2018
DOI: 10.3390/e20110843
|View full text |Cite
|
Sign up to set email alerts
|

Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps

Abstract: This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process. It was found that the equivalent key streams and all the unknown parameters of the cryptosystem can be recovered by our chosen-plaintext attack algorithm. Both a theoretical analysis and an experimental validation are given in detail. Based on the analysis of the defects in the original cryptosystem, an improved color image encryption scheme was fur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 68 publications
(43 citation statements)
references
References 69 publications
0
43
0
Order By: Relevance
“…Then, Pak's scheme is degenerated into the version analyzed in [16]. Based on the preliminary cryptanalysis works given in [16] and [18], both the equivalent secret-key of Pak's scheme and all its unknown parameters are recovered by a little more pairs of chosen plain-image and the corresponding cipher-image in [19]. In [119], Zhu et al propose a chosen-plaintext attack on another one-round PTDWOS, where diffusion is implemented by modulo addition and XOR.…”
Section: Cryptanalysis Of Single Round Ptdwosmentioning
confidence: 99%
See 1 more Smart Citation
“…Then, Pak's scheme is degenerated into the version analyzed in [16]. Based on the preliminary cryptanalysis works given in [16] and [18], both the equivalent secret-key of Pak's scheme and all its unknown parameters are recovered by a little more pairs of chosen plain-image and the corresponding cipher-image in [19]. In [119], Zhu et al propose a chosen-plaintext attack on another one-round PTDWOS, where diffusion is implemented by modulo addition and XOR.…”
Section: Cryptanalysis Of Single Round Ptdwosmentioning
confidence: 99%
“…There are some papers focusing on designing S-box with chaotic maps [9,10,11,12]. In [6,13,14,15,16,17,18,19,20], the analyzed image encryption schemes are fixed to withstand the proposed attacking methods. Due to the seemingly similar properties of a chaotic system and a secure pseudo-random number generator (PRNG), a large number of image encryption schemes use various chaotic maps to generate PRNS, which is used to control combination of some basic encryption operations, e.g.…”
Section: Introductionmentioning
confidence: 99%
“…While Field Programmable Gate Arrays (FPGA) are the popular option for providing configurable circuits practical implementation of embedded systems using chaos [33], recently some microcontroller-based chaotic systems have been considered due to their equally flexible and cheap pricing for different programming applications [34][35][36][37][38][39][40][41]. In this study, we use an Arduino UNO board platform to compute and visualise the solutions (for example, using an oscilloscope) of our chaos generator.…”
Section: Arduino Based Implementation Of Proposed Oscillatormentioning
confidence: 99%
“…Step 3: Write the solutions of the discrete chaotic oscillator on Arduino pins. Pin 1 is activated when x2 > 0.5 and pin 2 is activated when x1 > 1. pricing for different programming applications [34][35][36][37][38][39][40][41]. In this study, we use an Arduino UNO board platform to compute and visualise the solutions (for example, using an oscilloscope) of our chaos generator.…”
Section: Arduino Based Implementation Of Proposed Oscillatormentioning
confidence: 99%
See 1 more Smart Citation