Advertisement

Weaknesses in Security Considerations Related to Chaos-Based Image Encryption

  • Thomas Hütter
  • Mario Preishuber
  • Jutta Hämmerle-Uhl
  • Andreas Uhl
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9977)

Abstract

Over the past years an enormous variety of different chaos-based image and video encryption algorithms have been proposed and published. While any algorithm published undergoes some more or less strict experimental security analysis, many of those schemes are being broken in subsequent publications. In this work it is shown that three issues wrt. chaos-based encryption security considerations severely question the soundness of these techniques. It is experimentally demonstrated that obviously weak (i.e. insecure) encryption schemes do not consistently fail commonly used tests to assess chaos-based encryption security and thus, passing these test is only a necessary condition for a secure scheme, but by no means a sufficient one. Security analysis of chaos-based encryption schemes needs to be entirely reconsidered.

Keywords

Encryption Scheme Encryption Algorithm Image Encryption Encrypt Image Video Encryption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgement

This work has been partially supported by the Austrian Science Fund, project no. 27776.

References

  1. 1.
    Ahmad, M., Imran, R., Shazhad, A.: Cryptanalysis of image encryption algorithm based on fractional-order lorenz-like chaotic system. In: Satapathy, S.C., Govardhan, A., Raju, K.S., Mandal, J.K. (eds.) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2. AISC, vol. 338, pp. 381–388. Springer, Heidelberg (2015). doi: 10.1007/978-3-319-13731-5_41 Google Scholar
  2. 2.
    Ahmad, M.: Cryptanalysis of chaos based secure satellite imagery cryptosystem. In: Aluru, S., Bandyopadhyay, S., Catalyurek, U.V., Dubhashi, D.P., Jones, P.H., Parashar, M., Schmidt, B. (eds.) IC3 2011. CCIS, vol. 168, pp. 81–91. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-22606-9_12 CrossRefGoogle Scholar
  3. 3.
    Alvarez, E., Fernandez, A., Garcıa, P., Jiménez, J., Marcano, A.: New approach to chaotic encryption. Phys. Lett. A 263(4), 373–375 (1999)CrossRefGoogle Scholar
  4. 4.
    Alvarez, E., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a chaotic encryption system. Phys. Lett. A 276(4), 191–196 (2000)MathSciNetCrossRefMATHGoogle Scholar
  5. 5.
    Alvarez, G., Amigó, J.M., Arroyo, D., Li, S.: Lessons learnt from the cryptanalysis of chaos-based ciphers. In: Kocarev, L., Lian, S. (eds.) Chaos-Based Cryptography: Theory, Algorithms and Applications. Studies in Computational Intelligence, vol. 354, pp. 257–295. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-20542-2_8 CrossRefGoogle Scholar
  6. 6.
    Balatoni, J., Renji, A.: On the notion of entropy (Hungarian). Publ. Math. Inst. Hung. Acad. Sci. 1(9), 9–40 (1956)Google Scholar
  7. 7.
    Chen, R., Lu, W., Lai, J.: Image encryption using progressive cellular automata substitution and SCAN. In: Proceeding of IEEE International Symposium on Circuits and Systems, vol. 2, pp. 1690–1693 (2005)Google Scholar
  8. 8.
    Cokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Phys. Lett. A 373, 1357–1360 (2009)MathSciNetCrossRefMATHGoogle Scholar
  9. 9.
    Fridrich, J.: Image encryption based on chaotic maps. In: 1997 IEEE International Conference on Systems, Man, and Cybernetics, 1997. Computational Cybernetics and Simulation, vol. 2, pp. 1105–1110. IEEE (1997)Google Scholar
  10. 10.
    Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008)MathSciNetCrossRefMATHGoogle Scholar
  11. 11.
    Guan, Z.H., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Phys. Lett. A 346(1), 153–157 (2005)CrossRefMATHGoogle Scholar
  12. 12.
    Hussain, I., Shah, T., Gondal, M.A.: Image encryption algorithm based on total shuffling scheme and chaotic s-box transformation. J. Vibr. Control 20(14), 2133–2136 (2014)CrossRefGoogle Scholar
  13. 13.
    Jeng, F.G., Huang, W.L., Chen, T.H.: Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes. Sig. Process.: Image Commun. 34, 45–51 (2015)Google Scholar
  14. 14.
