Skip to main content
Log in

Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose to cryptanalyse an encryption algorithm which combines a DNA addition and a chaotic map to encrypt a gray scale image. Our contribution consists on, at first, demonstrating that the algorithm, as it is described, is non-invertible, which means that the receiver cannot decrypt the ciphered image even if he posses the secret key. Then, a chosen plaintext attack on the invertible encryption block is described, where, the attacker can illegally decrypt the ciphered image by a temporary access to the encryption machinery.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Adelman L, Rothemund P, Roweis S, Winfree E (1999) On applying molecular computation to the data encryption standard. J Comput Biol 6:53–63

    Article  Google Scholar 

  2. Guglielmi V, Pinel P, Fournier-Prunaret D, Taha A-K (2009) Chaos-based cryptosystem on DSP. Chaos Solitons Fractals 4(42):2135–2144

    Article  Google Scholar 

  3. Hermassi H, Rhouma R, Belghith S (2010) Joint compression and encryption using chaotically mutated Huffman trees. Commun Nonlinear Sci Numer Simul 15(10):2987–2999

    Article  MATH  MathSciNet  Google Scholar 

  4. Leier A, Richter C, Banzhaf W, Rauhe H (2000) Cryptography with DNA binary standards. Biosystems 57:13–22

    Article  Google Scholar 

  5. Li C, Li S, Lo KT (2011) Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 16:837–843

    Article  MATH  MathSciNet  Google Scholar 

  6. Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Article  Google Scholar 

  7. Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240–1248

    Article  Google Scholar 

  8. Mansuripur M, Khulbe P, Kuebler S, Perry J, Giridhar M, Peyghambarian N (2003) Information storage and retrieval using macromolecules as storage media. University of Arizona Technical Report

  9. Patidar V, Pareek N, Sud K (2010) Modified substitution-diffusion image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:2755–2765

    Article  MathSciNet  Google Scholar 

  10. Rhouma R, Belghith S (2011) Cryptanalysis of a chaos-based cryptosystem on DSP. Commun Nonlinear Sci Numer Simul 2(16):876–884

    Article  MathSciNet  Google Scholar 

  11. Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:658–715

    Google Scholar 

  12. Tanaka K, Okamoto A, Saito I (2005) Public-key system using DNA as a one-way function for key distribution. Biosystems 81:25–29

    Article  Google Scholar 

  13. Tang Z, Zhang X (2011) Secure image encryption without size limitation using arnold transform and random strategies. J Multimed 6(2):202–206

    Article  Google Scholar 

  14. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Article  Google Scholar 

  15. X952 A (1998) Triple data encryption algorithm modes of operation. Accredited Standards Committee X9, American National Standards Institute

  16. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11–12):2028–2035

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Houcemeddine Hermassi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hermassi, H., Belazi, A., Rhouma, R. et al. Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimed Tools Appl 72, 2211–2224 (2014). https://doi.org/10.1007/s11042-013-1533-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1533-6

Keywords

Navigation