Recently, an image encryption algorithm based on DNA encoding and spatiotemporal chaos (IEA-DESC) was proposed. In IEA-DESC, pixel diffusion, DNA encoding, DNA-base permutation and DNA decoding are performed successively to generate cipher-images from the plain-images. Some security analyses and simulation results are given to prove that it can withstand various common attacks. However, in this paper, it is found that IEA-DESC has some inherent security defects as follows: (1) the pixel diffusion is invalid for attackers from the perspective of cryptanalysis; (2) the combination of DNA encoding and DNA decoding is equivalent to bitwise complement; (3) the DNA-base permutation is actually a fixed position shuffling operation for quaternary elements, which has been proved to be insecure. In summary, IEA-DESC is essentially a combination of a fixed DNA-base position permutation and bitwise complement. Therefore, IEA-DESC can be equivalently represented as simplified form, and its security solely depends on the equivalent secret key. So the equivalent secret key of IEA-DESC can be recovered using chosen-plaintext attack and chosen-ciphertext attack, respectively. Theoretical analysis and experimental results show that the two attack methods are both effective and efficient.
In the Internet of Things environment, the secure transmission of digital images has attracted much attention. To improve the confidentiality, we propose an image cryptosystem adopting a quantum chaotic map and the certain security-enhanced mechanisms. Firstly, we use the good random characteristics of quantum chaotic sequences to enhance security performance. Then, we introduce a plaintext correlation mechanism and a diffusion-permutation-diffusion structure in the cryptosystem. Finally, we verify the cryptosystem on a common secure communication platform. The theoretical and statistical analysis results demonstrate that the cryptosystem has excellent performance and can resist various cryptographic attacks. Moreover, feasibility and effectiveness of the image cryptosystem are verified on the Internet of Things secure communication experimental platform. It proves that the proposed image cryptosystem is a preferred and promising secure communication technology solution. INDEX TERMSSecure communication; image encryption; Internet of Things; quantum chaos I. INTRODUCTION
Fractional-order chaos has complex dynamic behavior characteristics, so its application in secure communication has attracted much attention. Compared with the design of fractional-order chaos-based cipher, there are fewer researches on security analysis. This paper conducts a comprehensive security analysis of a color image encryption algorithm using a fractional-order hyperchaotic system (CIEA-FOHS). Experimental simulation based on excellent numerical statistical results supported that CIEA-FOHS is cryptographically secure. Yet, from the perspective of cryptanalysis, this paper found that CIEA-FOHS can be broken by a chosen-plaintext attack method owing to its some inherent security defects. Firstly, the diffusion part can be eliminated by choosing some special images with all the same pixel values. Secondly, the permutation-only part can be deciphered by some chosen plain images and the corresponding cipher images. Finally, using the equivalent diffusion and permutation keys obtained in the previous two steps, the original plain image can be recovered from a target cipher image. Theoretical analysis and experimental simulations show that the attack method is both effective and efficient. To enhance the security, some suggestions for improvement are given. The reported results would help the designers of chaotic cryptography pay more attention to the gap of complex chaotic system and secure cryptosystem.
In the paper, a deoxyribonucleic acid (DNA) extension code with 3-bit binary streams is proposed to encrypt the downlink data for orthogonal frequency division multiplexing passive optical network (OFDM-PON). It has 8 bases to make up 4 pairs of complementary codes. And it can obtain 384 matching rules, which greatly improves the randomness of matching. Here, two DNA addition operation rules are also proposed to encrypt the data. DNA extension rules can reduce half coding operations. Three 1-dimensional (1-D) chaotic systems are used to encrypt the code and control the rules. The encryption method based on the uplink streams from optical network units (ONUs) makes the security of downlink signals not just depending on the security of chaotic systems. Finally, a 22.06 Gb/s DNA extension code encryption signal is transmitted through a back-to-back (BTB) system and a 25-km standard single-mode fiber (SSMF). The proposed method not only improves the security but also reduces the computational complexity. The experimental results show that the proposed method has the ability to resist optical channel response and fiber nonlinearity, which is a promising candidate for solving the security enhancement in access networks.INDEX TERMS DNA extension code, OFDM-PON, uplink stream, 1-D chaotic system, security enhancement.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.