Universal chosen-ciphertext attack for a family of image encryption schemes

03/28/2019
by   Junxin Chen, et al.
0

During the past decades, there is a great popularity employing nonlinear dynamics and permutation-substitution architecture for image encryption. There are three primary procedures in such encryption schemes, the key schedule module for producing encryption factors, permutation for image scrambling and substitution for pixel modification. Under the assumption of chosen-ciphertext attack, we evaluate the security of a class of image ciphers which adopts pixel-level permutation and modular addition for substitution. It is mathematically revealed that the mapping from differentials of ciphertexts to those of plaintexts are linear and has nothing to do with the key schedules, permutation techniques and encryption rounds. Moreover, a universal chosen-ciphertext attack is proposed and validated. Experimental results demonstrate that the plaintexts can be directly reconstructed without any security key or encryption elements. Related cryptographic discussions are also given.

READ FULL TEXT
research
10/19/2019

Breaking an image encryption scheme based on Arnold map and Lucas series

Fairly recently, a novel image encryption based on Arnold scrambling and...
research
08/14/2022

Cryptanalyzing an Image Encryption Algorithm Underpinned by 2D Lag-Complex Logistic Map

This paper analyzes security performance of an image encryption algorith...
research
08/30/2018

Color Image Encryption Based on Chaotic Block Permutation and XOR Operation

In this paper, chaotic block image permutation and XOR operation are per...
research
06/21/2018

Cryptanalysis of a Chaotic Key based Image Encryption Scheme

Security of multimedia data is a major concern due to its widespread tra...
research
12/23/2004

Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher

In ISNN'04, a novel symmetric cipher was proposed, by combining a chaoti...
research
11/19/2021

INCHE: High-Performance Encoding for Relational Databases through Incrementally Homomorphic Encryption

Homomorphic encryption (HE) offers data confidentiality by executing que...
research
09/24/2021

Cryptanalyzing two image encryption algorithms based on a first-order time-delay system

Security is a key problem for the transmission, interchange and storage ...

Please sign up or login with your details

Forgot password? Click here to reset