2018
DOI: 10.3390/sym10070266
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos

Abstract: The issues of identity authentication and privacy protection of individuals in body area network (BAN) systems have raised much concern in past few years. To address the challenges of privacy protection in wireless BAN, an image encryption algorithm has been proposed recently by Wang et al. The encryption algorithm utilized two 1D chaotic maps to generate sub-chaotic matrices which are combined to perform encryption. The algorithm has good statistical encryption performance. However, a cautious inquiry finds t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(35 citation statements)
references
References 47 publications
0
32
0
1
Order By: Relevance
“…The results for the Lena image is listed in Table 2. Evidently, the encrypted image using our improved encryption scheme has smaller absolute values of correlation coefficient than the schemes in [2,15,23,24].…”
Section: Pixels Correlation Analysismentioning
confidence: 82%
See 1 more Smart Citation
“…The results for the Lena image is listed in Table 2. Evidently, the encrypted image using our improved encryption scheme has smaller absolute values of correlation coefficient than the schemes in [2,15,23,24].…”
Section: Pixels Correlation Analysismentioning
confidence: 82%
“…The image encryption scheme in Reference [21] was broken by Zhu and Sun [22]. The image encryption scheme in Reference [23] was broken by Ahmad et al [24]. In order to promote cryptanalysis research and enhance the security of image encryption systems, this article analyzes the image encryption algorithm using chaos S-boxes in Reference [15].…”
Section: Introductionmentioning
confidence: 99%
“…In the Introduction, References are related to image encryption. However, the algorithms in References [1][2][3][4][5][6][7][8] are single-image encryption algorithms, which cannot encrypt multiple images at once. However, References [7,8] adopt the classical substitution-permutation network, which are similar to the proposed algorithm.…”
Section: Existing Similar Algorithmsmentioning
confidence: 99%
“…Gan et al proposed an image encryption algorithm using S-boxes and a chaotic system [4]. Ahmad et al presented an image encryption algorithm using SHA-512 and hyper-chaos [5]. Bashir et al presented an image encryption algorithm with Lv's hyper-chaotic system [6].…”
Section: Introductionmentioning
confidence: 99%
“…chaos synchronization [28,29]. As the opposite of image cryptography, some impressive image cryptanalysis works were developed in 2018 [30,31,32,33,34,35]. Especially, all image encryption schemes published in the journal Nonlinear Dynamics before 2018 are critically reviewed in [35].…”
Section: Introductionmentioning
confidence: 99%