Abstract

In theory, high key and high plaintext sensitivities are a must for a cryptosystem to resist the chosen/known plaintext and the differential attacks. High plaintext sensitivity can be achieved by ensuring that each encrypted result is plaintext-dependent. In this work, we make detailed cryptanalysis on a published chaotic map-based image encryption system, where the encryption process is plaintext Image dependent. We show that some designing flaws make the published cryptosystem vulnerable to chosen-plaintext attack, and we then proposed an enhanced algorithm to overcome those flaws.

Highlights

  • With the rapid progress in digital technology and mobile devices, people have produced more and more user-generated information in these few years; besides texts, most of them are multimedia data, such as images and videos

  • Fridrich [4] proposed the first image encryption algorithm based on a chaotic map in 1998

  • A large number of digital image encryption algorithms that were based on chaotic maps were proposed [3], and the references therein

Read more

Summary

Introduction

With the rapid progress in digital technology and mobile devices, people have produced more and more user-generated information in these few years; besides texts, most of them are multimedia data, such as images and videos. Since Liu et al addressed lots of the chaotic map-based image encryption algorithms published on signal processing and information technology-related Journals before 2019, our following discussions will mainly focus on related works [5,6,7,8,9,10] posted on the Entropy Journal, most recently. We will take the high plaintext sensitivity related work: “A simple Chaotic map-based. We first break a simplified version of CIES-UBPRPD with a chosen-plaintext attack, to demonstrate the effect of the discovered flaws.

Related Work
Generalized Arnold’s Cat Map
Chebyshev Map
Image Encryption Algorithm
Diffusion Stage
Image Decryption Algorithm
Cryptanalysis
Equivalent Classes in Keyspace
Chosen-Plaintext
Extraction
Reconstruct
Improved CIES-UBPRPD Algorithm
The Enhanced CIES-UBPRPD
Secret Key Formulation
Verification of Encryption and Decryption
KeySpace Analysis
Histogram Analysis
Correlation Analysis
Key Sensitivity Analysis
Plaintext
Robustness Analyses
Robustness
Discussions
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call