Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion
- 35 Downloads
Cryptanalysis is significant for the design of secure image cryptosystem. Recently, a chaotic image encryption scheme using two rounds of Latin square-based permutation and diffusion was proposed. Although two-round encryption is used, the cryptosystem has still been cracked successfully by the combined attack using both chosen-plaintext attack (CPA) and chosen-ciphertext attack due to the inherent flaw that the same key was used in both permutation and diffusion phases of each round. Therefore, different keys are used in each encryption phase of the improved cryptosystem. However, in this paper, we further attacked the two-round encryption with different keys using only CPA. By counting the number of the diffused pixels in the first diffusion phase from the processed encrypted image, the first permutation of one pixel is confirmed, and then the whole equivalent key stream of the first permutation can be obtained by limited CPA. Based on this, the key stream of the third permutation phase is obtained in a similar way. Meanwhile, all the mappings of the fourth diffusion are collected by 256 CPA, and 17 possible mappings in average are selected by verification. Finally, the key stream of the second diffusion is obtained using two pairs of chosen images. Experiments show that the encrypted image can be cracked successfully by the proposed attack. This work is instructive to the cryptanalysis of multi-round encryption. In order to remedy the security weakness, an improved cryptosystem is also proposed, followed by thorough security analysis.
KeywordsChaos Cryptanalysis Chosen-plaintext attack Image encryption Permutation and diffusion
This work was supported by the National Natural Science Foundation of China (Grant Nos. 61602158, U1604156, U1604154), the Science Foundation for the Excellent Youth Scholars of Henan Normal University (Grant No. YQ201607), and the Science and Technology Research Project of Henan Province (Grant No. 182102210374).
Compliance with ethical standards
Conflict of interest
The authors declare that they have no conflict of interest.
- 11.He, X.P., Zhu, Q.S., Gu, P.: A new chaos-based encryption method for color image. In: Proceedings of the International Conference on Rough Sets and Knowledge Technology, Chongquing, China, pp. 671–678 (2006)Google Scholar
- 19.Li, C.Q., Lin, D.D., Lü, J.H., Hao, F.: Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimed. 25(4) (2018). https://doi.org/10.1109/MMUL.2018.2873472