Advertisement

Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion

  • Ming Li
  • Dandan Lu
  • Yong Xiang
  • Yushu ZhangEmail author
  • Hua Ren
Original Paper
  • 35 Downloads

Abstract

Cryptanalysis is significant for the design of secure image cryptosystem. Recently, a chaotic image encryption scheme using two rounds of Latin square-based permutation and diffusion was proposed. Although two-round encryption is used, the cryptosystem has still been cracked successfully by the combined attack using both chosen-plaintext attack (CPA) and chosen-ciphertext attack due to the inherent flaw that the same key was used in both permutation and diffusion phases of each round. Therefore, different keys are used in each encryption phase of the improved cryptosystem. However, in this paper, we further attacked the two-round encryption with different keys using only CPA. By counting the number of the diffused pixels in the first diffusion phase from the processed encrypted image, the first permutation of one pixel is confirmed, and then the whole equivalent key stream of the first permutation can be obtained by limited CPA. Based on this, the key stream of the third permutation phase is obtained in a similar way. Meanwhile, all the mappings of the fourth diffusion are collected by 256 CPA, and 17 possible mappings in average are selected by verification. Finally, the key stream of the second diffusion is obtained using two pairs of chosen images. Experiments show that the encrypted image can be cracked successfully by the proposed attack. This work is instructive to the cryptanalysis of multi-round encryption. In order to remedy the security weakness, an improved cryptosystem is also proposed, followed by thorough security analysis.

Keywords

Chaos Cryptanalysis Chosen-plaintext attack Image encryption Permutation and diffusion 

Notes

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant Nos. 61602158, U1604156, U1604154), the Science Foundation for the Excellent Youth Scholars of Henan Normal University (Grant No. YQ201607), and the Science and Technology Research Project of Henan Province (Grant No. 182102210374).

