2019
DOI: 10.1007/s11071-019-04771-7
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 61 publications
(22 citation statements)
references
References 35 publications
0
22
0
Order By: Relevance
“…2020, 10, x 2 of 11 diffusion was proposed, which has weak security defects. However, Ming Li et al find out the equivalent key streams and attacked the scheme in [33] and attacked the scheme. However, most chaotic maps, used in generating the security key in encryption process, are multi-dimensional, which cause high level computation complexity.…”
Section: Review Of the Original Schemementioning
confidence: 99%
See 1 more Smart Citation
“…2020, 10, x 2 of 11 diffusion was proposed, which has weak security defects. However, Ming Li et al find out the equivalent key streams and attacked the scheme in [33] and attacked the scheme. However, most chaotic maps, used in generating the security key in encryption process, are multi-dimensional, which cause high level computation complexity.…”
Section: Review Of the Original Schemementioning
confidence: 99%
“…In [32], an improved chaotic image encryption method using Latin square based on two rounds of permutation-diffusion 2 of 10 was proposed, which has weak security defects. However, Ming Li et al find out the equivalent key streams and attacked the scheme in [33] and attacked the scheme.…”
Section: Introductionmentioning
confidence: 99%
“…The two commonly used confusion algorithms are: performing row and column confusion on a image, and reshaping a two-dimensional image into a vector, and then performing position confusion on it [17][18][19]. The basic diffusion methods are based on an XOR operation or mod operation after addition [20,21].…”
Section: Introductionmentioning
confidence: 99%
“…Up to now, a large number of image cryptosystems based on chaotic systems have been found to be unsafe [24,25,26,27,28,29,30,31]. These cryptosystems cannot resist chosen/known plaintext attacks [32,33,34,35,36,37,38,39,40,41] because they possess plaintext-unrelated equivalent keys. A chosen plaintext attack method in [32] cracked the scheme in [24] with only 18 attacks for 256×256-sized images.…”
Section: Introductionmentioning
confidence: 99%
“…Then they suggested an improved scheme based on [28]. However, this improved scheme [35] is still unable to resist the chosen plaintext attack method described in [37]. In [38], Ma et al cracked the image cryptosystem in [29] using the chosen plaintext attack method with only 14 pairs of plaintext and cipher-text images for the 256×256-sized images.…”
Section: Introductionmentioning
confidence: 99%