2018
DOI: 10.1109/mmul.2018.112142439
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
36
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(36 citation statements)
references
References 16 publications
0
36
0
Order By: Relevance
“…In [15], In [31], another encryption scheme using PTDWOS is cryptanalyzed. Similar to the strategy given in [117], the sensitivity mechanism of PRNG on the plain-image can be easily canceled by some special plain-images.…”
Section: Cryptanalysis Of Single Round Ptdwosmentioning
confidence: 99%
See 1 more Smart Citation
“…In [15], In [31], another encryption scheme using PTDWOS is cryptanalyzed. Similar to the strategy given in [117], the sensitivity mechanism of PRNG on the plain-image can be easily canceled by some special plain-images.…”
Section: Cryptanalysis Of Single Round Ptdwosmentioning
confidence: 99%
“…There are some papers focusing on designing S-box with chaotic maps [9,10,11,12]. In [6,13,14,15,16,17,18,19,20], the analyzed image encryption schemes are fixed to withstand the proposed attacking methods. Due to the seemingly similar properties of a chaotic system and a secure pseudo-random number generator (PRNG), a large number of image encryption schemes use various chaotic maps to generate PRNS, which is used to control combination of some basic encryption operations, e.g.…”
Section: Introductionmentioning
confidence: 99%
“…While new chaotic image encryption algorithms are constantly proposed, cryptographic analysis of the chaotic image encryption algorithms is also continually carried out. Many image encryption algorithms based on chaos have been cracked due to their inability to resist selected-plaintext attacks and known-plaintext attacks [25]- [27]. Scholars analyzed the disadvantages of low-dimensional chaotic encryption technology, such as low sensitivity to keys, the existence of periodic windows, the lack of defense against chosen-plaintext attack [28], [29], and the computational complexity of attacks being lower than that of brute attacks [30].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, many chaotic image encryption algorithms have been cracked [5], [15], [16], [33]- [47]. For examples, Li et al [36] cryptanalyze a chaotic image encryption algorithm whose chaotic sequences are generated by a simple nonlinear first-order time-delay system, and point out three defects of this algorithm; Hu et al [37] cryptanalyze a chaotic image cipher using the latin-square-based confusion and diffusion. And they demonstrate that the cipher can be broken by chosen-plaintext attack combined with chosen-ciphertext attack; Wen et al [38] investigate the security of a hyper-chaotic image encryption algorithm with an architecture of permutation and diffusion.…”
Section: Introductionmentioning
confidence: 99%