Skip to main content
Log in

Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

In this paper, we analyze the security of a chaos-based image encryption algorithm. We find that the algorithm is vulnerable to differential cryptanalysis. The differential cryptanalysis demonstrates that the security of the original scheme depends only on the permutation key instead of on all of the keys, which makes the key space of the cryptosystem greatly reduced. Specifically, \((H\times W+1)\) chosen plain-images can reveal the equivalent permutation key for one-round encryption, where \(H\times W\) is the size of the binary image. The two-way differential comparison method is proposed to break two-round cryptosystem. Basing on differential cryptanalysis, we propose a codebook attack under chosen-ciphertext conditions, design the codebook with \((H\times W)\) differential binary images, and totally break multi-round cryptosystem using XOR operation of \(O(H\times W)\) images. The simulation results indicate that the designed codebook attack is effective. Furthermore, we summarize some characteristics of a class of permutation–diffusion systems that also are vulnerable to the differential attack and the codebook attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Huang, C.K., Nien, H.H.: Multi chaotic systems based pixel shuffle for image encryption. Opt. Commun. 282(11), 2123–2127 (2009)

    Article  Google Scholar 

  2. Ye, G.: Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn. Lett. 31(5), 347–354 (2010)

    Article  Google Scholar 

  3. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8(6), 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  4. Sam, I.S., Devaraj, P., Bhuvaneswaran, R.S.: A novel image cipher based on mixed transformed logistic maps. Multimedia Tools Appl. 56(2SI), 315–330 (2012)

    Article  Google Scholar 

  5. Wang, X., Zhao, J., Liu, H.: A new image encryption algorithm based on chaos. Opt. Commun. 285(5), 562–566 (2012)

    Article  Google Scholar 

  6. Wang, X., Teng, L.: An image blocks encryption algorithm based on spatiotemporal chaos. Nonlinear Dyn. 67(1), 365–371 (2012)

    Article  MathSciNet  Google Scholar 

  7. Zhou, G., Zhang, D., Liu, Y., Yuan, Y., Liu, Q.: A novel image encryption algorithm based on chaos and Line map. Neurocomputing 169(SI), 150–157 (2015)

    Article  Google Scholar 

  8. Mirzaei, O., Yaghoobi, M., Irani, H.: A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 67(67), 557–566 (2012)

    Article  MathSciNet  Google Scholar 

  9. Sun, Y., Chen, L., Xu, R., Kong, R.: An image encryption algorithm utilizing julia sets and hilbert curves. Plos ONE 9(1), e84655 (2014)

    Article  Google Scholar 

  10. Tang, Z., Zhang, X., Lan, W.: Efficient image encryption with block shuffling and chaotic map. Multimedia Tools Appl. 74(15), 5429–5448 (2015)

    Article  Google Scholar 

  11. Wu, X., Li, Y., Kurths, J.: A new color image encryption scheme using CML and a fractional-order chaotic system. Plos ONE 10, e01196603 (2015)

    Google Scholar 

  12. Wang, X., Xu, D.: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn. 75(1–2), 345–353 (2014)

    Article  Google Scholar 

  13. Wang, X., Liu, C., Xu, D., Liu, C.: Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dyn. 84(3), 1–13 (2016)

    MathSciNet  Google Scholar 

  14. Chen, J., Zhu, Z., Fu, C., Yu, H.: An improved permutation–diffusion type image cipher with a chaotic orbit perturbing mechanism. Opt. Express 21(23), 27873–27890 (2013)

    Article  Google Scholar 

  15. Chen, J.X., Zhu, Z.L., Fu, C., Yu, H., Zhang, L.B.: A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun. Nonlinear Sci. Numer. Simul. 20(3), 846–860 (2015)

    Article  Google Scholar 

  16. Ye, G., Huang, X.: A novel block chaotic encryption scheme for remote sensing image. Multimedia Tools Appl. 75(18), 11433 (2015). doi:10.1007/s11042-015-2861-5

  17. Wang, Y., Wong, K., Liao, X., Xiang, T.: A block cipher with dynamic S-boxes based on tent map. Commun. Nonlinear Sci. 14(7), 3089–3099 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  18. Xu, S., Chen, X., Zhang, R., Yang, Y., Guo, Y.: An improved chaotic cryptosystem based on circular bit shift and XOR operations. Phys. Lett. A 376(10–11), 1003–1010 (2012)

    Article  MATH  Google Scholar 

  19. Li, S., Li, C., Chen, G., Bourbakis, N.G., Lo, K.T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. Image Commun. 23(3), 212–223 (2008)

    Article  Google Scholar 

  20. Li, C., Lo, K.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91(4), 949–954 (2011)

    Article  MATH  Google Scholar 

  21. Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973–5978 (2008)

  22. Cokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Phys. Lett. A 373(15), 1357–1360 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  23. Wang, B., Wei, X., Zhang, Q.: Cryptanalysis of an image cryptosystem based on logistic map. Optik 124(14), 1773–1776 (2013)

    Article  Google Scholar 

  24. Tu, G., Liao, X., Xiang, T.: Cryptanalysis of a color image encryption algorithm based on chaos. Optik 124(22), 5411–5415 (2013)

  25. Solak, E., Cokal, C., Yildiz, O.T., Biyikoglu, T.: Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurc. Chaos 20(5), 1405–1413 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  26. Chen, L., Wang, S.: Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput. Biol. Med. 65, 69–75 (2015)

    Article  Google Scholar 

  27. Özkaynak, F., Yavuz, S.: Analysis and improvement of a novel image fusion encryption algorithm based on dna sequence operation and hyper-chaotic system. Nonlinear Dyn. 78(2), 1311–1320 (2014)

    Article  MATH  Google Scholar 

  28. Li, C., Liu, Y., Xie, T., Chen, M.Z.Q.: Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dyn. 73(3), 2083–2089 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  29. Zhang, Y., Xiao, D.: Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack. Nonlinear Dyn. 72(4), 751–756 (2013)

    Article  MathSciNet  Google Scholar 

  30. Yap, W., Phan, R.C.W., Yau, W., Heng, S.: Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn. 80(3), 1483–1491 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  31. Zhu, C., Xu, S., Hu, Y., Sun, K.: Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn. 79, 1511–1518 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shihong Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, L., Ma, B., Zhao, X. et al. Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map. Nonlinear Dyn 87, 1797–1807 (2017). https://doi.org/10.1007/s11071-016-3153-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-016-3153-y

Keywords

Navigation