Breaking an image encryption scheme based on a spatiotemporal chaotic system

In this paper, we describe a cryptanalysis of image encryption scheme recently proposed by Chun-Yan Song, Yu-Long Qiao, and Xing-Zhou Zhang. The scheme is based on a spatiotemporal chaos with a dynamic keystream generator, and its security is claimed to rely in utilized the plainimage in the keystream generation process to obtain a different keystream for every plainimage/cipherimage pair. However, two flaws are investigated and prove that the security of the proposal against chosen plaintext attack is groundless. Simulations conducted demonstrate that the plainimage can be recovered under partial attack with an acceptable perceptual quality. Moreover, a total break is possible, but a large number of plain-image/cipher-image pairs is needed. HighlightsA cryptanalysis of an image encryption scheme based on spatiotemporal chaos is presented.We gave a complete and partial break of the cryptosystem under study.We prove that the studied cryptosystem is not sufficiently secure against chosen plaintext attack.Results suggest that a partial attach needs smaller number of plain/ciphered images with acceptable perceptual qualities.

[1]  Ercan Solak,et al.  Algebraic break of image ciphers based on discretized chaotic map lattices , 2011, Inf. Sci..

[2]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[3]  Safya Belghith,et al.  Improvement of an image encryption algorithm based on hyper-chaos , 2011, Telecommunication Systems.

[4]  David Arroyo,et al.  Cryptanalysis of a one round chaos-based Substitution Permutation Network , 2012, Signal Process..

[5]  A. Pisarchik,et al.  Encryption and decryption of images with chaotic map lattices. , 2006, Chaos.

[6]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[7]  Gonzalo Alvarez,et al.  Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.

[8]  Shujun Li,et al.  Cryptanalysis of a new chaotic cryptosystem based on ergodicity , 2008, 0806.3183.

[9]  Bingo Wing-Kuen Ling,et al.  Chaotic filter bank for computer cryptography , 2007 .

[10]  Hong Liu,et al.  Security assessment on block-Cat-map based permutation applied to image encryption scheme , 2014 .

[11]  A. Pisarchik,et al.  Image encryption with chaotically coupled chaotic maps , 2008 .

[12]  Safya Belghith,et al.  Security analysis of image cryptosystems only or partially based on a chaotic permutation , 2012, J. Syst. Softw..

[13]  Olcay Taner Yildiz,et al.  Cryptanalysis of Fridrich's Chaotic Image Encryption , 2010, Int. J. Bifurc. Chaos.

[14]  Gonzalo Álvarez,et al.  Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers , 2011, Chaos-Based Cryptography.

[15]  Xing-Zhou Zhang,et al.  An image encryption scheme based on new spatiotemporal chaos , 2013 .

[16]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[17]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[18]  Chengqing Li,et al.  Cracking a hierarchical chaotic image encryption algorithm based on permutation , 2015, Signal Process..

[19]  G. Álvarez,et al.  Cryptanalysis of an ergodic chaotic cipher , 2003 .