Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher

Recently Panduranga et al. suggested an image encryption algorithm based on permutation-substitution architecture using chaotic map and Latin square. According to the proposal, the pixels of plain-image are firstly scrambled according to permutation vector, extracted from chaotic sequence, in permutation phase. In substitution phase, the permuted image is substituted by XOR operation with key image generated from a keyed Latin square. The algorithm has the ability to adapt and encrypt any plain-image with unequal width and height. Moreover, it also exhibits the features of high entropy, low pixels correlation, large key space, high key sensitivity, etc. However, a careful analysis of Panduranga et al. algorithm unveils few security flaws which make it susceptible to cryptographic attack. In this paper, we analyze its security and proposed a chosen plaintext-attack to break the algorithm completely. It is shown that the plain-image can be successfully recovered without knowing the secret key. The simulation of proposed attack demonstrates that Panduranga et al. algorithm is not at all secure for practical encryption of sensitive digital images.

[1]  Safya Belghith,et al.  Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .

[2]  Rhouma Rhouma,et al.  Cryptanalysis of a new image encryption algorithm based on hyper-chaos , 2008 .

[3]  Xingyuan Wang,et al.  Cryptanalysis of an image encryption algorithm using Chebyshev generator , 2014, Digit. Signal Process..

[4]  Safya Belghith,et al.  Cryptanalysis of a spatiotemporal chaotic cryptosystem , 2009 .

[5]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[6]  H. T. Panduranga,et al.  Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher , 2014 .

[7]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[8]  Safya Belghith,et al.  Security analysis of image cryptosystems only or partially based on a chaotic permutation , 2012, J. Syst. Softw..

[9]  Sos S. Agaian,et al.  Design of image cipher using latin squares , 2014, Inf. Sci..

[10]  Gregory V. Bard,et al.  Algebraic Cryptanalysis , 2009 .

[11]  E. Solak,et al.  Cryptanalysis of a chaos-based image encryption algorithm , 2009 .

[12]  Sirma Yavuz,et al.  Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences , 2012 .

[13]  Musheer Ahmad,et al.  Cryptanalysis of Chaos Based Secure Satellite Imagery Cryptosystem , 2011, IC3.

[14]  Safya Belghith,et al.  Cryptanalysis of a multi-chaotic systems based image cryptosystem , 2010 .