2021
DOI: 10.3390/e24010040
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of an Image Encryption Algorithm Based on Random Walk and Hyperchaotic Systems

Abstract: Recently, an image encryption algorithm based on random walk and hyperchaotic systems has been proposed. The main idea of the original paper is to scramble the plain image by means of random walk matrix and then to append diffusion. In this paper, the encryption method with security holes is analyzed by chosen plaintext attack. In addition, this paper improves the original encryption algorithm. The experimental and simulation results show that the improved algorithm has the advantages of the original and can i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…Te higher the NPCR value, the more resilient the encryption against diferential attacks [52]. Te NPCR ideal value is 99.6094% [53]. NPCR is found by [54][55][56].…”
Section: Number Of Pixels Changementioning
confidence: 99%
“…Te higher the NPCR value, the more resilient the encryption against diferential attacks [52]. Te NPCR ideal value is 99.6094% [53]. NPCR is found by [54][55][56].…”
Section: Number Of Pixels Changementioning
confidence: 99%
“…In the process of analyzing the security of the encryption algorithm, attackers try various methods to crack the algorithm and gradually develop some classic cryptanalysis methods. In [ 34 ], an encryption scheme based on a random walk matrix and a hyperchaotic system was cracked by the chosen plaintext attack method, and relevant suggestions were given for its security loopholes to improve the anti-attack capability; in [ 35 ], an image encryption algorithm combining DNA coding and a spatiotemporal chaotic system was analyzed; its equivalent key can be obtained by the chosen ciphertext attack method according to its defects, and it recovered the plaintext image; in [ 36 ], when a chaotic image encryption algorithm based on information entropy was cryptanalyzed for the effectiveness of quantifiable security measures, the differential attack method can be used to recover the equivalent key of each basic operation of the encryption algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…This makes the system significantly harder to crack, as breaking even a single key will only allow the attacker access to less than four bytes of data. This is critical for high-security systems, as methods have been introduced that can break a single-seed Lorenz system using synchronization methods [3], machine learning detection of initial conditions [4], or various other crypt-analysis techniques such as plaintext attacks [5][6][7]. With our implementation of frequently refreshed keys, our system is immune to plaintext and side-channel attacks that the predecessors fell victim to.…”
Section: Introductionmentioning
confidence: 99%