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

References

  1. 1.
    Özkaynak, F.: Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn. 92(2), 305–313 (2018)CrossRefGoogle Scholar
  2. 2.
    Li, C.Q., Xie, T., Liu, Q., Cheng, G.: Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn. 78(2), 1545–1551 (2014)CrossRefGoogle Scholar
  3. 3.
    Li, X., Wang, Y., Wang, Q.H., Liu, Y., Zhou, X.: Modified integral imaging reconstruction and encryption using an improved SR reconstruction algorithm. Opt. Lasers Eng. 112, 162–169 (2019)CrossRefGoogle Scholar
  4. 4.
    Li, C.Q., Lin, D.D., Feng, B.B., Lü, J.H., Hao, F.: Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6, 75834–75842 (2018)CrossRefGoogle Scholar
  5. 5.
    Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8(6), 1259–1284 (1998)MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Zhang, W., Yu, H., Zhao, Y.L., Zhu, Z.L.: Image encryption based on three-dimensional bit matrix permutation. Signal Process. 118, 36–50 (2016)CrossRefGoogle Scholar
  7. 7.
    Chen, J.X., Zhu, Z.L., Yu, H.: A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme. Optik 125(11), 2472–2478 (2014)CrossRefGoogle Scholar
  8. 8.
    Zhang, W., Wong, K.W., Yu, H., Zhu, Z.L.: A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun. Nonlinear Sci. Numer. Simul. 18(3), 584–600 (2013)MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Chen, G.R., Mao, Y.B., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. J. Chaos Solitons Fractals 21(3), 749–761 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    Parvin, Z., Seyedarabi, H., Shamsi, M.: A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed. Tools Appl. 75(17), 10631–10648 (2016)CrossRefGoogle Scholar
  11. 11.
    He, X.P., Zhu, Q.S., Gu, P.: A new chaos-based encryption method for color image. In: Proceedings of the International Conference on Rough Sets and Knowledge Technology, Chongquing, China, pp. 671–678 (2006)Google Scholar
  12. 12.
    Yang, Y.G., Pan, Q.X., Sun, S.J., Xu, P.: Novel image encryption based on quantum walks. Sci. Rep. 5, 7784 (2015)CrossRefGoogle Scholar
  13. 13.
    Liu, H.J., Kadir, A., Sun, X.B.: Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Process. 11(5), 324–332 (2017)CrossRefGoogle Scholar
  14. 14.
    Liu, H.J., Kadir, A., Sun, X.B., Li, Y.L.: Chaos based adaptive double-image encryption scheme using hash function and S-boxes. Multimed. Tools Appl. 77(1), 1391–1407 (2018)CrossRefGoogle Scholar
  15. 15.
    Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.R.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed. Tools Appl. 71(3), 1469–1497 (2014)CrossRefGoogle Scholar
  16. 16.
    Zhu, H.G., Zhao, C., Zhang, X.D., Yang, L.P.: An image encryption scheme using generalized Arnold map and affine cipher. Optik 125(22), 6672–6677 (2014)CrossRefGoogle Scholar
  17. 17.
    Liu, H.J., Kadir, A.: Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process. 113, 104–112 (2015)CrossRefGoogle Scholar
  18. 18.
    Li, M., Guo, Y.Z., Huang, J., Li, Y.: Cryptanalysis of a chaotic image encryption scheme based on permutation–diffusion structure. Signal Process. Image Commun. 62, 164–172 (2018)CrossRefGoogle Scholar
  19. 19.
    Li, C.Q., Lin, D.D., Lü, J.H., Hao, F.: Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimed. 25(4) (2018).  https://doi.org/10.1109/MMUL.2018.2873472
  20. 20.
    Zhang, L.Y., Liu, Y.S., Pareschi, F., Zhang, Y.S., Wong, K.W., Rovatti, R., Setti, G.: On the security of a class of diffusion mechanisms for image encryption. IEEE Trans. Cybern. 48(4), 1–13 (2018)CrossRefGoogle Scholar
  21. 21.
    Li, C.Q., Lin, D.D., Lü, J.H.: Cryptanalyzing an image scrambling encryption algorithm of pixel bits. IEEE Multimed. 24(3), 64–71 (2017)CrossRefGoogle Scholar
  22. 22.
    Solak, E., Yildiz, O.T.: Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurcat. Chaos 20, 1405–1413 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  23. 23.
    Li, C.Q.: Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process. 118(C), 203–210 (2016)CrossRefGoogle Scholar
  24. 24.
    Li, C.Q., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91(4), 949–954 (2011)CrossRefzbMATHGoogle Scholar
  25. 25.
    Liu, Y.S., Zhang, L.Y., Wang, J., Zhang, Y.S., Wong, K.W.: Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure. Nonlinear Dyn. 84(4), 1–10 (2015)zbMATHGoogle Scholar
  26. 26.
    Xie, E.Y., Li, C.Q., Yu, S.M., Lü, J.H.: On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process. 132, 150–154 (2016)CrossRefGoogle Scholar
  27. 27.
    Zhang, Y.S., Xiao, D., Wen, W.Y., Li, M.: Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Nonlinear Dyn. 76(3), 1645–1650 (2014)CrossRefGoogle Scholar
  28. 28.
    Li, C.Q., Liu, Y.S., Zhang, L.Y., Wong, K.W.: Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem. Signal Process. Image Commun. 29(8), 914–920 (2014)CrossRefGoogle Scholar
  29. 29.
    Li, C.Q., Liu, Y.S., Xie, T., Chen, M.Z.Q.: Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dyn. 73(3), 2083–2089 (2013)MathSciNetCrossRefzbMATHGoogle Scholar
  30. 30.
    Chai, X., Fu, X., Gan, Z., Lu, Y., Chen, Y.: A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 155, 44–62 (2019)CrossRefGoogle Scholar
  31. 31.
    Zhu, C.X., Wang, G.J., Sun, K.H.: Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D chaotic maps. Entropy 20(11), 843 (2018)CrossRefGoogle Scholar
  32. 32.
    Wang, M.X., Wang, X.Y., Zhang, Y.Q., Gao, Z.G.: A novel chaotic encryption scheme based on image segmentation and multiple diffusion models. Opt. Laser Tecnnol. 108, 558–573 (2018)CrossRefGoogle Scholar
  33. 33.
    Hua, Z., Yi, S., Zhou, Y.: Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 144, 134–144 (2018)CrossRefGoogle Scholar
  34. 34.
    Hu, G.Q., Xiao, D., Wang, Y., Li, X.Y.: Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion. Nonlinear Dyn. 88(2), 1305–1316 (2017)CrossRefzbMATHGoogle Scholar
  35. 35.
    Chen, J.X., Zhu, Z.L., Fu, C., Zhang, L.B., Zhang, Y.S.: An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn. 81(3), 1151–1166 (2015)CrossRefGoogle Scholar
  36. 36.
    Belazi, A., Abd Ellatif, A.A., Belghith, S.: A novel image encryption scheme based on substitution–permutation network and chaos. Signal Process. 128, 155–170 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature B.V. 2019

Authors and Affiliations

  1. 1.College of Computer and Information EngineeringHenan Normal UniversityXinxiangChina
  2. 2.School of Electronics and Information EngineeringSouthwest UniversityChongqingChina
  3. 3.School of Information TechnologyDeakin UniversityBurwoodAustralia

Personalised recommendations