    Li, C., Lo, K.-T.: Cryptanalysis of an image encryption scheme using cellular automata substitution and SCAN. In: Qiu, G., Lam, K.M., Kiya, H., Xue, X.-Y., Kuo, C.-C.J., Lew, M.S. (eds.) PCM 2010. LNCS, vol. 6297, pp. 601–610. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-15702-8_55 CrossRefGoogle Scholar
  15. 15.
    Li, S., Mou, X., Cai, Y.: Improving security of a chaotic encryption approach. Phys. Lett. A 290(3–4), 127–133 (2001)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Lian, S., Sun, J., Wang, Z.: Security analysis of a chaos-based image encryption algorithm. Phys. A: Stat. Mech. Appl. 351(2), 645–661 (2005)CrossRefGoogle Scholar
  17. 17.
    Menezes, A.J., Vanstone, S.A., van Oorschot, P.C.: Handbook of Applied Cryptography (5th printing). CRC Press, Boca Raton (2001)MATHGoogle Scholar
  18. 18.
    Mishra, M., Mankar, V.: Review on chaotic sequences based cryptography and cryptanalysis. Int. J. Electron. Eng. 3(2), 189–194 (2011)Google Scholar
  19. 19.
    Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973–5978 (2008)CrossRefMATHGoogle Scholar
  20. 20.
    Scharinger, J., Pichler, F.: Efficient image encryption based on chaotic maps. In: Proceedings of the 20th Workshop of the Austrian Association for Pattern Recognition (OAGM/AAPR 1996) on Pattern Recognition. pp. 159–170. Oldenbourg Verlag, Munich (1996)Google Scholar
  21. 21.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edn. Wiley, Hoboken (1996)MATHGoogle Scholar
  22. 22.
    Sharma, P.K., Ahmad, M., Khan, P.M.: Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds.) SSCC 2014. CCIS, vol. 467, pp. 173–181. Springer, Heidelberg (2014). doi: 10.1007/978-3-662-44966-0_16 Google Scholar
  23. 23.
    Solak, E., Cokal, C., Yildiz, O., Biyikoglu, T.: Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurc. Chaos 20(5), 1405–1413 (2010)MathSciNetCrossRefMATHGoogle Scholar
  24. 24.
    Solak, E.: Cryptanalysis of chaotic ciphers. In: Kocarev, L., Lian, S. (eds.) Chaos-Based Cryptography: Theory, Algorithms and Applications. Studies in Computational Intelligence, vol. 354, pp. 227–256. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-20542-2_7 CrossRefGoogle Scholar
  25. 25.
    Usama, M., Khan, M., Alghathbar, K., Lee, C.: Chaos-based secure satellite imagery cryptosystem. Comput. Math. Appl. 60(2), 326–337 (2010)MathSciNetCrossRefMATHGoogle Scholar
  26. 26.
    Wang, X., Teng, L., Qi, X.: A novel colour image encryption algorithm based on chaos. Sig. Process. 92(4), 1101–1108 (2012)MathSciNetCrossRefGoogle Scholar
  27. 27.
    Wang, X., Guo, K.: A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn. 76(4), 1943–1950 (2014)CrossRefGoogle Scholar
  28. 28.
    Wu, Y., Noonan, J., Again, S.: NPCR and UACI randomness tests for image encryption. Cyber J.: J. Sel. Areas Telecommun. (JSAT) 4, 31–38 (2011)Google Scholar
  29. 29.
    Xu, Y., Wang, H., Li, Y., Pei, B.: Image encryption based on synchronization of fractional chaotic systems. Commun. Nonlinear Sci. Numer. Simul. 19(10), 3735–3744 (2014)MathSciNetCrossRefGoogle Scholar
  30. 30.
    Yap, W.S., Phan, R.C.W., Yau, W.C., Heng, S.H.: Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn. 80(3), 1483–1491 (2015)MathSciNetCrossRefGoogle Scholar
  31. 31.
    Ye, G.D.: Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn. Lett. 31, 347–354 (2010)CrossRefGoogle Scholar
  32. 32.
    Yen, J.C., Chen, H.C., Wu, S.M.: Design and implementation of a new cryptographic system for multimedia transmission. In: IEEE International Symposium on Circuits and Systems, ISCAS 2005, pp. 6126–6129. IEEE (2005)Google Scholar
  33. 33.
    Zhao, L., Adhikari, A., Xiao, D., Sakurai, K.: Cryptanalysis on an image scrambling encryption scheme based on pixel bit. In: Kim, H.-J., Shi, Y.Q., Barni, M. (eds.) IWDW 2010. LNCS, vol. 6526, pp. 45–59. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-18405-5_5 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  • Thomas Hütter
    • 1
  • Mario Preishuber
    • 1
  • Jutta Hämmerle-Uhl
    • 1
  • Andreas Uhl
    • 1
  1. 1.Visual Computing and Security Lab (VISEL), Department of Computer SciencesUniversity of SalzburgSalzburgAustria

Personalised recommendations