Article
Computer Science, Information Systems
Shuqin Zhu, Congxu Zhu, Xiujuan Li
Summary: This paper proposes a more efficient attack method on an image encryption algorithm with permutation-cyclic shift-pixel diffusion structure. The security of the original algorithm relies solely on the equivalent key streams, which can be decoded using chosen-plaintext attack. The proposed attack strategy is verified through theoretical analysis and simulation experiments. An improved algorithm is also presented to enhance the encryption effect and resist chosen-plaintext attacks.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Hongjie He, Yuan Yuan, Yuyun Ye, Heng-Ming Tai, Fan Chen
Summary: This article proposes a JPEG image encryption scheme with adaptive key and run consistency of MCUs, and presents a chosen-plaintext attack (CPA) on this encryption scheme. The adaptive key can be reproduced from the encrypted image, enabling the construction of plaintext images with the same adaptive key. The existence of run consistency of MCUs between the original image and the encrypted image facilitates rapid estimation, and a single swap for the runs of MCUs with RCM is designed to improve estimation accuracy. Detailed cryptanalytic results indicate that this encryption scheme can only be used for perceptual encryption and does not provide content protection for digital images. Furthermore, applications of the CPA to break other encryption schemes with RCM are presented.
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION
(2023)
Article
Physics, Multidisciplinary
Shuqin Zhu, Congxu Zhu
Summary: This paper presents a more efficient attack method on an image fusion encryption algorithm based on DNA operation and hyperchaos. The proposed chosen-plaintext attack can break the encryption scheme with fewer chosen-plaintext images compared to previous cracking algorithms, and its effectiveness is supported by theoretical analysis and experimental results.
Article
Physics, Multidisciplinary
Chengrui Zhang, Junxin Chen, Dongming Chen
Summary: This paper proposes an image encryption scheme based on a 2D hyperchaotic map and breaks this scheme with chosen-plaintext and chosen-ciphertext attacks. The feasibility of the attack methods is confirmed through theoretical derivations and experimental results. The attack time is relatively short and applicable to images of various sizes.
Article
Optics
Amit Arora, Rajendra K. Sharma
Summary: The Skew Tent Map (STM) has been enhanced for designing an image encryption scheme, but was found to be vulnerable to a known plain-text attack (KPA). By improving the scheme, it is able to resist KPA while maintaining its original properties.
Article
Computer Science, Information Systems
Noor Munir, Majid Khan, Abd Al Karim Haj Ismail, Iqtadar Hussain
Summary: The study introduces an encryption technique based on chaotic maps and Brownian motion, claiming security through statistical analysis, but vulnerabilities were exposed through cryptographic attacks. An improved scheme is proposed using different maps and Brownian motion to enhance security levels.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Optics
Kang Yi, Zhang Leihong, Ye Hualong, Zhang Dawei
Summary: The proposed optical hybrid encryption scheme based on compressive temporal ghost imaging combines public key cryptography and chaotic modulation, solving the key distribution issue in traditional ghost imaging encryption schemes and reducing the cost of establishing private channels, while enhancing system security.
APPLIED PHYSICS B-LASERS AND OPTICS
(2021)
Article
Optics
Lin Zhang, Shanshan Lin, Qingming Zhou, Jidong Xue, Bijun Xu, Xiaogang Wang
Summary: We propose a speckle-based optical encryption scheme using complex-amplitude coding and deep learning, allowing encryption and decryption of complex-amplitude plaintext with amplitude and phase images. A Y-shaped convolutional network (Y-Net) model is trained to establish the mapping relationship between the plaintext and ciphertext. Experimental results demonstrate the feasibility and effectiveness of our method, showcasing the potential of integrating speckle encryption and deep learning for optical complex-amplitude encryption.
Article
Chemistry, Multidisciplinary
Jintao Rao, Zhe Cui
Summary: This paper proposes a new method for chosen plaintext power analysis of the SM4 algorithm, which combines the differential characteristics of the S-box. By using the second and fourth round S-box outputs as attack points, the key can be recovered from the differential characteristics of the S-box. This analysis reduces the number of attack rounds to two, significantly improving the feasibility of the attack.
APPLIED SCIENCES-BASEL
(2022)
Article
Physics, Multidisciplinary
Haiju Fan, Chenjiu Zhang, Heng Lu, Ming Li, Yanfang Liu
Summary: A new chaotic image encryption technique based on multiple discrete dynamic maps was proposed recently, claiming to provide excellent privacy for traditional digital images. However, through cryptanalysis, it was found that there is no strong correlation between the key and the plain image, leading to the collapse of the cryptosystem. As a result, two chosen-plaintext attack methods were proposed to break the encryption system, requiring a certain number of pairs of plain and cipher images. Simulation results showed the effectiveness of these two schemes.
Article
Optics
Shuixin Pan, Meihua Liao, Wenqi He, Yueqiang Zhang, Xiang Peng
Summary: This study proposes a novel method to attack a PTFT-based cryptosystem using an untrained neural network (UNN) model, optimized with the physical encryption model of the system. By avoiding the reliance on large training datasets, the proposed approach can retrieve high-quality plaintext from only one ciphertext. The numerical simulations demonstrate the feasibility and effectiveness of this method, offering a new avenue for optical cryptanalysis.
Article
Optics
Xigogang Wang, Wenqi Wang, Haoyu Wei, Bijun Xu, Chaoqing Dai
Summary: This study combines holographic method and deep learning technique for optical encryption, encrypting a secret image into a synthetic CGH using a non-iterative process and considering steganography for improved security. Experimental results show that using a DenseNet network model can quickly output high-quality original secret images.
Article
Computer Science, Information Systems
Musheer Ahmad, Mohammad Najam Doja, Mirza Mohd Sufyan Beg
Summary: The study investigated an image cryptosystem based on permutation only cipher and hyperchaotic systems, revealing serious security defects that make it unfit for practical applications.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2021)
Article
Computer Science, Information Systems
Heping Wen, Ruiting Chen, Jieyi Yang, Tianle Zheng, Jiahao Wu, Wenxing Lin, Huilin Jian, Yiting Lin, Linchao Ma, Zhen Liu, Chongfu Zhang
Summary: This study conducts a cryptographic security analysis on a color image encryption algorithm, finding that the algorithm can be completely cracked by a chosen-plaintext attack method due to equivalent keys and simplified linear transformation. Experimental results confirm the effectiveness and efficiency of our method.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Optics
Huazheng Wu, Qi Li, Xiangfeng Meng, Xiulun Yang, Shoupei Liu, Yongkai Yin
Summary: This paper discusses optical cryptanalysis based on deep learning and points out the limitations of existing methods. By preprocessing ciphertext information and utilizing physical knowledge deep learning methods, the generalization ability has been improved and the image size limitation of traditional methods has been overcome.