, J.P., Agaian, S.: Design of image cipher using latin squares. Information Sciences 264, 317–339 (2014)

    Article  MathSciNet  Google Scholar 

  17. Kerckhoffs’s principle (last access on May 12, 2014), http://crypto-it.net/eng/theory/kerckhoffs.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ahmad, M., Ahmad, F. (2015). Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 327. Springer, Cham. https://doi.org/10.1007/978-3-319-11933-5_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11933-5_53

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11932-8

  • Online ISBN: 978-3-319-11933-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics