On the security of a class of image encryption schemes

Recently four chaos-based image encryption schemes were proposed. Essentially, the four schemes can be classified into one, which is composed of two basic parts: permutation of positions and diffusion of pixel values with the same cipher-text feedback function. The operations involved in the two basic parts are determined by a pseudo random number sequence (PRNS) generated from iterating a chaotic dynamic system. According to the security requirement, the two basic parts are performed alternatively for some rounds. Despite the claim that the schemes are of high quality, we found the following security problems: 1) the schemes are not sensitive to the changes of plain-images; 2) the schemes are not sensitive to the changes of the key streams generated by any secret key; 3) there exists a serious flaw of the diffusion function; 4) the schemes can be broken with no more than [logL (MN)] + 3 chosen-images when only one iteration is used, where MN is the size of the plain- image and L is the number of different pixel values. Moreover, we found that the cryptanalysis on one of these schemes proposed by another research group is quite questionable.

[1]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[2]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[3]  Wolfgang Schwarz,et al.  Some Design Rules for Chaos-Based Encryption Systems , 2007, Int. J. Bifurc. Chaos.

[4]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[5]  Guanrong Chen,et al.  Cryptanalysis of a data security protection scheme for VoIP , 2006 .

[6]  Nikolaos G. Bourbakis,et al.  A General Cryptanalysis of Permutation-Only Multimedia Encryption Algorithms , 2004 .

[7]  Trees-Juen Chuang,et al.  New approach to image encryption , 1998, J. Electronic Imaging.

[8]  Qingsheng Zhu,et al.  A New Chaos-Based Encryption Method for Color Image , 2006, RSKT.

[9]  Wolfgang Schwarz,et al.  General Design Rules for Chaos-Based Encryption Systems , 2005 .

[10]  Jiun-In Guo,et al.  New voice over Internet protocol technique with hierarchical data security protection , 2002 .

[11]  Kuo-Liang Chung,et al.  Large encrypting binary images with higher security , 1998, Pattern Recognit. Lett..

[12]  Jinn-ke Jan,et al.  On the Security of Image Encryption Method , 1996, Inf. Process. Lett..

[13]  Guanrong Chen,et al.  Cryptanalysis of an image encryption scheme , 2006, J. Electronic Imaging.

[14]  G. Álvarez,et al.  Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .

[15]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[16]  Gonzalo Alvarez,et al.  On the security of an image encryption scheme , 2007, IACR Cryptol. ePrint Arch..

[17]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[18]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[19]  Kai Wang,et al.  On the security of 3D Cat map based symmetric image encryption scheme , 2005 .

[20]  Chuan Zhou,et al.  A Color Image Encryption Algorithm Based on Magic Cube Transformation and Modular Arithmetic Operation , 2005, PCM.