Abstract
Recently, a colour image encryption algorithm based on chaos was proposed by cascading two position permutation operations and one substitution operation, which are all determined by some pseudo-random number sequences generated by iterating the logistic map. This paper evaluates the security level of this encryption algorithm and finds that the position permutation-only part and the substitution part can be separately broken with only ⌈(log2(3MN))/8⌉ and 2 chosen plain-images, respectively, where MN is the size of the plain-image. The effectiveness of the proposed chosen-plaintext attack is supported by concise theoretical analyses, and is verified by experimental results.
Similar content being viewed by others
Notes
To make the presentation more concise and complete, some notations in the original paper [19] are modified under the condition that the essential form of the encryption algorithm remains unchanged.
References
Álvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos Appl. Sci. Eng. 16(8), 2129–2151 (2006)
Arroyo, D., Diaz, J., Rodriguez, F.B.: Cryptanalysis of a one round chaos-based substitution permutation network. arXiv:1203.6866 (2012)
Arroyo, D., Rhouma, R., Alvarez, G., Li, S., Fernandez, V.: On the security of a new image encryption scheme based on chaotic map lattices. Chaos 18(3), 033112 (2008)
Chen, F., Wong, K.W., Liao, X., Xiang, T.: Period distribution of generalized discrete Arnold cat map for N=pe. IEEE Trans. Inf. Theory 58(1), 445–452 (2012)
Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)
Chen, J., Zhou, J., Wong, K.W.: A modified chaos-based joint compression and encryption scheme. IEEE Trans. Circuits Syst. II 58(2), 110–114 (2011)
Hardy, G.H., Wright, E.M.: An Introduction to the Theory of Numbers, 6th edn. Oxford University Press, Oxford (2008)
Jakimoski, G., Subbalakshmi, K.: Cryptanalysis of some multimedia encryption schemes. IEEE Trans. Multimed. 10(3), 330–338 (2008)
Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G., Chen, G.: On the security defects of an image encryption scheme. Image Vis. Comput. 27(9), 1371–1381 (2009)
Li, C., Li, S., Chen, G., Halang, W.A.: Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis. Comput. 27(8), 1035–1039 (2009)
Li, C., Li, S., Zhang, D., Chen, G.: Cryptanalysis of a data security protection scheme for VoIP. IEE Proc., Vis. Image Signal Process. 153(1), 1–10 (2006)
Li, C., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91(4), 949–954 (2011)
Li, S., Li, C., Chen, G., Bourbakis, N.G., Lo, K.T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. Image Commun. 23(3), 212–223 (2008)
Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Process. 15(7), 2061–2075 (2006)
Seyedzadeh, S.M., Mirzakuchaki, S.: A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process. 92(5), 1202–1215 (2012)
Solak, E., Cokal, C., Yildiz, O.T., Biyikoglu, T.: Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurc. Chaos Appl. Sci. Eng. 20(5), 1405–1413 (2010)
Stutz, T., Uhl, A.: A survey of H.264 AVC/SVC encryption. IEEE Trans. Circuits Syst. Video Technol. 22(3), 325–339 (2012)
Tong, X., Cui, M.: Image encryption scheme based on 3d baker with dynamical compound chaotic sequence cipher generator. Signal Process. 89(4), 480–491 (2009)
Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101–1108 (2012)
Wang, X.Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron mode. Nonlinear Dyn. 62(3), 615–621 (2010)
Zhang, Y., Li, C., Li, Q., Zhang, D., Shu, S.: Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 69(3), 1091–1096 (2012)
Zhou, J., Au, O.C., Wong, P.H.W.: Adaptive chosen-ciphertext attack on secure arithmetic coding. IEEE Trans. Signal Process. 57(5), 1825–1838 (2009)
Acknowledgements
This research was supported by the National Natural Science Foundation of China (Nos. 61100216, 61202398), Scientific Research Fund of Hunan Provincial Education Department (Nos. 11B124, 2011FJ2011), and Start-up Fund of Xiangtan University (No. 10QDZ40).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, C., Zhang, L.Y., Ou, R. et al. Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn 70, 2383–2388 (2012). https://doi.org/10.1007/s11071-012-0626-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-012-0626-5