Abstract

Robust protocols are needed to create a secure computing system. Protocols designed without considering various design criteria result in many vulnerabilities. Security has many aspects. The slightest defect in the design processes affects the whole system security. Chaos based image encryption algorithms have become increasingly popular in the recent period. However, most of these algorithms are often based on cryptanalysis driven design technique. Therefore, the security of these algorithms is doubtful as long as the threat of attack continues. In this paper, attention has been drawn to this problem. First, the security problems of two different chaos based image encryption algorithms have been analyzed. In the second analyzed study, the security problem of the first analyzed study has been examined and a new improved version has been published. The common point of these two analyzed studies is that both the original and the improved algorithm are designed on the basis of the cryptanalysis has driven design approach. In other words, the security of these two algorithms is still doubtful. In this study, security problems have been shown for both algorithms and the encryption algorithms have been broken. In the second part of the study, a road map based on a provable secure driven design approach is presented for future studies to avoid such problems.

Highlights

  • There are many successful applications of chaotic systems, as there are theoretically strong relations between chaos theory and many branches of science [38]

  • The researchers claimed that new image encryption algorithms could be designed using the strong theoretical relationship between chaos and cryptography [1]–[3], [7]–[17], [19], [8], [24]–[26], [30], [31], [36]

  • Özkaynak: Security Problems of Chaotic Image Encryption Algorithms and the critical points to be considered in the analysis process are explained step by step

Read more

Summary

INTRODUCTION

There are many successful applications of chaotic systems, as there are theoretically strong relations between chaos theory and many branches of science [38]. The number of chaos based image encryption algorithms published in the last two years in IEEE Access journal is 15 [1]–[3], [7]–[17], [19], [30]. It has not been shown how analyzed algorithms could be broken. Özkaynak: Security Problems of Chaotic Image Encryption Algorithms and the critical points to be considered in the analysis process are explained step by step . The obtained results in the last section have been interpreted and recommendations have been made for future studies

CRYPTOGRAPHIC DESIGN PROCESS
SECURITY PROBLEMS OF ZHU AND SUN IMAGE ENCRYPTION ALGORITHM
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.