Security analysis of an audio data encryption scheme based on key chaining and DNA encoding

Fairly recently, a new encryption scheme for audio data encryption has been proposed by Naskar, P.K., et al. The cryptosystem is based on substitution-permutation encryption structure using DNA encoding at the substitution stage, in which the key generation is based on a key chaining algorithm that generates new key block for every plain block using a logistic chaotic map. After some several statistical tests done by the authors of the scheme, they claimed that their cryptosystem is robust and can resist conventional cryptanalysis attacks. Negatively, in this paper we show the opposite: the scheme is extremely weak against chosen ciphertext and plaintext attacks thus only two chosen plaintexts of 32 byte size are sufficient to recover the equivalent key used for encryption. The cryptosystem's shuffling process design is vulnerable which allow us recovering the unknown original plaintext by applying repeated encryptions. Our study proves that the scheme is extremely weak and should not be used for any information security or cryptographic concern. Lessons learned from this cryptanalytic paper are then outlined in order to be considered in further designs and proposals.

[1]  Chengqing Li,et al.  Cryptanalyzing image encryption using chaotic logistic map , 2013, Nonlinear Dynamics.

[2]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[3]  Jonathan Bath,et al.  Reversible logic circuits made of DNA. , 2011, Journal of the American Chemical Society.

[4]  Fatih Özkaynak,et al.  Brief review on application of nonlinear dynamics in image encryption , 2018, Nonlinear Dynamics.

[5]  Guanrong Chen,et al.  Cryptanalysis of RCES/RSES Image Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..

[6]  Chengqing Li,et al.  When an attacker meets a cipher-image in 2018: A Year in Review , 2019, J. Inf. Secur. Appl..

[7]  Gonzalo Alvarez,et al.  On the inadequacy of the logistic map for cryptographic applications , 2008 .

[8]  Jizhao Liu,et al.  A novel fast image encryption algorithm for embedded systems , 2019, Multimedia Tools and Applications.

[9]  Khalid Satori,et al.  Benchmarking AES and chaos based logistic map for image encryption , 2013, 2013 ACS International Conference on Computer Systems and Applications (AICCSA).

[10]  Rengarajan Amirtharajan,et al.  Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller , 2018, Microprocess. Microsystems.

[11]  I.W. Habib,et al.  Multimedia traffic characteristics in broadband networks , 1992, IEEE Communications Magazine.

[12]  Y. Bentoutou,et al.  Embedded implementation of multispectral satellite image encryption using a chaos-based block cipher , 2020, J. King Saud Univ. Comput. Inf. Sci..

[13]  Lyle D. Broemeling,et al.  An Account of Early Statistical Inference in Arab Cryptology , 2011 .

[14]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[15]  Srinivasan Parthasarathy,et al.  Arithmetic and logic operations with DNA , 1997, DNA Based Computers.

[16]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[17]  L M Adleman,et al.  Molecular computation of solutions to combinatorial problems. , 1994, Science.

[18]  Soumya Paul,et al.  DNA Encoding and Channel Shuffling for Secured Encryption of Audio Data , 2019, Multimedia Tools and Applications.

[19]  W. Yap,et al.  Cryptanalysis of a new image alternate encryption algorithm based on chaotic map , 2015, Nonlinear Dynamics.

[20]  Ruhul Amin,et al.  Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks , 2017, Multimedia Tools and Applications.

[21]  Shuai Chen,et al.  Chaos block cipher for wireless sensor network , 2008, Science in China Series F: Information Sciences.

[22]  Bharat K. Bhargava,et al.  MPEG Video Encryption Algorithms , 2004, Multimedia Tools and Applications.

[23]  Zdenek Martinasek,et al.  Comparative Analysis of Different Implementations of Encryption Algorithms on FPGA Network Cards , 2018 .

[24]  Muhsin Tunay Gençoglu Embedded image coding using laplace transform for Turkish letters , 2018, Multimedia Tools and Applications.

[25]  John H. Reif,et al.  Paradigms for Biomolecular Computation , 1998 .

[26]  Song Guo,et al.  A Selective Privacy-Preserving Approach for Multimedia Data , 2017, IEEE MultiMedia.

[27]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[28]  Li Li,et al.  A new image encryption scheme based on cyclic elliptic curve and chaotic system , 2012, Multimedia Tools and Applications.

[29]  Musab Ghadi,et al.  Securing data exchange in wireless multimedia sensor networks: perspectives and challenges , 2014, Multimedia Tools and Applications.

[30]  Hao Yan,et al.  Parallel molecular computations of pairwise exclusive-or (XOR) using DNA "string tile" self-assembly. , 2003, Journal of the American Chemical Society.

[31]  Xiaofeng Liao,et al.  A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2 , 2018, Multimedia Tools and Applications.

[32]  Xiaoyan Wang,et al.  Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things , 2018, IEEE Communications Magazine.

[33]  Yunpeng Zhang,et al.  A DNA-Based Encryption Method Based on Two Biological Axioms of DNA Chip and Polymerase Chain Reaction (PCR) Amplification Techniques. , 2017, Chemistry.

[34]  Haidar Raad Shakir,et al.  An image encryption method based on selective AES coding of wavelet transform and chaotic pixel shuffling , 2019, Multimedia Tools and Applications.