Improved Cryptanalysis of CMC Chaotic Image Encryption Scheme

Full Text (PDF, 100KB), PP.39-45

Views: 0 Downloads: 0

Author(s)

Jiansheng Guo 1,* Lei Zhang 1

1. Zhengzhou Information Science and Technology Institute, Zhengzhou, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2010.02.06

Received: 6 Sep. 2010 / Revised: 12 Oct. 2010 / Accepted: 11 Nov. 2010 / Published: 8 Dec. 2010

Index Terms

Cryptanalysis, Equivalent key attack algorithm, Image encryption, Chaotic cipher

Abstract

Recently, chaos has attracted much attention in the field of cryptography. To study the security with a known image of a symmetric image encryption scheme, the attack algorithm of equivalent key is given. We give the known image attacks under different other conditions to obtain the equivalent key. The concrete step and complexity of the attack algorithm is given. So the symmetric image encryption scheme based on 3D chaotic cat maps is not secure.

Cite This Paper

Jiansheng Guo,Lei Zhang, "Improved Cryptanalysis of CMC Chaotic Image Encryption Scheme", IJIGSP, vol.2, no.2, pp.39-45, 2010. DOI: 10.5815/ijigsp.2010.02.06

Reference

[1]Chen G,Mao Y, Chui C.K. “A symmetric image encryption scheme based on 3D chaotic Cat maps”. Chaos, Solitons and Fractals .2004;21(7):749-761.

[2]C. P. Wu, C.C.J.Kuo. “Design of integrated multimedia compression and encryption systems”, IEEE Transactions on Mulimedia. 2006, 7(5): 828-839.

[3]N. Pareek, V. Patidar, K. Sud. “Image encryption using chaotic logistic map”, Image and Vision Computing. 2006, 24(9): 926-934.

[4]K. L. Chung, L. C. Chang. “Large encryption binary images with higher security”, Pattern Recognition Letter, 1998, 19(5-6), 461-468.

[5]J. Fridrich. “Sysmetric cipher based on two-dimensional chaotic maps”, Chaos, Solitions & Fractals, 2004, 21(3): 749-761.

[6]A. Pisarchik, N. Flores-Carmona, M. Carpio-Valadez. “Encryption and decryption of images with chaotic map lattices ”, Chaos16, 2006.

[7]N. Bourbakis, C. Alexopoulos. “Picture data encryption using scan patterns,” Pattern Recognition, 1992, 25(6):567-583.

[8]R. A. J. Matthews. “On the derivation of a chaotic encryption algorithm”, Cryptologia, 1989, 13(1): 29-42.

[9]Fridrich J. “Image encryption based on chaotic maps”, IEEE International Conference on Systems, Man, and Cybernetics, 1997, 1105-1110.

[10]Guo Jiansheng et al. Attack with known image to a symmetric image encryption scheme (in chinese). CCFTC 2006, 2006,16:361-369.

[11]Pan chengdong, Pan chengbiao. “Elementaty number theoty” (in chinese). Beijing: Beijing university press. 2001, 151-176.

[12]Shujun Li, Xuanqin Mou, Zhen Ji, Jihong Zhang. “Cryptanalysis of a class of chaotic stream ciphers” (in chinese). Journal of Electronics & Information Technology. 2003,25(4):473-479.

[13]Frey D R. Chaotic Digital Encoding: An approach to secure communication. IEEE Trans on CAS q,1993, 40(10): 660- 666.

[14]Hong Zhou, Jun Yu, and Xieting Ling. “Theoretical design of chaotic feed forward stream cipher”. Acta Electronic Sinica, 1998,26(1):98-101.

[15]Ding Wenxia, Lu Huanzhang, Wang Hao el at. “Fast gray code sequence subsection scrambling video encryption algorithm based on chaos system” (in chinese). Journal on Communications. 2007, 28(9): 34-39.

[16]Xu Shujiang, Wang Jizhi. “An improved block cryptosystem based on iterating chaotic map” (in chinese). Chinese Journal of Physics. 2008,57(1):37-41.