Advertisement

Cryptanalysis of A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm: A Chosen Ciphertext Attack

  • Vadlamudi Naveen Kumar
  • N. Ravi Shankar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1119)

Abstract

This paper carries out a chosen ciphertext attack on the image encryption proposed by Said Hraoui et al. [1]. The scheme proposed by Said Hraoui et al. uses PWLCM to generate key matrix and other confidential information. But, the whole encryption algorithm boils down to a simple Affine-Hill Cipher where only one component is generated dynamically for each pixel encryption. Since the relationship between the plaintext and the ciphertext is linear, the cipher suffers from the same weaknesses as that of the Hill Cipher. Particularly, this cipher exhibits its vulnerabilities in the face of an all zero plaintext. This paper exploits that weakness and breaks the cipher.

Keywords

PWLCM Hill Cipher Chaotic maps Image cryptography Cryptanalysis Chosen-plaintext attack 

References

  1. 1.
    Hraoui, S., Gmira, F., Fouad Abbou, M., Jarrar Oulidi, A., Jarjar, A.: A new cryptosystem of color image using a dynamic-chaos Hill Cipher algorithm. In: Second International Conference on Intelligent Computing in Data Sciences (ICDS 2018), Procedia Computer Science, vol. 148, pp. 399–408 (2019)Google Scholar
  2. 2.
    Hill, L.S.: Cryptography in an algebraic alphabet. Am. Math. Mon. 36(6), 306–312 (1929)Google Scholar
  3. 3.
    Hill, L.S.: Concerning certain linear transformation apparatus of cryptography. Am. Math. Mon. 38(3), 135–154 (1931)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Sastry, V.U.K., Ravi Shankar, N., Durga Bhavani, S.: A modified Hill Cipher involving interweaving and iteration. Int. J. Netw. Secur. 11(2), 51–56 (2010)Google Scholar
  5. 5.
    Sastry, V.U.K., Ravi Shankar, N., Durga Bhavani, S.: A large block cipher involving key dependent permutation, interlacing and iteration. Cybern. Inf. Technol. 13(3), 50–63 (2013)Google Scholar
  6. 6.
    Sastry, V.U.K., Ravi Shankar, N.: Modified Hill Cipher with interlacing and iteration. J. Comput. Sci. (Science Publications) 3(11), 854–859 (2007)Google Scholar
  7. 7.
    Sastry, V.U.K., Ravi Shankar, N.: Modified Hill Cipher for a large block of plaintext with interlacing and iteration. J. Comput. Sci. (Science Publications) 4(1), 15–20 (2008)Google Scholar
  8. 8.
    Sastry, V.U.K., Ravi Shankar, N., Durga Bhavani, S.: A modified playfair cipher involving interweaving and iteration. Int. J. Comput. Theory Eng. 1(5), 594–598 (2009)Google Scholar
  9. 9.
    Sastry, V.U.K., Ravi Shankar, N., Durga Bhavani, S.: A modified playfair cipher for a large block of plaintext. Int. J. Comput. Theory Eng. 1(5), 590–594 (2009)Google Scholar
  10. 10.
    Sastry, V.U.K., Ravi Shankar, N., Durga Bhavani, S.: A generalized playfair cipher involving intertwining, interweaving and iteration. Int. J. Netw. Mobile Technol. 1(2), 45–53 (2010)Google Scholar
  11. 11.
    Sastry, V.U.K., Ravi Shankar, N., Durga Bhavani, S.: A blending of a generalized playfair cipher and a modified Hill Cipher. Int. J. Netw. Mobile Technol. 2(1), 35–43 (2011)Google Scholar
  12. 12.
    Megantara, R., Rafrastara, F., Mahendra, S.: A combination of Hill CIPHER-LSB in RGB image encryption. Kinetik: Game Technol. Inf. Syst. Comput. Netw. Comput. Electron. Control 4(3), 241–248 (2019)Google Scholar
  13. 13.
    Handoko, L.B., Umam, C., Anindita, A.S.: Upload file security on the server using LSB and Hill Cipher. J. Appl. Intell. Syst. 4(1), 28–38 (2019) (e-ISSN: 2502–9401, p-ISSN: 2503-0493)Google Scholar
  14. 14.
    Essaida, M., Akharraza, I., Saaidiabet, A., Mouhiba, A.: Image encryption scheme based on a new secure variant of Hill Cipher and 1D chaotic maps. J. Inf. Secur. Appl. 47, 173–187 (2019)Google Scholar
  15. 15.
    Abd El Hafez Bakr, M., Amr Mokhtar, M., El Sherbini Takieldeen, A.: Elliptic curve cryptography modified Hill Cipher dependent on circulant matrix. Int. J. Ind. Electron. Electr. Eng. (IJIEEE) 6(1), 24–29 (2018)Google Scholar
  16. 16.
    Rachmawati, D., Budiman, M.A., Wardhono, M.I.: Hybrid cryptosystem for image security by using Hill Cipher 4 × 4 and ElGamal elliptic curve algorithm. In: 2018 IEEE International Conference on Communication, Networks and Satellite (Comnetsat), Medan, Indonesia, pp. 49–54 (2018)Google Scholar
  17. 17.
    Li, C., Luo, G., Li, C.: An image encryption scheme based on the three-dimensional chaotic logistic map. Int. J. Netw. Secur. 21, 22–29 (2019)Google Scholar
  18. 18.
    Luo, Y., et al.: A novel chaotic image encryption algorithm based on improved baker map and logistic map. In: Multimedia Tools and Applications 1–21 (2019)Google Scholar
  19. 19.
    Li, X., Mou, H., Yan, B., Gao, L.: A reversible data hiding with quality controllable scheme for encrypted-compressed image. Wuhan Univ. J. Nat. Sci. 24, 383 (2019).  https://doi.org/10.1007/s11859-019-1410-x
  20. 20.
    Gupta, R., Pachauri, R., Singh, A.K.: Image encryption method using dependable multiple chaotic logistic functions. IJISP 13(4), 53–67 (2019). 19 Sept 2019.  https://doi.org/10.4018/ijisp.2019100104
  21. 21.
    Yi, X.: Hash function based on chaotic tent maps. IEEE Trans. Circuits Syst. II Express Briefs 52(6), 354–357 (2005).  https://doi.org/10.1109/TCSII.2005.848992CrossRefGoogle Scholar
  22. 22.
    Liu, J., Yang, K., Wang, S.: Coupled chaotic tent map lattices system with uniform distribution. In: 2010 2nd International Conference on e-Business and Information System Security (EBISS), pp. 1–5 (2010)Google Scholar
  23. 23.
    Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vision Comput. 24(9), 926–934 (2006)Google Scholar
  24. 24.
    Kuperin, Yu.A., Pyatkin, D.A.: Two-dimensional chaos: the baker map under control. J. Math. Sci. 128(2), 2798–2802 (2005)Google Scholar
  25. 25.
    Li, S., Chen, G., Mou, X.: ON the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos 15(10), 3119–3151 (2005)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Vadlamudi Naveen Kumar
    • 1
  • N. Ravi Shankar
    • 1
  1. 1.Geethanjali College of Engineering and Technology (Autonomous)Cheeryal, Medchal, HyderabadIndia

Personalised recommendations