Abstract
Cryptanalysis is significant for the design of secure image cryptosystem. Recently, a chaotic image encryption scheme using two rounds of Latin square-based permutation and diffusion was proposed. Although two-round encryption is used, the cryptosystem has still been cracked successfully by the combined attack using both chosen-plaintext attack (CPA) and chosen-ciphertext attack due to the inherent flaw that the same key was used in both permutation and diffusion phases of each round. Therefore, different keys are used in each encryption phase of the improved cryptosystem. However, in this paper, we further attacked the two-round encryption with different keys using only CPA. By counting the number of the diffused pixels in the first diffusion phase from the processed encrypted image, the first permutation of one pixel is confirmed, and then the whole equivalent key stream of the first permutation can be obtained by limited CPA. Based on this, the key stream of the third permutation phase is obtained in a similar way. Meanwhile, all the mappings of the fourth diffusion are collected by 256 CPA, and 17 possible mappings in average are selected by verification. Finally, the key stream of the second diffusion is obtained using two pairs of chosen images. Experiments show that the encrypted image can be cracked successfully by the proposed attack. This work is instructive to the cryptanalysis of multi-round encryption. In order to remedy the security weakness, an improved cryptosystem is also proposed, followed by thorough security analysis.
Similar content being viewed by others
References
Özkaynak, F.: Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn. 92(2), 305–313 (2018)
Li, C.Q., Xie, T., Liu, Q., Cheng, G.: Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn. 78(2), 1545–1551 (2014)
Li, X., Wang, Y., Wang, Q.H., Liu, Y., Zhou, X.: Modified integral imaging reconstruction and encryption using an improved SR reconstruction algorithm. Opt. Lasers Eng. 112, 162–169 (2019)
Li, C.Q., Lin, D.D., Feng, B.B., Lü, J.H., Hao, F.: Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6, 75834–75842 (2018)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8(6), 1259–1284 (1998)
Zhang, W., Yu, H., Zhao, Y.L., Zhu, Z.L.: Image encryption based on three-dimensional bit matrix permutation. Signal Process. 118, 36–50 (2016)
Chen, J.X., Zhu, Z.L., Yu, H.: A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme. Optik 125(11), 2472–2478 (2014)
Zhang, W., Wong, K.W., Yu, H., Zhu, Z.L.: A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun. Nonlinear Sci. Numer. Simul. 18(3), 584–600 (2013)
Chen, G.R., Mao, Y.B., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. J. Chaos Solitons Fractals 21(3), 749–761 (2004)
Parvin, Z., Seyedarabi, H., Shamsi, M.: A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed. Tools Appl. 75(17), 10631–10648 (2016)
He, X.P., Zhu, Q.S., Gu, P.: A new chaos-based encryption method for color image. In: Proceedings of the International Conference on Rough Sets and Knowledge Technology, Chongquing, China, pp. 671–678 (2006)
Yang, Y.G., Pan, Q.X., Sun, S.J., Xu, P.: Novel image encryption based on quantum walks. Sci. Rep. 5, 7784 (2015)
Liu, H.J., Kadir, A., Sun, X.B.: Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Process. 11(5), 324–332 (2017)
Liu, H.J., Kadir, A., Sun, X.B., Li, Y.L.: Chaos based adaptive double-image encryption scheme using hash function and S-boxes. Multimed. Tools Appl. 77(1), 1391–1407 (2018)
Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.R.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed. Tools Appl. 71(3), 1469–1497 (2014)
Zhu, H.G., Zhao, C., Zhang, X.D., Yang, L.P.: An image encryption scheme using generalized Arnold map and affine cipher. Optik 125(22), 6672–6677 (2014)
Liu, H.J., Kadir, A.: Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process. 113, 104–112 (2015)
Li, M., Guo, Y.Z., Huang, J., Li, Y.: Cryptanalysis of a chaotic image encryption scheme based on permutation–diffusion structure. Signal Process. Image Commun. 62, 164–172 (2018)
Li, C.Q., Lin, D.D., Lü, J.H., Hao, F.: Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimed. 25(4) (2018). https://doi.org/10.1109/MMUL.2018.2873472
Zhang, L.Y., Liu, Y.S., Pareschi, F., Zhang, Y.S., Wong, K.W., Rovatti, R., Setti, G.: On the security of a class of diffusion mechanisms for image encryption. IEEE Trans. Cybern. 48(4), 1–13 (2018)
Li, C.Q., Lin, D.D., Lü, J.H.: Cryptanalyzing an image scrambling encryption algorithm of pixel bits. IEEE Multimed. 24(3), 64–71 (2017)
Solak, E., Yildiz, O.T.: Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurcat. Chaos 20, 1405–1413 (2010)
Li, C.Q.: Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process. 118(C), 203–210 (2016)
Li, C.Q., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91(4), 949–954 (2011)
Liu, Y.S., Zhang, L.Y., Wang, J., Zhang, Y.S., Wong, K.W.: Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure. Nonlinear Dyn. 84(4), 1–10 (2015)
Xie, E.Y., Li, C.Q., Yu, S.M., Lü, J.H.: On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process. 132, 150–154 (2016)
Zhang, Y.S., Xiao, D., Wen, W.Y., Li, M.: Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Nonlinear Dyn. 76(3), 1645–1650 (2014)
Li, C.Q., Liu, Y.S., Zhang, L.Y., Wong, K.W.: Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem. Signal Process. Image Commun. 29(8), 914–920 (2014)
Li, C.Q., Liu, Y.S., Xie, T., Chen, M.Z.Q.: Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dyn. 73(3), 2083–2089 (2013)
Chai, X., Fu, X., Gan, Z., Lu, Y., Chen, Y.: A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 155, 44–62 (2019)
Zhu, C.X., Wang, G.J., Sun, K.H.: Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D chaotic maps. Entropy 20(11), 843 (2018)
Wang, M.X., Wang, X.Y., Zhang, Y.Q., Gao, Z.G.: A novel chaotic encryption scheme based on image segmentation and multiple diffusion models. Opt. Laser Tecnnol. 108, 558–573 (2018)
Hua, Z., Yi, S., Zhou, Y.: Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 144, 134–144 (2018)
Hu, G.Q., Xiao, D., Wang, Y., Li, X.Y.: Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion. Nonlinear Dyn. 88(2), 1305–1316 (2017)
Chen, J.X., Zhu, Z.L., Fu, C., Zhang, L.B., Zhang, Y.S.: An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn. 81(3), 1151–1166 (2015)
Belazi, A., Abd Ellatif, A.A., Belghith, S.: A novel image encryption scheme based on substitution–permutation network and chaos. Signal Process. 128, 155–170 (2016)
Acknowledgements
This work was supported by the National Natural Science Foundation of China (Grant Nos. 61602158, U1604156, U1604154), the Science Foundation for the Excellent Youth Scholars of Henan Normal University (Grant No. YQ201607), and the Science and Technology Research Project of Henan Province (Grant No. 182102210374).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, M., Lu, D., Xiang, Y. et al. Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion. Nonlinear Dyn 96, 31–47 (2019). https://doi.org/10.1007/s11071-019-04771-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-019-04771-7