DSpace Repository

Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion

Show simple item record

dc.contributor.author Farajallah, Mousa
dc.contributor.author El Assad, Safwan
dc.contributor.author Déforges, Olivier
dc.date.accessioned 2022-01-18T12:00:19Z
dc.date.accessioned 2022-05-22T08:56:36Z
dc.date.available 2022-01-18T12:00:19Z
dc.date.available 2022-05-22T08:56:36Z
dc.date.issued 2018-11-10
dc.identifier.uri http://localhost:8080/xmlui/handle/123456789/8447
dc.description.abstract In the recent literature, many research studies have proven that Known and Chosen plaintext attacks are very efficient tools that are widely used to cryptanalyze partially or completely some chaos-based and non-chaos cryptosystems. In this paper, we addressed some weaknesses in the first Zhang et al., cryptosystem “An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion”. First, we analyzed the encryption process of Zhang et al., and we found that the non-linear diffusion process can be removed because its argument is present in the ciphered image. Then, based on this observation we derived a partial cryptanalysis equation that removes the effect of the diffusion function and accordingly permits to recover the permuted version of the ciphered image. As a result of the previous operation, the brute-force attack became more suitable. In addition, we mounted a chosen plaintext attack based on a proposed chosen plain image. Consequently, the encryption key space is reduced or recovered for one round, also, the average values of NPCR and UCAI randomness parameters become small compared to the optimal values, and moreover, they are very low for specific pixel position attacks. en_US
dc.language.iso en en_US
dc.publisher Multimedia Tools and Applications-Springer US en_US
dc.relation.ispartofseries ;https://doi.org/10.1007/s11042-018-6015-4
dc.subject Cryptanalysis en_US
dc.subject Chosen plain-text attack en_US
dc.subject Chaos-based cryptosystem en_US
dc.subject Diffusion effect en_US
dc.subject Brute force attack en_US
dc.subject Key space en_US
dc.title Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account