Cargando…

Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map

Recently, an image encryption scheme based on a 2D hyperchaotic map is proposed. It adopts the permutation–diffusion architecture and consists of three steps, which are permutation, forward diffusion, and backward diffusion. In this paper, we break this cipher with both the chosen-plaintext attack (...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhang, Chengrui, Chen, Junxin, Chen, Dongming
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9689893/
https://www.ncbi.nlm.nih.gov/pubmed/36359641
http://dx.doi.org/10.3390/e24111551
_version_ 1784836649727819776
author Zhang, Chengrui
Chen, Junxin
Chen, Dongming
author_facet Zhang, Chengrui
Chen, Junxin
Chen, Dongming
author_sort Zhang, Chengrui
collection PubMed
description Recently, an image encryption scheme based on a 2D hyperchaotic map is proposed. It adopts the permutation–diffusion architecture and consists of three steps, which are permutation, forward diffusion, and backward diffusion. In this paper, we break this cipher with both the chosen-plaintext attack (CPA) and the chosen-ciphertext attack (CCA). According to our analysis, we found the two complex diffusion processes could be simplified into two simple diffusions and a modular addition operation. Based on this, the equivalent key can be obtained with CPA and CCA. Detailed theoretical derivations and the results of experiments confirmed the feasibility of our attack methods. When the image size was [Formula: see text] , the running time of the attacks was less than 2 hours on a laptop with a 2.59 GHz Intel Core i7 and 16 GB DDR3 memory. Other sizes of images were also tested, and some rules were found. In addition, the probability of other attacks has also been discussed, and some suggestions for improvements are given. The source codes are publicly available and can be found online.
format Online
Article
Text
id pubmed-9689893
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96898932022-11-25 Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map Zhang, Chengrui Chen, Junxin Chen, Dongming Entropy (Basel) Article Recently, an image encryption scheme based on a 2D hyperchaotic map is proposed. It adopts the permutation–diffusion architecture and consists of three steps, which are permutation, forward diffusion, and backward diffusion. In this paper, we break this cipher with both the chosen-plaintext attack (CPA) and the chosen-ciphertext attack (CCA). According to our analysis, we found the two complex diffusion processes could be simplified into two simple diffusions and a modular addition operation. Based on this, the equivalent key can be obtained with CPA and CCA. Detailed theoretical derivations and the results of experiments confirmed the feasibility of our attack methods. When the image size was [Formula: see text] , the running time of the attacks was less than 2 hours on a laptop with a 2.59 GHz Intel Core i7 and 16 GB DDR3 memory. Other sizes of images were also tested, and some rules were found. In addition, the probability of other attacks has also been discussed, and some suggestions for improvements are given. The source codes are publicly available and can be found online. MDPI 2022-10-28 /pmc/articles/PMC9689893/ /pubmed/36359641 http://dx.doi.org/10.3390/e24111551 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Zhang, Chengrui
Chen, Junxin
Chen, Dongming
Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map
title Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map
title_full Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map
title_fullStr Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map
title_full_unstemmed Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map
title_short Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map
title_sort cryptanalysis of an image encryption algorithm based on a 2d hyperchaotic map
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9689893/
https://www.ncbi.nlm.nih.gov/pubmed/36359641
http://dx.doi.org/10.3390/e24111551
work_keys_str_mv AT zhangchengrui cryptanalysisofanimageencryptionalgorithmbasedona2dhyperchaoticmap
AT chenjunxin cryptanalysisofanimageencryptionalgorithmbasedona2dhyperchaoticmap
AT chendongming cryptanalysisofanimageencryptionalgorithmbasedona2dhyperchaoticmap