Cargando…

Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map

This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encry...

Descripción completa

Detalles Bibliográficos
Autores principales: Jiang, Qinmao, Yu, Simin, Wang, Qianxue
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10047706/
https://www.ncbi.nlm.nih.gov/pubmed/36981284
http://dx.doi.org/10.3390/e25030395
_version_ 1785013993369239552
author Jiang, Qinmao
Yu, Simin
Wang, Qianxue
author_facet Jiang, Qinmao
Yu, Simin
Wang, Qianxue
author_sort Jiang, Qinmao
collection PubMed
description This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row–column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data.
format Online
Article
Text
id pubmed-10047706
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100477062023-03-29 Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map Jiang, Qinmao Yu, Simin Wang, Qianxue Entropy (Basel) Article This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row–column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data. MDPI 2023-02-21 /pmc/articles/PMC10047706/ /pubmed/36981284 http://dx.doi.org/10.3390/e25030395 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Jiang, Qinmao
Yu, Simin
Wang, Qianxue
Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map
title Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map
title_full Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map
title_fullStr Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map
title_full_unstemmed Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map
title_short Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map
title_sort cryptanalysis of an image encryption algorithm based on two-dimensional hyperchaotic map
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10047706/
https://www.ncbi.nlm.nih.gov/pubmed/36981284
http://dx.doi.org/10.3390/e25030395
work_keys_str_mv AT jiangqinmao cryptanalysisofanimageencryptionalgorithmbasedontwodimensionalhyperchaoticmap
AT yusimin cryptanalysisofanimageencryptionalgorithmbasedontwodimensionalhyperchaoticmap
AT wangqianxue cryptanalysisofanimageencryptionalgorithmbasedontwodimensionalhyperchaoticmap