Cryptanalysis of an Enhanced Sub-image Encryption Method

The paper presents a cryptanalysis of an enhanced sub-image encryption method recently proposed by Wang et al. in Optics and Lasers in Engineering 86(2016). Their paper shows that a parallel sub-image encryption method proposed by Mirzaei et al. in Nonlinear Dyn. 67(2012) could be attacked by chosen plaintext attack and proposed an enhanced sub-image encryption method claimed to completely resist the chosen plaintext attack. However, the enhanced sub-image encryption method also has some weakness, such as the key streams are independent with the plain-image. In this paper, one chosen plaintext attack type of cryptanalysis is presented for the enhanced sub-image encryption method and completely broken the enhanced sub-image encryption method. The experimental results indicate that the enhanced sub-image encryption method is weak against chosen plaintext attack and should be improved for practical application.

[1]  Wolfgang A. Halang,et al.  Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm , 2007, ArXiv.

[2]  Safya Belghith,et al.  Breaking an image encryption scheme based on a spatiotemporal chaotic system , 2015, Signal Process. Image Commun..

[3]  M. Yaghoobi,et al.  A new image encryption method: parallel sub-image encryption with hyper chaos , 2011, Nonlinear Dynamics.

[4]  Ruisong Ye,et al.  A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism , 2011 .

[5]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[6]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[7]  Robert M. May,et al.  Simple mathematical models with very complicated dynamics , 1976, Nature.

[8]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[9]  Xingyuan Wang,et al.  An enhanced sub-image encryption method , 2016 .

[10]  Guanrong Chen,et al.  YET ANOTHER CHAOTIC ATTRACTOR , 1999 .

[11]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .

[12]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[13]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[14]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[15]  Safya Belghith,et al.  Cryptanalysis of a multi-chaotic systems based image cryptosystem , 2010 .

[16]  Jinhu Lu,et al.  On Cryptanalysis of Fridrich's chaotic image encryption scheme , 2016, ArXiv.

[17]  Gang Chen,et al.  Cryptanalysis of a New Signal Security System for Multimedia Data Transmission , 2005, EURASIP J. Adv. Signal Process..