2020
DOI: 10.3390/e22050589
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and Improvement of a Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion

Abstract: In theory, high key and high plaintext sensitivities are a must for a cryptosystem to resist the chosen/known plaintext and the differential attacks. High plaintext sensitivity can be achieved by ensuring that each encrypted result is plaintext-dependent. In this work, we make detailed cryptanalysis on a published chaotic map-based image encryption system, where the encryption process is plaintext Image dependent. We show that some designing flaws make the published cryptosystem vulnerable to chosen-plaintext … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 23 publications
0
12
0
Order By: Relevance
“…But we have used this optimization algorithm on the image, which is more applicable. Method [33] uses a more advanced personal computer (PC) than us that is configured with Intel Core i7, 3.2 GHz processor, and 32 GB RAM. Hence, it takes less time to execute.…”
Section: Comparison With Existing State-of-the-art Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…But we have used this optimization algorithm on the image, which is more applicable. Method [33] uses a more advanced personal computer (PC) than us that is configured with Intel Core i7, 3.2 GHz processor, and 32 GB RAM. Hence, it takes less time to execute.…”
Section: Comparison With Existing State-of-the-art Methodsmentioning
confidence: 99%
“…For resisting KPA and differential attacks, the sensitivity of high key and high plaintext is essential. An improved algorithm was designed by Lin and Wu [33] for analyzing the existing cryptographic methods based on chaotic maps and resisting the CPA. Here, the plaintext image is dependent on image encryption.…”
Section: Literature Studymentioning
confidence: 99%
“…With the improvement of cryptanalysis and design level, it is becoming increasingly difficult to decipher encryption algorithms. However, some algorithms are insecure against various common cryptanalysis methods [ 20 , 21 , 22 , 23 , 24 , 25 , 26 ]. Huang et al [ 20 ] presented a simple color image encryption algorithm, in which the permutation process and diffusion process are all related to plaintext.…”
Section: Introductionmentioning
confidence: 99%
“…The authors claimed that the algorithm could resist chosen- or known-plaintext attacks efficiently. However, in 2020, Lin et al [ 21 ] found that Huang et al’s algorithm [ 20 ] could not resist chosen-plaintext attacks and they proposed an enhanced algorithm to overcome the flaw. Diab and El-semary [ 22 ] broke an image encryption algorithm presented by Chen et al [ 23 ].…”
Section: Introductionmentioning
confidence: 99%
“…Chaotic systems have long been a subject of concern in academic and industrial fields [ 1 , 2 ]. Due to the advantages of the ergodicity, unpredictability, pseudo-randomness and initial value sensitivity [ 3 , 4 ], chaotic systems fit well to various chaos-based image encryptions [ 5 , 6 ] and secure communications [ 7 ].…”
Section: Introductionmentioning
confidence: 99%