1. Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation
- Author
-
Fenlin Liu, Bin Lu, Xin Ge, and Xiangyang Luo
- Subjects
Theoretical computer science ,Plaintext-aware encryption ,business.industry ,Applied Mathematics ,Mechanical Engineering ,Aerospace Engineering ,Ocean Engineering ,Encryption ,01 natural sciences ,010305 fluids & plasmas ,Disk encryption theory ,Deterministic encryption ,Watermarking attack ,Multiple encryption ,Control and Systems Engineering ,Probabilistic encryption ,Computer Science::Multimedia ,0103 physical sciences ,40-bit encryption ,Electrical and Electronic Engineering ,business ,010301 acoustics ,Algorithm ,Computer Science::Cryptography and Security ,Mathematics - Abstract
Recently, a feedback image encryption algorithm with compound chaotic stream cipher based on perturbation was proposed. This paper analyzes security of the algorithm and reports that there exist some security defects, i.e., encryption of a pixel is independent on the position scrambling and the encryption round is controlled by the users. Based on them, a chosen-ciphertext attack is proposed to obtain the equivalent version of the secret key of the algorithm with $$n\cdot \lceil \log _{256} MN +2 \rceil $$ chosen cipher-images, where $$M\times N$$ is the size of the corresponding plain-images and n is the round number of encryption.
- Published
- 2017
- Full Text
- View/download PDF