Skip to main content
Log in

Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Recently, a feedback image encryption algorithm with compound chaotic stream cipher based on perturbation was proposed. This paper analyzes security of the algorithm and reports that there exist some security defects, i.e., encryption of a pixel is independent on the position scrambling and the encryption round is controlled by the users. Based on them, a chosen-ciphertext attack is proposed to obtain the equivalent version of the secret key of the algorithm with \(n\cdot \lceil \log _{256} MN +2 \rceil \) chosen cipher-images, where \(M\times N\) is the size of the corresponding plain-images and n is the round number of encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. https://github.com/stoneclever1982/TongAttack.

References

  1. Arroyo, D., Hernandez, F., Orue, A.B.: Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features. Int. J. Bifurc. Chaos 27(1), 1750,004 (2017)

    Article  MATH  Google Scholar 

  2. Bechikh, R., Hermassi, H., El-Latif, A.A.A., Rhouma, R., Belghith, S.: Breaking an image encryption scheme based on a spatiotemporal chaotic system. Signal Process. Image Commun. 39(A), 151–158 (2015)

    Article  MATH  Google Scholar 

  3. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  4. Chen, L., Wang, S.: Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map. Nonlinear Dyn. 87(3), 1797–1807 (2017)

    Article  Google Scholar 

  5. Chen, P., Yu, S., Zhang, X., He, J., Lin, Z., Li, C., Lü, J.: Arm-embedded implementation of a video chaotic secure communication via wan remote transmission with desirable security and frame rate. Nonlinear Dyn. 86(2), 725–740 (2016)

    Article  Google Scholar 

  6. Farash, M.S., Attari, M.A.: Cryptanalysis and improvement of a chaotic map-based key agreement protocol using chebyshev sequence membership testing. Nonlinear Dyn. 76(2), 1203–1213 (2014)

    Article  MATH  MathSciNet  Google Scholar 

  7. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8(06), 1259–1284 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  8. Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008)

    Article  MATH  Google Scholar 

  9. Ge, X., Liu, F., Lu, B., Yang, C.: Improvement of rhouma’s attacks on gao algorithm. Phys. Lett. A 374(11), 1362–1367 (2010)

    Article  MATH  Google Scholar 

  10. Ge, X., Lu, B., Liu, F., Gong, D.: An image encryption algorithm based on information hiding. Int. J. Bifurc. Chaos 26, 1650,192 (2016)

    Article  MATH  Google Scholar 

  11. Hao, F., Clarke, D., Zorzo, A.F.: Deleting secret data with public verifiability. IEEE Trans. Dependable Secure Comput. 13(6), 617–629 (2016)

    Article  Google Scholar 

  12. Hua, Z., Zhou, Y., Pun, C.M., Chen, C.L.P.: 2D sine logistic modulation map for image encryption. Inf. Sci. 297, 80–94 (2015)

    Article  Google Scholar 

  13. Li, C.: Cracking a hierarchical chaotic image encryption algorithm based on permutation. Sig. Process. 118, 203–210 (2016)

    Article  Google Scholar 

  14. Li, C., Lin, D., Lü, J.: Cryptanalyzing An Image Scrambling Encryption Algorithm of Pixel Bits. IEEE MultiMedia. arXiv:1607.01642 (2017)

  15. Li, C., Xie, T., Liu, Q., Cheng, G.: Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn. 78(2), 1545–1551 (2014)

    Article  Google Scholar 

  16. Lian, S., Sun, J., Wang, Z.: Security analysis of a chaos-based image encryption algorithm. Phys. A Stat. Mech. Its Appl. 351(2), 645–661 (2005)

    Article  Google Scholar 

  17. Liu, S., Sun, F.: Spatial chaos-based image encryption design. Sci. China Ser. G Phys. Mech. Astron. 52(2), 177–183 (2009)

    Article  Google Scholar 

  18. Liu, Y., Fan, H., Xie, E.Y., Cheng, G., Li, C.: Deciphering an image cipher based on mixed transformed logistic maps. Int. J. Bifurc. Chaos 25(13), 1550,188 (2015). doi:10.1142/S0218127415501886

    Article  MATH  MathSciNet  Google Scholar 

  19. Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. Bifurc. Chaos 14(10), 3613–3624 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  20. Nini, B., Lemmouchi, C.: Security analysis of a three-dimensional rotation-based image encryption. IET Image Process. 9(8), 680–689 (2015)

    Article  Google Scholar 

  21. Norouzi, B., Mirzakuchaki, S.: Breaking a novel image encryption scheme based on an improper fractional order chaotic system. Multimed. Tools Appl. 76(2), 1817–1826 (2017)

    Article  Google Scholar 

  22. Patidar, V., Pareek, N., Sud, K.: A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3056–3075 (2009)

    Article  Google Scholar 

  23. Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973–5978 (2008)

    Article  MATH  Google Scholar 

  24. Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simul. 15(7), 1887–1892 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  25. Shakiba, A., Hooshmandas, M.R., Meybodi, M.A.: Cryptanalysis of multiplicative coupled cryptosystems based on the chebyshev polynomials. Int. J. Bifurc. Chaos 26(7), 1650,112 (2016)

    Article  MathSciNet  Google Scholar 

  26. Tong, X., Cui, M.: Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation. Sci. China Ser. F Inf. Sci. 53(1), 191–202 (2010)

    Article  MathSciNet  Google Scholar 

  27. Wang, Q., Yu, S., Li, C., Lü, J., Fang, X., Guyeux, C., Bahi, J.M.: Theoretical design and FPGA-based implementation of higher-dimensional digital chaotic systems. IEEE Trans. Circ. Syst. I Regul. Papers 63(3), 401–412 (2016)

    Article  MathSciNet  Google Scholar 

  28. Wong, K.W., Kwok, B.S.H., Law, W.S.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372(15), 2645–2652 (2008)

    Article  MATH  Google Scholar 

  29. Xie, E.Y., Li, C., Yu, S., Lü, J.: On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Sig. Process. 132, 150–154 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

The work was supported by the National Natural Science Foundation of China (Nos. 61601517, 61532020, 60902102, 60970141) and the basic and advanced technology research project of Henan Province, China (No. 2014302703).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Ge.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ge, X., Lu, B., Liu, F. et al. Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation. Nonlinear Dyn 90, 1141–1150 (2017). https://doi.org/10.1007/s11071-017-3715-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-017-3715-7

Keywords

Navigation