Deciphering an Image Cipher Based on Mixed Transformed Logistic Maps

Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a great number of encryption schemes based on Logistic map and/or its variants have been proposed. This paper re-evaluates the security of an image cipher based on transformed logistic maps and proves that the image cipher can be deciphered efficiently under two different conditions: (1) two pairs of known plain-images and the corresponding cipher-images with computational complexity of O(218 + L); (2) two pairs of chosen plain-images and the corresponding cipher-images with computational complexity of O(L), where L is the number of pixels in the plain-image. In contrast, the required condition in the previous deciphering method is 87 pairs of chosen plain-images and the corresponding cipher-images with computational complexity of O(27 + L). In addition, three other security flaws existing in most Logistic-map-based ciphers are also reported.

[1]  Chengqing Li,et al.  Cryptanalyzing image encryption using chaotic logistic map , 2013, Nonlinear Dynamics.

[2]  M. Baptista Cryptography with chaos , 1998 .

[3]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[4]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[5]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[6]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[7]  Phatak,et al.  Logistic map: A possible random-number generator. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[8]  Lih-Yuan Deng,et al.  Period Extension and Randomness Enhancement Using High-Throughput Reseeding-Mixing PRNG , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[9]  G. Álvarez,et al.  Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.

[10]  Leo Yu Zhang,et al.  International Journal of Bifurcation and Chaos Breaking a Chaotic Image Encryption Algorithm Based on modulo Addition and Xor Operation , 2022 .

[11]  Tao Xie,et al.  Breaking a novel image encryption scheme based on improved hyperchaotic sequences , 2012, Nonlinear Dynamics.

[12]  R. Povinelli,et al.  Analyzing Logistic Map Pseudorandom Number Generators for Periodicity Induced by Finite Precision Floating-Point Representation , 2012 .

[13]  Olcay Taner Yildiz,et al.  Cryptanalysis of Fridrich's Chaotic Image Encryption , 2010, Int. J. Bifurc. Chaos.

[14]  Jinhu Lu,et al.  Design and ARM Platform-Based Realization of Digital Color Image Encryption and Decryption via Single State Variable Feedback Control , 2014, Int. J. Bifurc. Chaos.

[15]  Gonzalo Alvarez,et al.  Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.

[16]  S. M. Ulam,et al.  On Combination of Stochastic and Deterministic Processes , 1947 .

[17]  Di Xiao,et al.  Cryptanalyzing a novel image cipher based on mixed transformed logistic maps , 2013, Multimedia Tools and Applications.

[18]  Guanrong Chen,et al.  Cryptanalysis of RCES/RSES Image Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..

[19]  Xingyuan Wang,et al.  Image encryption using DNA complementary rule and chaotic maps , 2012, Appl. Soft Comput..

[20]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[21]  Donald E. Knuth,et al.  Deciphering a linear congruential encryption , 1985, IEEE Trans. Inf. Theory.

[22]  Ranjan Bose,et al.  Novel public key encryption technique based on multiple chaotic systems. , 2005, Physical review letters.

[23]  I. Shatheesh Sam,et al.  A novel image cipher based on mixed transformed logistic maps , 2010, Multimedia Tools and Applications.

[24]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[25]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[26]  Robert M. May,et al.  Simple mathematical models with very complicated dynamics , 1976, Nature.

[27]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[28]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[29]  Vijayan K. Asari,et al.  No-Reference Video Quality Assessment Based on Artifact Measurement and Statistical Analysis , 2015, IEEE Transactions on Circuits and Systems for Video Technology.

[30]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[31]  L. Kocarev,et al.  Logistic map as a block encryption algorithm , 2001 .

[32]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[33]  Kwok-Wo Wong,et al.  Chosen plaintext attack on a cryptosystem with discretized skew tent map , 2006, IEEE Trans. Circuits Syst. II Express Briefs.

[34]  Congxu Zhu,et al.  A novel image encryption scheme based on improved hyperchaotic sequences , 2012 .

[35]  Kwok-Tung Lo,et al.  Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..

[36]  Yicong Zhou,et al.  Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.