Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map
- 338 Downloads
In this paper, we analyze the security of a chaos-based image encryption algorithm. We find that the algorithm is vulnerable to differential cryptanalysis. The differential cryptanalysis demonstrates that the security of the original scheme depends only on the permutation key instead of on all of the keys, which makes the key space of the cryptosystem greatly reduced. Specifically, \((H\times W+1)\) chosen plain-images can reveal the equivalent permutation key for one-round encryption, where \(H\times W\) is the size of the binary image. The two-way differential comparison method is proposed to break two-round cryptosystem. Basing on differential cryptanalysis, we propose a codebook attack under chosen-ciphertext conditions, design the codebook with \((H\times W)\) differential binary images, and totally break multi-round cryptosystem using XOR operation of \(O(H\times W)\) images. The simulation results indicate that the designed codebook attack is effective. Furthermore, we summarize some characteristics of a class of permutation–diffusion systems that also are vulnerable to the differential attack and the codebook attack.
KeywordsChaos-based image encryption Differential cryptanalysis Codebook attack Chosen-plaintext attack Chosen-ciphertext attack
- 11.Wu, X., Li, Y., Kurths, J.: A new color image encryption scheme using CML and a fractional-order chaotic system. Plos ONE 10, e01196603 (2015)Google Scholar
- 16.Ye, G., Huang, X.: A novel block chaotic encryption scheme for remote sensing image. Multimedia Tools Appl. 75(18), 11433 (2015). doi: 10.1007/s11042-015-2861-5
- 21.Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973–5978 (2008)Google Scholar
- 24.Tu, G., Liao, X., Xiang, T.: Cryptanalysis of a color image encryption algorithm based on chaos. Optik 124(22), 5411–5415 (2013)Google Scholar