Cryptanalysis of a Chaos-Based Fast Image Encryption Algorithm for Embedded Systems

10/19/2019
by   Imad El Hanouti, et al.
0

Fairly recently, a new encryption scheme for embedded systems based on continuous third-order hyperbolic sine chaotic system was proposed by Z. Lin et al. The cryptosystem's main objective is to provide a faster algorithm with lowest computational time in order to be qualified for use in embedded systems especially on a program of UAV (unmanned aerial vehicle). In this paper, we scrutinize the design architecture of this recently proposed scheme against conventional attacks e.g., chosen plaintext attack, differential attack, known plaintext attack. We prove in this paper that, negatively, the studied system is vulnerable. For differential attack, only two chosen plain images are required to recover the full equivalent key. Moreover, only one 3x400 size image is sufficient to break the cryptosystem under chosen plaintext attack considering stability of sort algorithm. Therefore, the proposed scheme is not recommended for security purposes.

READ FULL TEXT

page 6

page 7

page 9

research
12/31/2018

Differential cryptanalysis of image cipher using block-based scrambling and image filtering

Recently, an image encryption algorithm using block-based scrambling and...
research
10/19/2019

Security analysis of an audio data encryption scheme based on key chaining and DNA encoding

Fairly recently, a new encryption scheme for audio data encryption has b...
research
05/02/2022

Attack Detection for Networked Control Systems Using Event-Triggered Dynamic Watermarking

Dynamic watermarking schemes can enhance the cyber attack detection capa...
research
12/23/2004

Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher

In ISNN'04, a novel symmetric cipher was proposed, by combining a chaoti...
research
01/15/2014

Intelligent Systems for Information Security

This thesis aims to use intelligent systems to extend and improve perfor...
research
09/24/2021

Cryptanalyzing two image encryption algorithms based on a first-order time-delay system

Security is a key problem for the transmission, interchange and storage ...
research
12/14/2021

A code-based hybrid signcryption scheme

A key encapsulation mechanism (KEM) that takes as input an arbitrary str...

Please sign up or login with your details

Forgot password? Click here to reset