Cargando…
Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map
This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encry...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10047706/ https://www.ncbi.nlm.nih.gov/pubmed/36981284 http://dx.doi.org/10.3390/e25030395 |
_version_ | 1785013993369239552 |
---|---|
author | Jiang, Qinmao Yu, Simin Wang, Qianxue |
author_facet | Jiang, Qinmao Yu, Simin Wang, Qianxue |
author_sort | Jiang, Qinmao |
collection | PubMed |
description | This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row–column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data. |
format | Online Article Text |
id | pubmed-10047706 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-100477062023-03-29 Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map Jiang, Qinmao Yu, Simin Wang, Qianxue Entropy (Basel) Article This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row–column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data. MDPI 2023-02-21 /pmc/articles/PMC10047706/ /pubmed/36981284 http://dx.doi.org/10.3390/e25030395 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Jiang, Qinmao Yu, Simin Wang, Qianxue Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map |
title | Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map |
title_full | Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map |
title_fullStr | Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map |
title_full_unstemmed | Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map |
title_short | Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map |
title_sort | cryptanalysis of an image encryption algorithm based on two-dimensional hyperchaotic map |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10047706/ https://www.ncbi.nlm.nih.gov/pubmed/36981284 http://dx.doi.org/10.3390/e25030395 |
work_keys_str_mv | AT jiangqinmao cryptanalysisofanimageencryptionalgorithmbasedontwodimensionalhyperchaoticmap AT yusimin cryptanalysisofanimageencryptionalgorithmbasedontwodimensionalhyperchaoticmap AT wangqianxue cryptanalysisofanimageencryptionalgorithmbasedontwodimensionalhyperchaoticmap |