Cryptanalysis of Fridrich's Chaotic Image Encryption

We cryptanalyze Fridrich’s chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against chosen-ciphertext attacks. We propose an attack that reveals the secret permutation that is used to shuffle the pixels of a round input. We demonstrate the effectiveness of our attack with examples and simulation results. We also show that our proposed attack can be generalized to other well-known chaotic image encryption algorithms.

[1]  Kevin M. Short,et al.  Reconstructing the keystream from a chaotic encryption scheme , 2001 .

[2]  A. Pisarchik,et al.  Encryption and decryption of images with chaotic map lattices. , 2006, Chaos.

[3]  Ahmed S. Elwakil,et al.  Cross-coupled chaotic oscillators and application to random bit generation , 2006 .

[4]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[5]  K. Aihara,et al.  Cryptosystems with discretized chaotic maps , 2002 .

[6]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[7]  Ljupco Kocarev,et al.  Cryptographically secure substitutions based on the approximation of mixing maps , 2005, IEEE Transactions on Circuits and Systems I: Regular Papers.

[8]  Guanrong Chen,et al.  Cryptanalysis of RCES/RSES Image Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..

[9]  X. Liao,et al.  A novel block cryptosystem based on iterating a chaotic map , 2006 .

[10]  Lingfeng Liu,et al.  Estimating system parameters of Chua's circuit from synchronizing signal , 2004 .

[11]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[12]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[13]  Ljupco Kocarev,et al.  Chaotic block ciphers: from theory to practical algorithms , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[14]  S. Li,et al.  On the security of a new image encryption scheme based on chaotic map lattices. , 2008, Chaos.

[15]  Kazuyuki Aihara,et al.  Dynamical Characteristics of Discretized Chaotic Permutations , 2002, Int. J. Bifurc. Chaos.

[16]  Tao Yang,et al.  Application of neural networks to unmasking chaotic secure communication , 1998 .

[17]  Wolfgang Schwarz,et al.  Some Design Rules for Chaos-Based Encryption Systems , 2007, Int. J. Bifurc. Chaos.

[18]  Ljupco Kocarev,et al.  Theory and practice of chaotic cryptography , 2007 .

[19]  Leon O. Chua,et al.  Cryptography based on chaotic systems , 1997 .

[20]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.