Cargando…
Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map
Recently, an image encryption scheme based on a 2D hyperchaotic map is proposed. It adopts the permutation–diffusion architecture and consists of three steps, which are permutation, forward diffusion, and backward diffusion. In this paper, we break this cipher with both the chosen-plaintext attack (...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9689893/ https://www.ncbi.nlm.nih.gov/pubmed/36359641 http://dx.doi.org/10.3390/e24111551 |
_version_ | 1784836649727819776 |
---|---|
author | Zhang, Chengrui Chen, Junxin Chen, Dongming |
author_facet | Zhang, Chengrui Chen, Junxin Chen, Dongming |
author_sort | Zhang, Chengrui |
collection | PubMed |
description | Recently, an image encryption scheme based on a 2D hyperchaotic map is proposed. It adopts the permutation–diffusion architecture and consists of three steps, which are permutation, forward diffusion, and backward diffusion. In this paper, we break this cipher with both the chosen-plaintext attack (CPA) and the chosen-ciphertext attack (CCA). According to our analysis, we found the two complex diffusion processes could be simplified into two simple diffusions and a modular addition operation. Based on this, the equivalent key can be obtained with CPA and CCA. Detailed theoretical derivations and the results of experiments confirmed the feasibility of our attack methods. When the image size was [Formula: see text] , the running time of the attacks was less than 2 hours on a laptop with a 2.59 GHz Intel Core i7 and 16 GB DDR3 memory. Other sizes of images were also tested, and some rules were found. In addition, the probability of other attacks has also been discussed, and some suggestions for improvements are given. The source codes are publicly available and can be found online. |
format | Online Article Text |
id | pubmed-9689893 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96898932022-11-25 Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map Zhang, Chengrui Chen, Junxin Chen, Dongming Entropy (Basel) Article Recently, an image encryption scheme based on a 2D hyperchaotic map is proposed. It adopts the permutation–diffusion architecture and consists of three steps, which are permutation, forward diffusion, and backward diffusion. In this paper, we break this cipher with both the chosen-plaintext attack (CPA) and the chosen-ciphertext attack (CCA). According to our analysis, we found the two complex diffusion processes could be simplified into two simple diffusions and a modular addition operation. Based on this, the equivalent key can be obtained with CPA and CCA. Detailed theoretical derivations and the results of experiments confirmed the feasibility of our attack methods. When the image size was [Formula: see text] , the running time of the attacks was less than 2 hours on a laptop with a 2.59 GHz Intel Core i7 and 16 GB DDR3 memory. Other sizes of images were also tested, and some rules were found. In addition, the probability of other attacks has also been discussed, and some suggestions for improvements are given. The source codes are publicly available and can be found online. MDPI 2022-10-28 /pmc/articles/PMC9689893/ /pubmed/36359641 http://dx.doi.org/10.3390/e24111551 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Zhang, Chengrui Chen, Junxin Chen, Dongming Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map |
title | Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map |
title_full | Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map |
title_fullStr | Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map |
title_full_unstemmed | Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map |
title_short | Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map |
title_sort | cryptanalysis of an image encryption algorithm based on a 2d hyperchaotic map |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9689893/ https://www.ncbi.nlm.nih.gov/pubmed/36359641 http://dx.doi.org/10.3390/e24111551 |
work_keys_str_mv | AT zhangchengrui cryptanalysisofanimageencryptionalgorithmbasedona2dhyperchaoticmap AT chenjunxin cryptanalysisofanimageencryptionalgorithmbasedona2dhyperchaoticmap AT chendongming cryptanalysisofanimageencryptionalgorithmbasedona2dhyperchaoticmap |