Abstract
Recently, a feedback image encryption algorithm with compound chaotic stream cipher based on perturbation was proposed. This paper analyzes security of the algorithm and reports that there exist some security defects, i.e., encryption of a pixel is independent on the position scrambling and the encryption round is controlled by the users. Based on them, a chosen-ciphertext attack is proposed to obtain the equivalent version of the secret key of the algorithm with \(n\cdot \lceil \log _{256} MN +2 \rceil \) chosen cipher-images, where \(M\times N\) is the size of the corresponding plain-images and n is the round number of encryption.
Similar content being viewed by others
References
Arroyo, D., Hernandez, F., Orue, A.B.: Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features. Int. J. Bifurc. Chaos 27(1), 1750,004 (2017)
Bechikh, R., Hermassi, H., El-Latif, A.A.A., Rhouma, R., Belghith, S.: Breaking an image encryption scheme based on a spatiotemporal chaotic system. Signal Process. Image Commun. 39(A), 151–158 (2015)
Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)
Chen, L., Wang, S.: Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map. Nonlinear Dyn. 87(3), 1797–1807 (2017)
Chen, P., Yu, S., Zhang, X., He, J., Lin, Z., Li, C., Lü, J.: Arm-embedded implementation of a video chaotic secure communication via wan remote transmission with desirable security and frame rate. Nonlinear Dyn. 86(2), 725–740 (2016)
Farash, M.S., Attari, M.A.: Cryptanalysis and improvement of a chaotic map-based key agreement protocol using chebyshev sequence membership testing. Nonlinear Dyn. 76(2), 1203–1213 (2014)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8(06), 1259–1284 (1998)
Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008)
Ge, X., Liu, F., Lu, B., Yang, C.: Improvement of rhouma’s attacks on gao algorithm. Phys. Lett. A 374(11), 1362–1367 (2010)
Ge, X., Lu, B., Liu, F., Gong, D.: An image encryption algorithm based on information hiding. Int. J. Bifurc. Chaos 26, 1650,192 (2016)
Hao, F., Clarke, D., Zorzo, A.F.: Deleting secret data with public verifiability. IEEE Trans. Dependable Secure Comput. 13(6), 617–629 (2016)
Hua, Z., Zhou, Y., Pun, C.M., Chen, C.L.P.: 2D sine logistic modulation map for image encryption. Inf. Sci. 297, 80–94 (2015)
Li, C.: Cracking a hierarchical chaotic image encryption algorithm based on permutation. Sig. Process. 118, 203–210 (2016)
Li, C., Lin, D., Lü, J.: Cryptanalyzing An Image Scrambling Encryption Algorithm of Pixel Bits. IEEE MultiMedia. arXiv:1607.01642 (2017)
Li, C., Xie, T., Liu, Q., Cheng, G.: Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn. 78(2), 1545–1551 (2014)
Lian, S., Sun, J., Wang, Z.: Security analysis of a chaos-based image encryption algorithm. Phys. A Stat. Mech. Its Appl. 351(2), 645–661 (2005)
Liu, S., Sun, F.: Spatial chaos-based image encryption design. Sci. China Ser. G Phys. Mech. Astron. 52(2), 177–183 (2009)
Liu, Y., Fan, H., Xie, E.Y., Cheng, G., Li, C.: Deciphering an image cipher based on mixed transformed logistic maps. Int. J. Bifurc. Chaos 25(13), 1550,188 (2015). doi:10.1142/S0218127415501886
Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. Bifurc. Chaos 14(10), 3613–3624 (2004)
Nini, B., Lemmouchi, C.: Security analysis of a three-dimensional rotation-based image encryption. IET Image Process. 9(8), 680–689 (2015)
Norouzi, B., Mirzakuchaki, S.: Breaking a novel image encryption scheme based on an improper fractional order chaotic system. Multimed. Tools Appl. 76(2), 1817–1826 (2017)
Patidar, V., Pareek, N., Sud, K.: A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3056–3075 (2009)
Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973–5978 (2008)
Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simul. 15(7), 1887–1892 (2010)
Shakiba, A., Hooshmandas, M.R., Meybodi, M.A.: Cryptanalysis of multiplicative coupled cryptosystems based on the chebyshev polynomials. Int. J. Bifurc. Chaos 26(7), 1650,112 (2016)
Tong, X., Cui, M.: Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation. Sci. China Ser. F Inf. Sci. 53(1), 191–202 (2010)
Wang, Q., Yu, S., Li, C., Lü, J., Fang, X., Guyeux, C., Bahi, J.M.: Theoretical design and FPGA-based implementation of higher-dimensional digital chaotic systems. IEEE Trans. Circ. Syst. I Regul. Papers 63(3), 401–412 (2016)
Wong, K.W., Kwok, B.S.H., Law, W.S.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372(15), 2645–2652 (2008)
Xie, E.Y., Li, C., Yu, S., Lü, J.: On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Sig. Process. 132, 150–154 (2017)
Acknowledgements
The work was supported by the National Natural Science Foundation of China (Nos. 61601517, 61532020, 60902102, 60970141) and the basic and advanced technology research project of Henan Province, China (No. 2014302703).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ge, X., Lu, B., Liu, F. et al. Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation. Nonlinear Dyn 90, 1141–1150 (2017). https://doi.org/10.1007/s11071-017-3715-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-017-3715-7