201. Cryptanalysis of a High-Definition Image Encryption Based on AES Modification
- Author
-
Bok-Min Goi, Raphael C.-W. Phan, and Wun-She Yap
- Subjects
Triple DES ,Block cipher mode of operation ,Theoretical computer science ,Differential cryptanalysis ,Computer science ,Stream cipher attack ,Two-square cipher ,02 engineering and technology ,Related-key attack ,Encryption ,01 natural sciences ,law.invention ,Watermarking attack ,Multiple encryption ,law ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Electrical and Electronic Engineering ,Arithmetic ,010301 acoustics ,Stream cipher ,Null cipher ,Transposition cipher ,Block cipher ,business.industry ,Advanced Encryption Standard ,XSL attack ,Key whitening ,Computer Science Applications ,Cipher ,Probabilistic encryption ,40-bit encryption ,56-bit encryption ,020201 artificial intelligence & image processing ,Slide attack ,Cryptanalysis ,business - Abstract
Wadi and Zainal recently proposed a high definition image encryption algorithm based on a modified AES-128 block cipher in (Wirel Pers Commun 79(2):811---829, 2014). In this paper, we show that the core component of their image encryption algorithm, a modified AES-128 cipher, is insecure against impossible differential attack. The proposed impossible differential attack on the full rounds of the modified AES-128 cipher has a time complexity of around $$2^{88.74}$$288.74 encryptions with $$2^{114.06}$$2114.06 chosen plaintexts and $$2^{99}$$299 bytes of memory, in contrast to the expected security of $$2^{128}$$2128. The existence of such an attack disproves the claims made by the designers that their modified AES-128 cipher improves the security of the AES cipher and that it can subsequently be used to construct a secure image encryption scheme. The root cause of this attack, some other issues with the modified AES cipher and possible solutions are described to serve as important remarks in designing a secure image encryption scheme.
- Published
- 2016