Skip to main content
Log in

Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Since the first appearance in Fridrich’s design, the usage of permutation–diffusion structure for designing digital image cryptosystem has been receiving increasing research attention in the field of chaos-based cryptography. Recently, a novel chaotic image cipher using a single-round modified permutation–diffusion pattern (ICMPD) was proposed. Unlike traditional permutation–diffusion structure, the permutation of ICMPD is operated on bit level instead of pixel level and its diffusion stage is operated on masked pixels, which are obtained by carrying out the classical affine cipher, instead of plain pixels. Following a divide-and-conquer strategy, this paper reports that ICMPD can be compromised by a chosen-plaintext attack efficiently and the involved data complexity is linear to the size of the plain-image. Moreover, the relationship between the cryptographic kernel at the diffusion stage of ICMPD and the classical modulo addition then XORing operation is explored thoroughly.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. https://sites.google.com/site/leoyuzhang/.

  2. For simplicity, we slightly modify the permutation techniques described in [18] while keeping its security level unchanged.

  3. The adversary can choose \((\alpha , \beta )\) freely and be aware of the value of y in CPA assumption.

  4. The number of possible solutions of s that satisfy (a) s is coprime to 256 and (b) \(s \in [0, 128]\) is 64.

References

  1. Arroyo, D., Diaz, J., Rodriguez, F.B.: Cryptanalysis of a one round chaos-based substitution permutation network. Signal Process. 93(5), 1358–1364 (2013)

    Article  Google Scholar 

  2. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  3. Chen, J.X., Zhu, Z.L., Yu, H.: A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme. Opt.-Int. J. Light Electron. Opt. 125(11), 2472–2478 (2014)

    Article  Google Scholar 

  4. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8(06), 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  5. Gangadhar, C., Rao, K.D.: Hyperchaos based image encryption. Int. J Bifurc. Chaos 19(11), 3833–3839 (2010)

    Article  Google Scholar 

  6. Li, C., Chen, M.Z., Lo, K.T.: Breaking an image encryption algorithm based on chaos. Int. J Bifurc. Chaos 21(07), 2067–2076 (2011)

    Article  MATH  Google Scholar 

  7. Li, C., Liu, Y., Zhang, L.Y., Chen, M.Z.: Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation. Int. J Bifurc Chaos 23(04), 1–12 (2013)

    MathSciNet  MATH  Google Scholar 

  8. Li, C., Zhang, L.Y., Ou, R., Wong, K.W., Shu, S.: Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn. 70(4), 2383–2388 (2012)

    Article  MathSciNet  Google Scholar 

  9. Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.R.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed. Tools Appl. 71(3), 1469–1497 (2014)

    Article  Google Scholar 

  10. Rao, K., Gangadhar, C.: Modified chaotic key-based algorithm for image encryption and its VLSI realization. In: Proceedings of the 2007 15th international conference on digital signal processing, pp. 439–442 (2007)

  11. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

  12. Wang, X., Luan, D., Bao, X.: Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digit. Signal Process. 25, 244–247 (2014)

    Article  Google Scholar 

  13. Wong, K.W., Kwok, B.S.H., Law, W.S.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372(15), 2645–2652 (2008)

    Article  MATH  Google Scholar 

  14. Yang, Y.G., Pan, Q.X., Sun, S.J., Xu, P.: Novel image encryption based on quantum walks. Sci. Rep. 5(7784), 1–9 (2015). doi:10.10.1038/nphys1170

    Google Scholar 

  15. Zeng, L., Liu, R., Zhang, L.Y., Liu, Y., Wong, K.W.: Cryptanalyzing an image encryption algorithm based on scrambling and Veginre cipher. Multimed. Tools Appl. 1–15 (2015)

  16. Zhang, L.Y., Hu, X., Liu, Y., Wong, K.W., Gan, J.: A chaotic image encryption scheme owning temp-value feedback. Commun. Nonlinear Sci. Numer. Simul. 19(10), 3653–3659 (2014)

    Article  MathSciNet  Google Scholar 

  17. Zhang, W., Yu, H., Zhu, Z.L.: Color image encryption based on paired interpermuting planes. Opt. Commun. 338, 199–208 (2015)

    Article  Google Scholar 

  18. Zhu, H., Zhao, C., Zhang, X., Yang, L.: An image encryption scheme using generalized Arnold map and affine cipher. Opt.-Int. J. Light Electron Opt. 125(22), 6672–6677 (2014)

    Article  Google Scholar 

  19. Zhu, Z.L., Zhang, W., Wong, K.W., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6), 1171–1186 (2011)

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by the National Natural Science Foundation of China (No. 61502399).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leo Yu Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Y., Zhang, L.Y., Wang, J. et al. Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure. Nonlinear Dyn 84, 2241–2250 (2016). https://doi.org/10.1007/s11071-016-2642-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-016-2642-3

Keywords

Navigation