4.7 Article

Cryptanalysis of Image Ciphers With Permutation-Substitution Network and Chaos

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCSVT.2020.3021908

Keywords

Ciphers; Encryption; Chaos; Kernel; Streaming media; Chosen-ciphertext attack; permutation substitution; bit-wise XOR; image encryption

Funding

  1. National Natural Science Foundation of China [61802055, 61771121]
  2. Science and Technology Development Fund, Macau SAR [189/2017/A3]
  3. University of Macau [MYRG201800136-FST]

Ask authors/readers for more resources

The introduction of chaos in image encryption has attracted global attention in recent years, but some chaotic image ciphers are at risk of cryptanalysis. This article evaluates the security of a family of image ciphers and reveals that weaknesses cannot be remedied by common enhancements, and presents a chosen-ciphertext attack to break 12 ciphers.
In recent decades, the introduction of chaos to image encryption has drawn worldwide attention. The permutation-substitution architecture has been widely applied, and chaotic systems are generally employed to produce the required encryption elements. Although many security assessment tests have been conducted, some chaotic image ciphers are being cryptanalyzed. In this article, we evaluate the security of a family of image ciphers whose encryption kernel consists of a bit-level or pixel-level permutation and a bit-wise exclusive OR substitution. After investigating the intrinsic linearity inside the outfitted structures and encryption techniques, we find that each ciphertext-plaintext pair can be represented as a combination of a set of ciphertext-plaintext bases. A chosen-ciphertext attack is proposed to construct the ciphertext-plaintext bases rather than the traditional solution to retrieve equivalent encryption elements. We further reveal that such weakness cannot be remedied by common enhancements such as more chaotic dynamics, complex permutation methods, and random pixel insertion during encryption. In addition, applications of the proposed attack to break 12 ciphers are theoretically presented and experimentally verified.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available