Cryptanalysis of a Chaos-Based Fast Image Encryption Algorithm for Embedded Systems

10/19/2019
by   Imad El Hanouti, et al.
0

Fairly recently, a new encryption scheme for embedded systems based on continuous third-order hyperbolic sine chaotic system was proposed by Z. Lin et al. The cryptosystem's main objective is to provide a faster algorithm with lowest computational time in order to be qualified for use in embedded systems especially on a program of UAV (unmanned aerial vehicle). In this paper, we scrutinize the design architecture of this recently proposed scheme against conventional attacks e.g., chosen plaintext attack, differential attack, known plaintext attack. We prove in this paper that, negatively, the studied system is vulnerable. For differential attack, only two chosen plain images are required to recover the full equivalent key. Moreover, only one 3x400 size image is sufficient to break the cryptosystem under chosen plaintext attack considering stability of sort algorithm. Therefore, the proposed scheme is not recommended for security purposes.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 6

page 7

page 9

12/31/2018

Differential cryptanalysis of image cipher using block-based scrambling and image filtering

Recently, an image encryption algorithm using block-based scrambling and...
10/19/2019

Security analysis of an audio data encryption scheme based on key chaining and DNA encoding

Fairly recently, a new encryption scheme for audio data encryption has b...
12/14/2021

A code-based hybrid signcryption scheme

A key encapsulation mechanism (KEM) that takes as input an arbitrary str...
12/23/2004

Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher

In ISNN'04, a novel symmetric cipher was proposed, by combining a chaoti...
01/15/2014

Intelligent Systems for Information Security

This thesis aims to use intelligent systems to extend and improve perfor...
09/24/2021

Cryptanalyzing two image encryption algorithms based on a first-order time-delay system

Security is a key problem for the transmission, interchange and storage ...
09/23/2018

Insufficient properties of image encryption algorithms

We analyze the security of recently proposed image encryption scheme [1]...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.