Article
Computer Science, Information Systems
Zakaria Tolba, Makhlouf Derdour, Mohamed Amine Ferrag, S. M. Muyeen, Mohamed Benbouzid
Summary: This paper proposes a deep learning-based decryptor for investigating permutation primitives used in multimedia block cipher encryption algorithms. By maximizing information extraction using ciphertext pair aspects and utilizing convolutional neural network features to discover correlations among permutable atoms, plaintext can be extracted from ciphered text without any prior P-box expertise. The study also demonstrates the feasibility of using the proposed model for deep learning-based differential cryptanalysis development, even without prior cryptographic knowledge.
Article
Computer Science, Information Systems
Heping Wen, Ruiting Chen, Jieyi Yang, Tianle Zheng, Jiahao Wu, Wenxing Lin, Huilin Jian, Yiting Lin, Linchao Ma, Zhen Liu, Chongfu Zhang
Summary: This study conducts a cryptographic security analysis on a color image encryption algorithm, finding that the algorithm can be completely cracked by a chosen-plaintext attack method due to equivalent keys and simplified linear transformation. Experimental results confirm the effectiveness and efficiency of our method.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Engineering, Mechanical
Wanqing Wu, Qiao Wang
Summary: Cryptanalysis plays a crucial role in the design of image cryptographic systems. In this study, a two-round image cryptographic system was analyzed and found to have vulnerabilities that allowed successful decryption of encrypted images through chosen-plaintext attacks. The encryption scheme was improved to enhance security, and the improved system demonstrated better resilience against chosen-plaintext attacks while maintaining the same encryption performance as the original scheme.
NONLINEAR DYNAMICS
(2023)
Article
Mathematics, Interdisciplinary Applications
Adelaide Nicole Kengnou Telem, Cyrille Feudjio, Balamurali Ramakrishnan, Hilaire Bertrand Fotsin, Karthikeyan Rajagopal
Summary: In this paper, a new and simple image encryption method is proposed, which utilizes an external secret key of 128 bits and an internal secret key. The novelty lies in the methods used to extract the internal key and apply the zigzag, affine transformation, and substitution-diffusion processes. Experimental results show that the proposed encryption scheme provides good statistical and diffusion properties, and can resist various attacks, making it suitable for real-time encryption and transmission of biomedical images in telemedicine.
Article
Computer Science, Hardware & Architecture
Debranjan Pal, Md Rasid Ali, Abhijit Das, Dipanwita Roy Chowdhury
Summary: This paper proposes a cluster-based parallel attack method for recovering the complete and partial keys in AES encryption, achieving superior results in terms of timing and success probability.
JOURNAL OF SUPERCOMPUTING
(2023)
Article
Computer Science, Information Systems
Noor Munir, Majid Khan, Abd Al Karim Haj Ismail, Iqtadar Hussain
Summary: The study introduces an encryption technique based on chaotic maps and Brownian motion, claiming security through statistical analysis, but vulnerabilities were exposed through cryptographic attacks. An improved scheme is proposed using different maps and Brownian motion to enhance security levels.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Chemistry, Multidisciplinary
Jintao Rao, Zhe Cui
Summary: This paper proposes a new method for chosen plaintext power analysis of the SM4 algorithm, which combines the differential characteristics of the S-box. By using the second and fourth round S-box outputs as attack points, the key can be recovered from the differential characteristics of the S-box. This analysis reduces the number of attack rounds to two, significantly improving the feasibility of the attack.
APPLIED SCIENCES-BASEL
(2022)
Article
Mathematics, Applied
Iqtadar Hussain, Amir Anees, Temadher Alassiry Al-Maadeed
Summary: In this paper, the research focuses on the investigation of semifield substitution boxes using permutation on a set of size 8 S8, and establishes an effective procedure for generating S-8 semifield substitution boxes with the same algebraic properties. The strength of the generated substitution boxes is further analyzed using well-known standards. As an application, an encryption algorithm is proposed based on substitution-permutation network and two different chaotic maps.
COMPUTATIONAL & APPLIED MATHEMATICS
(2023)
Article
Chemistry, Analytical
Rizk M. Rizk-Allah, Hatem Abdulkader, Samah S. Abd Elatif, Wail S. Elkilani, Eslam Al Maghayreh, Habib Dhahri, Awais Mahmood
Summary: This paper reveals a new state recovery attack against the RC4 stream cipher and proposes a hybrid PSOEO algorithm to enhance the solution accuracy and efficiency for global optimization problems.
Article
Computer Science, Information Systems
Musheer Ahmad, Mohammad Najam Doja, Mirza Mohd Sufyan Beg
Summary: The study investigated an image cryptosystem based on permutation only cipher and hyperchaotic systems, revealing serious security defects that make it unfit for practical applications.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2021)
Article
Computer Science, Information Systems
Temadher Alassiry Al-Maadeed, Iqtadar Hussain, Amir Anees, Muhammad Tahir Mustafa
Summary: This paper presents an image encryption algorithm based on chaotic maps and algebraic structure to enhance robustness and security. By combining Lorenz chaotic system, primitive irreducible polynomial substitution box, and chaotic maps, efficient encryption of images is achieved.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Firat Artuger, Fatih Ozkaynak
Summary: In today's digital society, new design alternatives are needed for substitution box structures to develop secure information systems. Random selection-based structures are a good alternative against attacks, but their low nonlinearity criterion is a problem that can be addressed using optimization algorithms.
INFORMATION SCIENCES
(2021)
Article
Physics, Multidisciplinary
Qinmao Jiang, Simin Yu, Qianxue Wang
Summary: This paper examines the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. Despite claims by the proposer, it was found that the algorithm is vulnerable to chosen plaintext attacks. The paper presents theoretical and experimental results to support the proposed attack's efficiency and provides suggestions for improvement.
Article
Physics, Multidisciplinary
Rong Huang, Hao Liu, Xiaojuan Liao, Aihua Dong
Summary: The paper proposes a reference-validation inference algorithm and design screening-based rules to efficiently break the image cryptosystem, requiring fewer pairs of chosen plain-cipher images compared to existing algorithms with stable performance. Experimental results demonstrate the effectiveness and superiority of the proposed cryptanalysis algorithm.
Article
Physics, Multidisciplinary
Shuqin Zhu, Congxu Zhu, Hanyu Yan
Summary: This article analyzes an image encryption algorithm and identifies its vulnerability. It is found that the equivalent key streams can be cracked through a chosen-plaintext attack, resulting in decoding the original chaotic encryption algorithm. Finally, an improved algorithm is proposed to overcome this defect, providing resistance against chosen-plaintext attacks and achieving the encryption effect of a one-time pad.