Breaking an image encryption scheme based on Arnold map and Lucas series

10/19/2019
by   Imad El Hanouti, et al.
0

Fairly recently, a novel image encryption based on Arnold scrambling and Lucas series has been proposed in the literature. The scheme design is based on permutation-substitution operations, where Arnold map is used to permute pixels for some T rounds, and Lucas sequence is used to mask the image and substitute pixel's values. The authors of the cryptosystem have claimed, after several statistical analyses, that their system is "with high efficiency" and resists chosen and known plaintext attacks. Negatively, in this paper we showed the opposite. The key space of the scheme under study could be reduced considerably after our equivalent keys analysis, and thus the system is breakable under reasonable brute force attack. After all, the design of the scheme has several weaknesses that make it weak against chosen and known plaintext attacks. Consequently, we do not recommend the use of this system for any cryptographic concern or security purpose.

READ FULL TEXT

page 5

page 6

page 7

page 8

page 11

research
10/19/2019

Security analysis of an audio data encryption scheme based on key chaining and DNA encoding

Fairly recently, a new encryption scheme for audio data encryption has b...
research
06/21/2018

Cryptanalysis of a Chaotic Key based Image Encryption Scheme

Security of multimedia data is a major concern due to its widespread tra...
research
03/28/2019

Universal chosen-ciphertext attack for a family of image encryption schemes

During the past decades, there is a great popularity employing nonlinear...
research
08/14/2022

Cryptanalyzing an Image Encryption Algorithm Underpinned by 2D Lag-Complex Logistic Map

This paper analyzes security performance of an image encryption algorith...
research
12/28/2020

An Image Encryption Scheme Based on Chaotic Logarithmic Map and Key Generation using Deep CNN

A secure and reliable image encryption scheme is presented in this study...
research
01/19/2019

Weak Keys and Cryptanalysis of a Cold War Block Cipher

T-310 is a cipher that was used for encryption of governmental communica...
research
08/11/2023

Security of XCB and HCTR

Tweakable Enciphering Scheme (TES) is a length preserving scheme which p...

Please sign up or login with your details

Forgot password? Click here to reset