Cargando…

Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map

This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) infinite collapse map. The encryption algorithm adopts a permutation–diffusion structure and can perform two or more rounds to achieve a higher level of security. By cryptanalysis, it is found that the...

Descripción completa

Detalles Bibliográficos
Autores principales: Shi, Guanwen, Yu, Simin, Wang, Qianxue
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9394294/
https://www.ncbi.nlm.nih.gov/pubmed/35893003
http://dx.doi.org/10.3390/e24081023
_version_ 1784771457343029248
author Shi, Guanwen
Yu, Simin
Wang, Qianxue
author_facet Shi, Guanwen
Yu, Simin
Wang, Qianxue
author_sort Shi, Guanwen
collection PubMed
description This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) infinite collapse map. The encryption algorithm adopts a permutation–diffusion structure and can perform two or more rounds to achieve a higher level of security. By cryptanalysis, it is found that the original diffusion process can be split into a permutation–diffusion structure, which comes after the original permutation, so these two permutations can be merged into one. Then, some theorems about round-down operation are summarized, and the encryption and decryption equations in the diffusion process are deduced and simplified accordingly. Since the chaotic sequences used in encryption algorithm are independent of the plaintext and ciphertext, there are equivalent keys. The original encryption algorithm with single-round, two-round, and multi-round of permutation–diffusion processes is cracked, and the data complexity of the cryptanalysis attacks is analyzed. Numerical simulation is carried out by MATLAB, and the experimental results and theoretical analysis show the effectiveness of the cryptanalysis attacks. Finally, some suggestions for improvement are given to overcome the shortcomings of the original encryption algorithm.
format Online
Article
Text
id pubmed-9394294
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-93942942022-08-23 Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map Shi, Guanwen Yu, Simin Wang, Qianxue Entropy (Basel) Article This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) infinite collapse map. The encryption algorithm adopts a permutation–diffusion structure and can perform two or more rounds to achieve a higher level of security. By cryptanalysis, it is found that the original diffusion process can be split into a permutation–diffusion structure, which comes after the original permutation, so these two permutations can be merged into one. Then, some theorems about round-down operation are summarized, and the encryption and decryption equations in the diffusion process are deduced and simplified accordingly. Since the chaotic sequences used in encryption algorithm are independent of the plaintext and ciphertext, there are equivalent keys. The original encryption algorithm with single-round, two-round, and multi-round of permutation–diffusion processes is cracked, and the data complexity of the cryptanalysis attacks is analyzed. Numerical simulation is carried out by MATLAB, and the experimental results and theoretical analysis show the effectiveness of the cryptanalysis attacks. Finally, some suggestions for improvement are given to overcome the shortcomings of the original encryption algorithm. MDPI 2022-07-25 /pmc/articles/PMC9394294/ /pubmed/35893003 http://dx.doi.org/10.3390/e24081023 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Shi, Guanwen
Yu, Simin
Wang, Qianxue
Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map
title Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map
title_full Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map
title_fullStr Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map
title_full_unstemmed Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map
title_short Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map
title_sort security analysis of the image encryption algorithm based on a two-dimensional infinite collapse map
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9394294/
https://www.ncbi.nlm.nih.gov/pubmed/35893003
http://dx.doi.org/10.3390/e24081023
work_keys_str_mv AT shiguanwen securityanalysisoftheimageencryptionalgorithmbasedonatwodimensionalinfinitecollapsemap
AT yusimin securityanalysisoftheimageencryptionalgorithmbasedonatwodimensionalinfinitecollapsemap
AT wangqianxue securityanalysisoftheimageencryptionalgorithmbasedonatwodimensionalinfinitecollapsemap